CYFIRMA - Brand Intelligence - Malicious Mobile App High Rule
| Id | 3176ac89-b195-48b7-a01e-740a6b26fb2f |
| Rulename | CYFIRMA - Brand Intelligence - Malicious Mobile App High Rule |
| Description | “This analytic rule detects instances where malicious or unauthorized mobile applications are discovered mimicking legitimate brand assets. Such impersonations may be distributed through unofficial app stores or third-party websites, potentially deceiving customers, harvesting sensitive data, or damaging brand reputation. This alert is triggered when CYFIRMA threat intelligence identifies a suspicious mobile app associated with the organization’s brand or product names.” |
| Severity | High |
| Tactics | ResourceDevelopment Execution DefenseEvasion CredentialAccess CommandAndControl |
| Techniques | T1406 T1414 T1437 T1583.001 T1204.002 |
| Required data connectors | CyfirmaBrandIntelligenceAlertsDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BIMaliciousMobileAppHighRule.yaml |
| Version | 1.0.1 |
| Arm template | 3176ac89-b195-48b7-a01e-740a6b26fb2f.json |
// High severity - Malicious Mobile App Impersonation
let timeFrame = 5m;
CyfirmaBIMaliciousMobileAppsAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT'
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
ProductName,
ProviderName
queryPeriod: 5m
query: |
// High severity - Malicious Mobile App Impersonation
let timeFrame = 5m;
CyfirmaBIMaliciousMobileAppsAlerts_CL
| where severity == 'Critical' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
ProviderName='CYFIRMA',
ProductName='DeCYFIR/DeTCT'
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
ProductName,
ProviderName
incidentConfiguration:
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
createIncident: true
name: CYFIRMA - Brand Intelligence - Malicious Mobile App High Rule
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 5m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BIMaliciousMobileAppHighRule.yaml
alertDetailsOverride:
alertDisplayNameFormat: 'CYFIRMA - High Severity Alert: Malicious Mobile App Impersonating Brand Detected - {{AssetType}} - {{AssetValue}} '
alertDescriptionFormat: '{{Description}} '
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
description: |
"This analytic rule detects instances where malicious or unauthorized mobile applications are discovered mimicking legitimate brand assets.
Such impersonations may be distributed through unofficial app stores or third-party websites, potentially deceiving customers, harvesting sensitive data, or damaging brand reputation.
This alert is triggered when CYFIRMA threat intelligence identifies a suspicious mobile app associated with the organization's brand or product names."
kind: Scheduled
version: 1.0.1
status: Available
severity: High
requiredDataConnectors:
- connectorId: CyfirmaBrandIntelligenceAlertsDC
dataTypes:
- CyfirmaBIMaliciousMobileAppsAlerts_CL
triggerOperator: gt
triggerThreshold: 0
customDetails:
Description: Description
FirstSeen: FirstSeen
UID: UID
Impact: Impact
TimeGenerated: TimeGenerated
RiskScore: RiskScore
LastSeen: LastSeen
AssetValue: AssetValue
Recommendation: Recommendation
AssetType: AssetType
AlertUID: AlertUID
tactics:
- ResourceDevelopment
- Execution
- DefenseEvasion
- CredentialAccess
- CommandAndControl
id: 3176ac89-b195-48b7-a01e-740a6b26fb2f
relevantTechniques:
- T1406
- T1414
- T1437
- T1583.001
- T1204.002