Acronis - Multiple Inboxes with Malicious Content Detected
| Id | 5090ad7b-4b47-4cab-9015-bffb43aecde8 |
| Rulename | Acronis - Multiple Inboxes with Malicious Content Detected |
| Description | Many inboxes containing malicious content could indicate a potential ongoing phishing attack. |
| Severity | Medium |
| Tactics | InitialAccess |
| Techniques | T1566.002 T1566.001 |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1d |
| Trigger threshold | 2 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml |
| Version | 1.0.0 |
| Arm template | 5090ad7b-4b47-4cab-9015-bffb43aecde8.json |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
customDetails:
DeviceName: DeviceName
queryFrequency: 1h
requiredDataConnectors: []
name: Acronis - Multiple Inboxes with Malicious Content Detected
eventGroupingSettings:
aggregationKind: SingleAlert
severity: Medium
triggerThreshold: 2
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
matchingMethod: AnyAlert
lookbackDuration: P1D
reopenClosedIncident: true
relevantTechniques:
- T1566.002
- T1566.001
triggerOperator: gt
queryPeriod: 1d
description: Many inboxes containing malicious content could indicate a potential ongoing phishing attack.
id: 5090ad7b-4b47-4cab-9015-bffb43aecde8
version: 1.0.0
entityMappings:
- fieldMappings:
- columnName: DeviceName
identifier: HostName
entityType: Host
kind: Scheduled
tactics:
- InitialAccess
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml