Acronis - Multiple Inboxes with Malicious Content Detected
| Id | 5090ad7b-4b47-4cab-9015-bffb43aecde8 |
| Rulename | Acronis - Multiple Inboxes with Malicious Content Detected |
| Description | Many inboxes containing malicious content could indicate a potential ongoing phishing attack. |
| Severity | Medium |
| Tactics | InitialAccess |
| Techniques | T1566.002 T1566.001 |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 1d |
| Trigger threshold | 2 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml |
| Version | 1.0.0 |
| Arm template | 5090ad7b-4b47-4cab-9015-bffb43aecde8.json |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
description: Many inboxes containing malicious content could indicate a potential ongoing phishing attack.
entityMappings:
- fieldMappings:
- columnName: DeviceName
identifier: HostName
entityType: Host
query: |
CommonSecurityLog
| where DeviceVendor == "Acronis"
| where DeviceEventClassID in
("MaliciousURLDetectedInM365MailboxBackup",
"MalwareDetectedInM365MailboxBackup",
"MaliciousEmailDetectedPerceptionPointWarning")
| summarize MaliciousContent = count() by DeviceName
tactics:
- InitialAccess
severity: Medium
triggerThreshold: 2
queryFrequency: 1h
queryPeriod: 1d
relevantTechniques:
- T1566.002
- T1566.001
version: 1.0.0
id: 5090ad7b-4b47-4cab-9015-bffb43aecde8
name: Acronis - Multiple Inboxes with Malicious Content Detected
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: true
enabled: true
matchingMethod: AnyAlert
lookbackDuration: P1D
kind: Scheduled
triggerOperator: gt
customDetails:
DeviceName: DeviceName
eventGroupingSettings:
aggregationKind: SingleAlert
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Acronis Cyber Protect Cloud/Analytic Rules/AcronisMultipleInboxesWithMaliciousContentDetected.yaml
requiredDataConnectors: []