CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected Medium Rule
| Id | 710f4755-490d-4fa7-aef0-43b5a66edc7b |
| Rulename | CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected Medium Rule |
| Description | “Detects high-severity alerts related to impersonation of official social media handles associated with your brand. These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks.” |
| Severity | Medium |
| Tactics | Reconnaissance ResourceDevelopment InitialAccess |
| Techniques | T1589.003 T1591.002 T1585.001 T1566.002 |
| Required data connectors | CyfirmaBrandIntelligenceAlertsDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerMediumRule.yaml |
| Version | 1.0.1 |
| Arm template | 710f4755-490d-4fa7-aef0-43b5a66edc7b.json |
// Medium severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'High' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
relevantTechniques:
- T1589.003
- T1591.002
- T1585.001
- T1566.002
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.1
id: 710f4755-490d-4fa7-aef0-43b5a66edc7b
severity: Medium
kind: Scheduled
queryFrequency: 5m
description: |
"Detects high-severity alerts related to impersonation of official social media handles associated with your brand.
These spoofed accounts may be used for phishing, disinformation, or fraud campaigns, posing significant reputational and security risks."
requiredDataConnectors:
- connectorId: CyfirmaBrandIntelligenceAlertsDC
dataTypes:
- CyfirmaBISocialHandlersAlerts_CL
triggerOperator: gt
name: CYFIRMA - Brand Intelligence - Social Media Handle Impersonation Detected Medium Rule
tactics:
- Reconnaissance
- ResourceDevelopment
- InitialAccess
alertDetailsOverride:
alertDescriptionFormat: '{{Description}} '
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
alertDisplayNameFormat: 'CYFIRMA - Medium Severity Social Media Handle Impersonation Detected - {{AssetType}} : {{AssetValue}} '
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Brand Intelligence/Analytic Rules/BISocialMediaHandlerMediumRule.yaml
triggerThreshold: 0
queryPeriod: 5m
query: |
// Medium severity - Social Media Handle Impersonation
let timeFrame = 5m;
CyfirmaBISocialHandlersAlerts_CL
| where severity == 'High' and TimeGenerated between (ago(timeFrame) .. now())
| extend
Description=description,
FirstSeen=first_seen,
LastSeen=last_seen,
RiskScore=risk_score,
AlertUID=alert_uid,
UID=uid,
AssetType=asset_type,
AssetValue=asset_value,
Impact=impact,
Recommendation=recommendation,
SourceSype=source_type,
ProviderName="CYFIRMA",
ProductName="DeCYFIR/DeTCT"
| project
TimeGenerated,
Description,
RiskScore,
FirstSeen,
LastSeen,
AlertUID,
UID,
AssetType,
AssetValue,
Impact,
Recommendation,
SourceSype,
ProductName,
ProviderName
status: Available
customDetails:
UID: UID
RiskScore: RiskScore
SourceSype: SourceSype
LastSeen: LastSeen
Description: Description
AlertUID: AlertUID
FirstSeen: FirstSeen
AssetValue: AssetValue
TimeGenerated: TimeGenerated
Impact: Impact
Recommendation: Recommendation
AssetType: AssetType
incidentConfiguration:
createIncident: true
groupingConfiguration:
lookbackDuration: PT5H
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities