Lookout - High Severity Mobile Threats Detected v2
| Id | 8b4a5c7e-2f91-4d8a-9e3b-1c6f8a2d4e9f |
| Rulename | Lookout - High Severity Mobile Threats Detected (v2) |
| Description | Detects high severity mobile threats from Lookout Mobile Risk API v2 with enhanced threat intelligence and device context. This rule leverages the comprehensive v2 field set to provide detailed threat classification, risk assessment, and device compliance status for improved security monitoring. |
| Severity | High |
| Tactics | Discovery DefenseEvasion Persistence PrivilegeEscalation |
| Techniques | T1424 T1418 T1629 T1630 |
| Required data connectors | LookoutAPI |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 15m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Lookout/Analytic Rules/LookoutThreatEventV2.yaml |
| Version | 2.0.3 |
| Arm template | 8b4a5c7e-2f91-4d8a-9e3b-1c6f8a2d4e9f.json |
LookoutEvents
| where EventType == "THREAT"
| where ThreatSeverity in ("CRITICAL", "HIGH")
| where ThreatAction == "DETECTED"
| where ThreatStatus in ("OPEN", "ACTIVE")
| extend
ThreatRiskScore = case(
ThreatSeverity == "CRITICAL", 10,
ThreatSeverity == "HIGH", 8,
ThreatSeverity == "MEDIUM", 5,
ThreatSeverity == "LOW", 2,
1
),
DeviceRiskLevel = case(
DeviceSecurityStatus == "THREATS_HIGH", "High",
DeviceSecurityStatus == "THREATS_MEDIUM", "Medium",
DeviceSecurityStatus == "THREATS_LOW", "Low",
"Unknown"
),
ThreatCategory = case(
ThreatClassifications has "MALWARE", "Malware",
ThreatClassifications has "PHISHING", "Phishing",
ThreatClassifications has "SPYWARE", "Spyware",
ThreatClassifications has "TROJAN", "Trojan",
ThreatClassifications has "ADWARE", "Adware",
"Other"
)
| extend ComplianceImpact = case(
DeviceComplianceStatus == "Non-Compliant" and ThreatRiskScore >= 8, "Critical",
DeviceComplianceStatus == "Non-Compliant" and ThreatRiskScore >= 5, "High",
DeviceComplianceStatus == "Partial" and ThreatRiskScore >= 8, "High",
DeviceComplianceStatus == "Partial" and ThreatRiskScore >= 5, "Medium",
"Low"
)
| project
TimeGenerated,
EventId,
ThreatId,
ThreatType,
ThreatSeverity,
ThreatRiskScore,
ThreatCategory,
ThreatClassifications,
ThreatStatus,
ThreatDescription,
ThreatApplicationName,
ThreatPackageName,
ThreatPackageSha,
DeviceGuid,
DevicePlatform,
DeviceOSVersion,
DeviceManufacturer,
DeviceModel,
DeviceEmailAddress,
DeviceSecurityStatus,
DeviceRiskLevel,
DeviceComplianceStatus,
ComplianceImpact,
ClientLookoutSDKVersion,
MDMConnectorId,
MDMExternalId,
TargetEmailAddress,
TargetPlatform,
ActorType,
ActorGuid
relevantTechniques:
- T1424
- T1418
- T1629
- T1630
entityMappings:
- entityType: Account
fieldMappings:
- columnName: DeviceEmailAddress
identifier: FullName
- columnName: TargetEmailAddress
identifier: Name
- entityType: Host
fieldMappings:
- columnName: DeviceGuid
identifier: HostName
- columnName: DevicePlatform
identifier: OSFamily
- columnName: DeviceOSVersion
identifier: OSVersion
- entityType: FileHash
fieldMappings:
- columnName: ThreatApplicationName
identifier: Algorithm
- columnName: ThreatPackageSha
identifier: Value
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 2.0.3
suppressionDuration: PT1H
id: 8b4a5c7e-2f91-4d8a-9e3b-1c6f8a2d4e9f
suppressionEnabled: false
severity: High
kind: Scheduled
queryFrequency: 5m
description: |
'Detects high severity mobile threats from Lookout Mobile Risk API v2 with enhanced threat intelligence and device context. This rule leverages the comprehensive v2 field set to provide detailed threat classification, risk assessment, and device compliance status for improved security monitoring.'
requiredDataConnectors:
- connectorId: LookoutAPI
dataTypes:
- LookoutEvents
triggerOperator: gt
name: Lookout - High Severity Mobile Threats Detected (v2)
tactics:
- Discovery
- DefenseEvasion
- Persistence
- PrivilegeEscalation
alertDetailsOverride:
alertDescriptionFormat: '{{ThreatSeverity}} {{ThreatCategory}} threat on {{DevicePlatform}}'
alertTacticsColumnName: ThreatCategory
alertSeverityColumnName: ThreatSeverity
alertDisplayNameFormat: 'High Severity Mobile Threat: {{ThreatType}} on {{DevicePlatform}} Device'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Lookout/Analytic Rules/LookoutThreatEventV2.yaml
triggerThreshold: 0
queryPeriod: 15m
query: |
LookoutEvents
| where EventType == "THREAT"
| where ThreatSeverity in ("CRITICAL", "HIGH")
| where ThreatAction == "DETECTED"
| where ThreatStatus in ("OPEN", "ACTIVE")
| extend
ThreatRiskScore = case(
ThreatSeverity == "CRITICAL", 10,
ThreatSeverity == "HIGH", 8,
ThreatSeverity == "MEDIUM", 5,
ThreatSeverity == "LOW", 2,
1
),
DeviceRiskLevel = case(
DeviceSecurityStatus == "THREATS_HIGH", "High",
DeviceSecurityStatus == "THREATS_MEDIUM", "Medium",
DeviceSecurityStatus == "THREATS_LOW", "Low",
"Unknown"
),
ThreatCategory = case(
ThreatClassifications has "MALWARE", "Malware",
ThreatClassifications has "PHISHING", "Phishing",
ThreatClassifications has "SPYWARE", "Spyware",
ThreatClassifications has "TROJAN", "Trojan",
ThreatClassifications has "ADWARE", "Adware",
"Other"
)
| extend ComplianceImpact = case(
DeviceComplianceStatus == "Non-Compliant" and ThreatRiskScore >= 8, "Critical",
DeviceComplianceStatus == "Non-Compliant" and ThreatRiskScore >= 5, "High",
DeviceComplianceStatus == "Partial" and ThreatRiskScore >= 8, "High",
DeviceComplianceStatus == "Partial" and ThreatRiskScore >= 5, "Medium",
"Low"
)
| project
TimeGenerated,
EventId,
ThreatId,
ThreatType,
ThreatSeverity,
ThreatRiskScore,
ThreatCategory,
ThreatClassifications,
ThreatStatus,
ThreatDescription,
ThreatApplicationName,
ThreatPackageName,
ThreatPackageSha,
DeviceGuid,
DevicePlatform,
DeviceOSVersion,
DeviceManufacturer,
DeviceModel,
DeviceEmailAddress,
DeviceSecurityStatus,
DeviceRiskLevel,
DeviceComplianceStatus,
ComplianceImpact,
ClientLookoutSDKVersion,
MDMConnectorId,
MDMExternalId,
TargetEmailAddress,
TargetPlatform,
ActorType,
ActorGuid
status: Available
customDetails:
ThreatRiskScore: ThreatRiskScore
DevicePlatform: DevicePlatform
DeviceRiskLevel: DeviceRiskLevel
ThreatClasses: ThreatClassifications
ThreatType: ThreatType
DeviceSecStatus: DeviceSecurityStatus
ThreatSeverity: ThreatSeverity
ThreatStatus: ThreatStatus
ComplianceImpact: ComplianceImpact
ThreatCategory: ThreatCategory
MDMConnectorId: MDMConnectorId
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: Selected
groupByEntities:
- Account
- Host
groupByCustomDetails:
- ThreatCategory
- DevicePlatform
groupByAlertDetails:
- ThreatType
- DeviceGuid
reopenClosedIncident: false
enabled: true
lookbackDuration: P1D