Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Malicious Ads Detected

Back
Idcf0a9691-5716-42e0-bfa1-49b35d3a7892
RulenameCyble Vision Alerts Malicious Ads Detected
DescriptionGenerates an incident when Cyble Intelligence detects a malicious advertisement, malvertising activity, or redirect attempting to impersonate a legitimate brand.
SeverityLow
TacticsInitialAccess
Execution
TechniquesT1189
T1566
T1059
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Malicious_ads.yaml
Version1.0.0
Arm templatecf0a9691-5716-42e0-bfa1-49b35d3a7892.json
Deploy To Azure
Alerts_malicious_ads
| where Service == "malicious_ads"
| extend MappedSeverity = Severity
customDetails:
  Status: Status
  Service: Service
  IsLive: MA_IsLive
  Keyword: MA_Keyword_Nested
  MappedSeverity: Severity
  AlertID: AlertID
  Domain: MA_Domain_URL
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_Malicious_ads.yaml
query: |
  Alerts_malicious_ads
  | where Service == "malicious_ads"
  | extend MappedSeverity = Severity  
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
incidentConfiguration:
  alertDetailsOverride: 
  alertDisplayNameFormat: Malicious Ad Detected  {{MA_DomainName_Nested}}
  createIncident: true
  groupingConfiguration:
    reopenClosedIncident: false
    enabled: false
    matchingMethod: AllEntities
    lookbackDuration: PT5H
  alertDescriptionFormat: |
    Cyble Intelligence detected a malicious advertisement or suspicious redirect.
    Domain {{MA_Domain_URL}}
    Brand/Keyword {{MA_Keyword_Nested}}
    Status Code {{MA_StatusCode}}    
relevantTechniques:
- T1189
- T1566
- T1059
kind: Scheduled
name: Cyble Vision Alerts Malicious Ads Detected
tactics:
- InitialAccess
- Execution
severity: Low
suppressionDuration: PT5M
enabled: true
queryFrequency: 30m
description: |
    'Generates an incident when Cyble Intelligence detects a malicious advertisement, malvertising activity, or redirect attempting to impersonate a legitimate brand.'
eventGroupingSettings:
  aggregationKind: AlertPerResult
triggerThreshold: 0
triggerOperator: GreaterThan
version: 1.0.0
entityMappings:
- fieldMappings:
  - identifier: Url
    columnName: MA_Domain_URL
  entityType: URL
- fieldMappings:
  - identifier: DomainName
    columnName: MA_DomainName_Nested
  entityType: DNS
queryPeriod: 30m
id: cf0a9691-5716-42e0-bfa1-49b35d3a7892