Email contains URL delivering high-risk file type

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-12-08
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • Microsoft 365 Emails

Detection Modules

Email

Detector Tags

Malicious URLs

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

Emails with URLs linking to file types commonly blocked by email vendors due to their use in malware delivery.

Attacker's Goals

To bypass attachment-based blocking by delivering malware or exploit payloads via URLs pointing to file types commonly blocked by email vendors.

Investigative actions

  • Review the URLs and determine if they host executable or script-based content.
  • Check threat intelligence sources for reputation or known associations with malware.
  • Investigate whether any users clicked the URL or downloaded the file.
  • Analyze the file content using sandbox or static analysis tools.

Variations

External email with URL delivers blocked file types

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Emails with URLs linking to file types commonly blocked by email vendors due to their use in malware delivery.

Attacker's Goals

To bypass attachment-based blocking by delivering malware or exploit payloads via URLs pointing to file types commonly blocked by email vendors.

Investigative actions

  • Review the URLs and determine if they host executable or script-based content.
  • Check threat intelligence sources for reputation or known associations with malware.
  • Investigate whether any users clicked the URL or downloaded the file.
  • Analyze the file content using sandbox or static analysis tools.