Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
3 Hours |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Cloud |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
A cloud identity performed a sequence of activities which might indicate an intent to abuse the email service to send phishing or spam.
Attacker's Goals
Adversaries may use cloud-based email services to send phishing or spread malware, abusing legitimate email domains.
Investigative actions
- Check if the identity intended to preform these actions, or look for signs that the user account is compromised (e.g. abnormal logins, unusual activity).
Variations
Suspicious activity indicating a potential abuse of a cloud-native email service involving discovery, weaponization, and impactSuspicious activity indicating a potential abuse of a cloud-native email service involving discovery and weaponization