Query Details
// Custom DefenderXDR KQL detection for fake CrowdStrike email domain using Regex
// https://www.linkedin.com/posts/activity-7222081026011885568-giCs/
// Configure as Detect & Purge:
EmailEvents
| where Timestamp > ago(1h)
| where EmailDirection == "Inbound"
| where LatestDeliveryAction == "Delivered"
| where SenderFromDomain matches regex "^{a-z0-9\\-]{0,}cr[0oO]wdstr[i1l]ke[a-z0-9\\-]{0,}\\.[a-z]{1,}$"
| where SenderFromDomain !endswith "crowdstrike.com" and
SenderFromDomain !endswith "litmos.com" and
SenderFromDomain !endswith "zoom.us"
This KQL (Kusto Query Language) query is designed to detect and remove suspicious inbound emails that appear to come from fake CrowdStrike domains. Here's a simple summary of what the query does:
EmailEvents table.Timestamp > ago(1h)).EmailDirection == "Inbound").LatestDeliveryAction == "Delivered").In essence, this query helps identify potentially fraudulent emails that are trying to impersonate CrowdStrike by using look-alike domains, and it is configured to both detect and remove these emails.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators