Query Details
// Defending against dot zip domain phishing attack with Microsoft 365 Defender Advanced Hunting // https://www.linkedin.com/pulse/defending-against-zip-domain-phishing-attack-microsoft-steven-lim/ EmailUrlInfo | where Timestamp > ago(1h) | where UrlDomain endswith ".zip" | where Url contains "@" | join EmailEvents on $left.NetworkMessageId == $right.NetworkMessageId | project Timestamp, NetworkMessageId, SenderFromAddress, RecipientEmailAddress, Subject, Url, UrlDomain, ThreatTypes, EmailAction, ReportId
This KQL (Kusto Query Language) query is designed to help defend against phishing attacks that use ".zip" domains in email URLs. Here's a simplified summary of what the query does:
EmailUrlInfo table, which contains information about URLs found in emails.Timestamp > ago(1h)).UrlDomain endswith ".zip").Url contains "@"), which is often used in phishing attempts.EmailEvents table based on a common field called NetworkMessageId.Timestamp, NetworkMessageId, SenderFromAddress, RecipientEmailAddress, Subject, Url, UrlDomain, ThreatTypes, EmailAction, and ReportId.In essence, this query identifies potentially malicious emails containing ".zip" URLs with "@" symbols, which are common indicators of phishing attacks, and provides detailed information about these emails.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators