Query Details
//By leveraging Defender threat intelligence data to first identify abused Proofpoint email gateways and correlating this with emails that have passed authentication checks (SPF/DKIM/DMARC) from these gateways, you can quickly spot abnormal inbound email counts from legitimate non-business partner domains by reviewing the email statistics. (E.g Disney.com) let HighRiskProofpointEmailGateways = CloudAppEvents | where ActionType == @"TIMailData-Inline" | where RawEventData has "pphosted.com" or ISP == @"proofpoint inc." | extend SenderIP = tostring(RawEventData.SenderIp) | distinct SenderIP; EmailEvents | where SenderIPv4 has_any(HighRiskProofpointEmailGateways) | extend SenderInfo = geo_info_from_ip_address(SenderIPv4) | extend AuthDetail = parse_json(AuthenticationDetails) | where AuthDetail.SPF=="pass" and AuthDetail.DKIM=="pass" and AuthDetail.DMARC=="pass" | summarize Count=count() by SenderFromDomain | sort by Count desc // https://labs.guard.io/echospoofing-a-massive-phishing-campaign-exploiting-proofpoints-email-protection-to-dispatch-3dd6b5417db6
This query is designed to identify and analyze potentially suspicious email activity involving Proofpoint email gateways. Here's a simplified breakdown:
Identify High-Risk Proofpoint Gateways:
Analyze Emails from Identified Gateways:
Purpose: By doing this, you can quickly spot unusual volumes of inbound emails from domains that are not recognized as business partners, helping to identify potential phishing or other malicious activities.
Example: If a domain like "Disney.com" shows an abnormal number of emails passing through these gateways, it could be flagged for further investigation.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators