Query Details
//During my routine threat hunting, I observed that the ISP "kuroit limited," which operates in the USA, London, and Amsterdam, is sending a significant number of malicious emails from gmail.com domains. This is something defenders should monitor and filter as necessary.🤝 CloudAppEvents | where Application == "Microsoft Exchange Online" | where ActionType == "TIMailData-Inline" | where ActivityType == "Securityevent" | where ISP == "kuroit limited" | extend CAInternetMessageId = tostring(parse_json(RawEventData)["InternetMessageId"]) | join EmailEvents on $left.CAInternetMessageId == $right.InternetMessageId | where EmailDirection == "Inbound"
This query is designed to identify and monitor potentially malicious emails originating from the ISP "kuroit limited," which operates in the USA, London, and Amsterdam. Here's a simplified breakdown of what the query does:
Data Source: It starts by looking at events from Microsoft Exchange Online, specifically focusing on cloud application events.
Filtering Criteria:
Data Extraction:
Joining Data:
Inbound Emails:
The overall goal of this query is to help defenders monitor and potentially filter out malicious emails coming from the specified ISP, which are using gmail.com domains, as part of a proactive threat hunting effort.

Steven Lim
Released: January 14, 2025
Tables
Keywords
Operators