Query Details
// Phishing campaigns leveraging Microsoft Forms // https://www.linkedin.com/posts/activity-7223704172028665858-99AA/ // The below KQL will help you pick up some forms phisherš«” EmailUrlInfo | where Timestamp > ago(1h) | join EmailEvents on NetworkMessageId | extend AuthDetail = parse_json(AuthenticationDetails) | where EmailDirection == "Inbound" | where UrlDomain == "forms.microsoft.com" | where AuthDetail.SPF == "fail" and AuthDetail.DKIM == "fail" and AuthDetail.DMARC == "fail"
This KQL query is designed to identify potential phishing campaigns that use Microsoft Forms. Here's a simple summary of what the query does:
EmailUrlInfo table.EmailEvents table using the NetworkMessageId field to combine related information from both tables.AuthenticationDetails field into a JSON object for easier access.forms.microsoft.com.In essence, this query helps identify potentially malicious emails that are using Microsoft Forms and have failed all standard email authentication checks, indicating they might be part of a phishing campaign.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators