""ET CURRENT_EVENTS Possible Apple Store Phish Landing 2015-07-30""

SID: 2031715

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Web_Browsers, attack_target Client_Endpoint, created_at 2015_07_30, deployment Perimeter, signature_severity Minor, tag Phishing, updated_at 2017_10_13

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: to_client,established

Contents:

  • Value: "Sign in - Apple Store"

  • Value: "function isemail|28|email|29|"

  • Value: "Double-check that you typed a valid Apple ID."

  • Value: "Double-check that you have typed the right password."

Within:

PCRE:

Special Options:

  • file_data

  • nocase

  • nocase

  • nocase

  • nocase

source