Suspicious sign-in attempts from QR code phishing campaigns

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This detection approach correlates a user accessing an email with image/document attachments and a risky sign-in attempt from non-trusted devices.

Attribute Value
Type Hunting Query
Solution Microsoft Defender XDR
ID 3131d0ba-32c9-483e-a25c-82e26a07e116
Tactics InitialAccess
Techniques T1566
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AADSignInEventsBeta ? ?
CloudAppEvents ActionType == "MailItemsAccessed" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Microsoft Defender XDR