← Back to SOC feed Coverage →

referral-phish-emails

kql MEDIUM Azure-Sentinel
T1566
EmailEventsEmailUrlInfo
credential-thefthuntingmicrosoftofficialphishing
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-18T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use referral-based phishing emails to trick users into revealing credentials by mimicking trusted internal sources. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate credential phishing attempts that leverage social engineering and internal trust.

KQL Query

let EmailAddresses = pack_array
('zreffertalt.com.com','zreffesral.com.com','kzreffertal.com.com',
'wzreffertal.com.com','refferal.comq','refferal.net','zreffertal.com.com',
'zrefferal.com.com','refferasl.com.com','zreffesral.com','zrefsfertal.com.com',
'irefferal.com','refferasl.co','zrefferal.com');
EmailEvents
| where SenderMailFromDomain in (EmailAddresses)
| extend RecipientDomain = extract("[^@]+$", 0, RecipientEmailAddress)
| where SenderFromDomain == RecipientDomain
| join EmailUrlInfo on $left.NetworkMessageId == $right.NetworkMessageId

Analytic Rule Definition

id: cdc4da1c-64a1-4941-be59-1f5cc85481ab
name: referral-phish-emails
description: |
  Hunting for credential phishing using the "Referral" infrastructure using Defender for Office 365 data
description-detailed: |
  The "Referral" infrastructure is a point-in-time set of infrastructure associated with spoofed emails that imitate SharePoint and other legitimate products to conduct credential phishing. The operator is also known to use legitimate URL infrastructure such as Google, Microsoft, and Digital Ocean to host their phishing pages.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - EmailEvents
  - EmailUrlInfo
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  let EmailAddresses = pack_array
  ('zreffertalt.com.com','zreffesral.com.com','kzreffertal.com.com',
  'wzreffertal.com.com','refferal.comq','refferal.net','zreffertal.com.com',
  'zrefferal.com.com','refferasl.com.com','zreffesral.com','zrefsfertal.com.com',
  'irefferal.com','refferasl.co','zrefferal.com');
  EmailEvents
  | where SenderMailFromDomain in (EmailAddresses)
  | extend RecipientDomain = extract("[^@]+$", 0, RecipientEmailAddress)
  | where SenderFromDomain == RecipientDomain
  | join EmailUrlInfo on $left.NetworkMessageId == $right.NetworkMessageId
version: 1.0.0

Required Data Sources

Sentinel TableNotes
EmailEventsEnsure this data connector is enabled
EmailUrlInfoEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Spoof and Impersonation/Referral phish emails.yaml