← Back to SOC feed Coverage →

Teams message ZAPed with the same URL in Email

kql MEDIUM Azure-Sentinel
T1566
EmailEventsEmailUrlInfo
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use ZAPed Teams messages with identical URLs in emails to exfiltrate data or deliver malicious payloads. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential phishing or data exfiltration attempts leveraging Teams messaging channels.

KQL Query

//This query provides insights on Teams messages ZAPed with the same malicious URLs in Email messages
MessagePostDeliveryEvents
| join MessageUrlInfo on TeamsMessageId
| join EmailUrlInfo on Url
| join EmailEvents on NetworkMessageId

Analytic Rule Definition

id: 5a34a9c3-041b-46bf-b035-bb17e7ff0be6
name: Teams message ZAPed with the same URL in Email
description: |
  This query helps hunt for Teams messages that have been ZAPed with the same URL in Email.
description-detailed: |
  This query helps hunt for Teams messages that have been ZAPed with the same URL in Email, using Microsoft Defender for Office 365 and Advance hunting in Microsoft Defender XDR
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - MessagePostDeliveryEvents
  - MessageUrlInfo
  - EmailUrlInfo
  - EmailEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  //This query provides insights on Teams messages ZAPed with the same malicious URLs in Email messages
  MessagePostDeliveryEvents
  | join MessageUrlInfo on TeamsMessageId
  | join EmailUrlInfo on Url
  | join EmailEvents on NetworkMessageId
version: 1.0.0

Required Data Sources

Sentinel TableNotes
EmailEventsEnsure this data connector is enabled
EmailUrlInfoEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Teams message ZAPed with the same URL in Email.yaml