← Back to SOC feed Coverage →

Bazacall Emails

kql MEDIUM Azure-Sentinel
EmailEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-25T09:00:00Z · Confidence: medium

Hunt Hypothesis

Bazacall emails are used by adversaries to trick users into calling a malicious phone number to cancel a fake subscription, bypassing traditional email security controls. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential financial fraud and data exfiltration attempts.

KQL Query

EmailEvents
| where Subject matches regex @"[A-Z]{1,3}\d{9,15}"
    and Subject has_any('trial', 'free', 'demo', 'membership', 'premium', 'gold', 'notification', 'notice', 'claim', 'order', 'license', 'licenses')

Analytic Rule Definition

id: 54f12c74-fb8e-4871-a13f-4da835b319a7
name: Bazacall Emails
description: |
  Bazacall malware uses emails that contain a phone number for the user to call in order to cancel a fake subscription. These emails contain no links or attachments, and use automatic payment lures to trick users into contacting the number included in the email.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - EmailEvents
tactics:
- Initial access
query: |
  EmailEvents
  | where Subject matches regex @"[A-Z]{1,3}\d{9,15}"
      and Subject has_any('trial', 'free', 'demo', 'membership', 'premium', 'gold', 'notification', 'notice', 'claim', 'order', 'license', 'licenses')

Required Data Sources

Sentinel TableNotes
EmailEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/Bazacall/Bazacall Emails.yaml