<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sangria Tempest — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/sangria-tempest/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/sangria-tempest/feed.xml" rel="self" type="application/rss+xml"/><item><title>Non-Chrome Process Accessing Chrome Default Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chrome-default-dir-access/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chrome-default-dir-access/</guid><description>Detection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.</description><content:encoded><![CDATA[<p>This alert detects non-Chrome processes accessing the Chrome user data directory, a common tactic used by malware and threat actors to steal sensitive information. This activity is detected using Windows Security Event logs, specifically event ID 4663. The Chrome default folder contains sensitive user data, including login credentials, browsing history, and cookies. This makes it a prime target for attackers aiming to harvest credentials or gain access to user accounts. The detection is designed to identify unauthorized access attempts by processes not typically associated with Chrome. This behavior is often linked to Remote Access Trojans (RATs), trojans, and advanced persistent threats (APTs) like FIN7, known for their focus on financial theft and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Malware gains initial access to the system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The malware establishes persistence on the system.</li>
<li>The malware identifies the location of the Chrome user data directory.</li>
<li>The malware attempts to access files within the Chrome user data directory, triggering Windows Security Event 4663.</li>
<li>The malware copies or exfiltrates sensitive data from the Chrome directory, such as login credentials and cookies.</li>
<li>The malware may use stolen credentials to access other systems or services.</li>
<li>The attacker uses compromised accounts to perform unauthorized actions or move laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can result in the theft of sensitive user data, including login credentials, browsing history, and cookies. This data can be used to compromise user accounts, steal financial information, or gain unauthorized access to other systems and services. Multiple analytic stories relate this behavior to credential stealers, RATs, and APTs. Victims may experience financial losses, identity theft, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both success and failure events as described in the &ldquo;how_to_implement&rdquo; section to ensure Event ID 4663 is captured.</li>
<li>Deploy the Sigma rule <code>Non Chrome Process Accessing Chrome Default Dir</code> to your SIEM to detect unauthorized access attempts to Chrome user data directories.</li>
<li>Investigate any alerts generated by this rule, focusing on the <code>ProcessName</code> and <code>ObjectName</code> to understand the context of the access as noted in the search query.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-access</category><category>threat-type</category><category>windows</category></item></channel></rss>