<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Snake Keylogger — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/snake-keylogger/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/snake-keylogger/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Process Accessing Browser Password Store</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</guid><description>Detection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to browser password stores, a technique commonly employed by credential-stealing malware such as Snake Keylogger. These attackers aim to exfiltrate sensitive information, including stored credentials and browsing history, by accessing browser user data profiles. This activity is detected by monitoring Windows Security Event logs (EventCode 4663) and comparing process access patterns against an expected list of browser applications via the <code>browser_app_list</code> lookup table. The detection identifies processes that are not recognized as legitimate browser applications but are attempting to access browser user data. This technique has been observed in trojan stealers, where credential access is a key component of their information-gathering strategy. This method allows defenders to quickly pivot and discover potentially malicious processes on the system, such as credential stealers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads and executes a malicious file, often disguised as a legitimate application or document.</li>
<li>The malicious file executes, dropping a stealer component into the system.</li>
<li>The stealer process initiates an attempt to access browser user data profiles.</li>
<li>Windows generates a Security Event Log (EventCode 4663) when the stealer attempts to access a browser data file.</li>
<li>The detection analytic identifies processes accessing the browser data folder not present in the <code>browser_app_list</code> lookup file.</li>
<li>The stealer process reads sensitive information, such as usernames, passwords, and browsing history, from the accessed files.</li>
<li>The collected data is staged for exfiltration, potentially compressed or encrypted.</li>
<li>The stolen credentials and information are exfiltrated to a command-and-control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of user credentials, potentially granting attackers unauthorized access to sensitive accounts and systems. This can result in data breaches, financial loss, and reputational damage. The Snake Keylogger, for example, is known to target credentials, potentially impacting a wide range of users and organizations. Other stealers like Meduza Stealer, 0bj3ctivity Stealer, and BlankGrabber Stealer also utilize similar techniques, showing the widespread impact. The impact spans across various sectors, as credential theft is a generic attack applicable to almost any environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logging, specifically event code 4663, with auditing enabled for both success and failure events, to capture object access attempts (reference: search description).</li>
<li>Populate and maintain the <code>browser_app_list</code> lookup table with known and allowed browser processes and their associated paths (reference: search description).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect anomalous processes accessing browser password stores, and tune it for your specific environment (reference: rules).</li>
<li>Investigate any alerts generated by the Sigma rule to identify potentially compromised systems and user accounts (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-access</category><category>stealer</category><category>windows</category></item></channel></rss>