Skip to content
Threat Feed

January 2024 (30)

medium advisory

Suspicious SUID Binary Execution Sequence on Linux

This rule detects suspicious sequences where a non-root user launches a high-risk parent process and then executes a common privilege elevation helper gaining an effective UID of 0 while the real UID remains non-root, potentially indicating misuse of SUID/SGID helpers or privilege escalation attempts.

auditbeat-* +1 privilege-escalation linux suid
2r 2t
high advisory

Potential Execution via FileFix Phishing Attack

Detects potential execution of Windows commands or downloaded files via the browser's dialog box, where adversaries may use phishing to instruct victims to copy and paste malicious commands for execution.

Elastic Defend +2 phishing execution filefix clickfix windows
2r 1t
high advisory

Azure Identity Protection Atypical Travel Anomaly

The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.

Azure Active Directory +1 azure identity-protection atypical-travel account-compromise credential-theft
2r 1t
medium advisory

Persistence via PowerShell Profile Modification

Attackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.

Microsoft Defender XDR +2 persistence powershell windows
2r 2t
critical advisory

OpenLearnX Remote Code Execution via Python Sandbox Escape

A critical RCE vulnerability in OpenLearnX allows for sandbox escape and arbitrary command execution in versions prior to 2.0.3.

openlearnx rce sandbox escape code injection
2r 1t
high advisory

PowerShell PSReflect Script Detection

This rule detects PowerShell script block content containing PSReflect-style helper indicators, such as Add-Win32Type, New-InMemoryModule, or DllImport patterns, that may support dynamic Win32 API invocation from PowerShell.

powershell psreflect windows execution
2r 1t
medium advisory

Account Password Reset Remotely

The rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.

Windows persistence impact
2r 2t
high advisory

Azure AD Account Created and Deleted Within a Close Time Frame

Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.

Azure Active Directory privilege-escalation persistence initial-access stealth account-manipulation
2r 3t
high advisory

Azure AD Privileged Role Assignment

Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.

Azure Active Directory azure privileged-access role-assignment
2r 2t
medium advisory

Azure AD Failed Authentication Increase

Detects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.

Azure Active Directory azuread brute-force credential-stuffing authentication
2r 1t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
high advisory

Suspicious CSC.exe Parent Process

The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.

Windows attack.execution attack.defense-evasion csc.exe payload-delivery
3r 3t
low advisory

Unusual Host Name for Windows Privileged Operations Detected via ML

A machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.

privileged-access-detection anomaly-detection windows
2r 2t
low advisory

Unusual Privilege Type Assigned to User via Machine Learning Anomaly

A machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.

privileged-access privilege-escalation windows
2r 4t
low advisory

Unusual Source IP for Windows Privileged Operations Detected via ML

A machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.

privileged-access-detection machine-learning windows
2r 2t
medium advisory

AWS Root Account Usage Detected

The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.

AWS CloudTrail cloud aws privilege-escalation initial-access persistence stealth
3r 3t
high advisory

Detection of Suspicious Inbox Manipulation Rules in Azure

This brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.

Azure attack.stealth attack.t1140
2r 2t
high threat

Suspicious Script Execution from Temporary Directory

This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.

exploited Windows execution script temp
2r 1t
medium advisory

AWS S3 Bucket Deletion Detected via CloudTrail

An AWS S3 bucket deletion event was detected via CloudTrail logs, potentially indicating data loss or unauthorized access attempts.

S3 cloud aws data_loss
3r 1t
medium advisory

Linux Sensitive File Compression for Credential Access

Attackers may use compression utilities like zip, tar, and gzip on Linux systems to collect and archive sensitive files containing credentials and system configurations for credential access and data exfiltration.

Elastic Defend +2 credential-access collection linux
2r 3t
medium advisory

SMB (Windows File Sharing) Activity to the Internet

This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.

initial-access exfiltration network
2r 2t
low advisory

First Time Seen Removable Device Registry Modification

Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.

Elastic Defend +2 initial-access exfiltration windows registry usb
2r 2t
medium advisory

MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)

MikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.

RouterOS cve out-of-bounds read
2r 1t 1c
low advisory

Windows Delayed Execution via Ping Followed by Malicious Utilities

Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.

Windows execution defense-evasion ping lolbas
2r 14t
medium advisory

Windows Registry Modification to Disable Run Application

The following analytic detects modification of the Windows registry to disable the Run application in the Start menu by monitoring changes to the registry path '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun' with a value of '0x00000001', potentially hindering system cleaning and aiding malware persistence.

Splunk Enterprise +2 defense-evasion registry-modification windows
2r 1t
low advisory

Windows Scheduled Task Creation for Persistence

Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.

OneDrive +5 persistence scheduled-task windows
3r 1t
high advisory

Windows Taskkill Used for Defense Evasion

The analytic identifies the use of taskkill.exe to forcibly terminate processes, focusing on command-line executions that include specific taskkill parameters, which can indicate attempts to disable security tools or disrupt legitimate applications.

Splunk Enterprise +2 defense-evasion endpoint taskkill
3r
medium advisory

Windows Temporarily Scheduled Task Creation and Deletion

Detection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.

Windows persistence execution
2r 2t
high advisory

WScript or CScript Dropper

The WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.

Windows script-dropper file-creation
2r 2t
high advisory

YAFNET Stored XSS Vulnerability in Forum Posts

A stored XSS vulnerability in YAFNET.Core allows an attacker to inject arbitrary JavaScript into forum posts, which executes in the browsers of other users viewing the thread, potentially leading to account compromise and malware delivery.

YAFNET.Core +1 xss stored-xss web-application yafnet
2r 4t