April 2024 (6)
Bitbucket Project Secret Scanning Allowlist Added
2 rulesAn adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.
Bitbucket Repository Exempted from Secret Scanning
2 rules 1 TTPAn attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.
ConnectWise ScreenConnect Path Traversal Vulnerability (CVE-2024-1708)
2 rules 1 TTP 1 CVECVE-2024-1708 is a path traversal vulnerability in ConnectWise ScreenConnect that could allow an attacker to execute remote code or directly impact confidential data and critical systems.
GitHub Push Protection Bypass Detection
2 rulesDetection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.
JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)
2 rules 1 TTP 1 CVEA relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.
Potential Abuse of AWS Console GetSigninToken
2 rules 2 TTPsAdversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.
February 2024 (2)
Okta Password Entered in AlternateID Field
2 rules 1 TTPOkta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.
Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)
2 rules 1 TTP 1 CVEThe Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
January 2024 (21)
Azure Firewall Rule Collection Modification or Deletion
2 rules 2 TTPsAn attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.
Azure Identity Protection Suspicious Browser Activity
2 rules 6 TTPsA suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.
Network-Level Authentication (NLA) Disabled via Registry Modification
2 rules 2 TTPsAdversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.
Suspicious Child Processes from Communication Applications
3 rules 3 TTPsThe detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.
Potential Enumeration via Active Directory Web Service
2 rules 3 TTPsAdversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.
Expired or Revoked Driver Loaded
2 rules 3 TTPsAn expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.
gix-fs Symlink Prefix-Reuse Worktree Escape
3 rules 2 TTPsA vulnerability in rust's gix-fs library (<= 0.21.0) allows a malicious actor to construct a tree that, when checked out with gitoxide, permits writing an attacker-controlled symlink into any existing directory the user has write access to, potentially leading to code execution.
Grav File Cache Insecure Deserialization Vulnerability
2 rules 2 TTPsGrav versions 1.7.44 through 1.7.49.5 are vulnerable to insecure deserialization in the File Cache component, where the `unserialize` function with `allowed_classes => true` can lead to arbitrary code execution if an attacker tampers with cache files.
Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)
2 rules 1 TTP 1 CVEKentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.
Netsh Helper DLL Persistence
2 rules 2 TTPsAttackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.
PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load
2 rules 2 TTPsPhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.
Potential Account Takeover via Mixed Logon Types
2 rules 1 TTPA Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.
PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)
2 rules 1 TTP 1 CVEPrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.
Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation
2 rules 1 TTPA vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.
Service Reconnaissance via WMIC.exe
2 rules 1 TTPAdversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.
Spike in Number of RDP Connections from a Single Source IP
2 rules 2 TTPsA machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.
Suspicious Windows Process Cluster from Parent Process via Machine Learning
2 rules 2 TTPsA machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.
System File Ownership Change for Defense Evasion
3 rules 1 TTPAdversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.
TYPO3 CMS 14.2.0 Stores Passwords in Cleartext
1 rule 1 TTPTYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.
Windows Console History Clearing
2 rules 2 TTPsAdversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.
Wireless Credential Dumping via Netsh
2 rules 2 TTPsAdversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.