Skip to content
Threat Feed

January 2024 (30)

medium advisory

Apple's App Translocation Security Mechanism

Apple's App Translocation in macOS v10.12 mitigates Gatekeeper bypasses (CVE-2015-3715, CVE-2015-7024) by creating a read-only DMG, impacting applications accessing external resources.

ictool app-translocation gatekeeper macos security-mitigation
2r 2c
high advisory

Azure AD Sign-in from New Country/Region

Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.

Entra ID attack.stealth attack.t1078 attack.persistence attack.privilege-escalation attack.initial-access
2r 1t
high advisory

Azure AD Sign-In with Unfamiliar Properties

This alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.

Azure Active Directory azure identity_protection sign-in account_compromise risk_detection
2r 4t
high advisory

changedetection.io XXE Vulnerability

A vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.

changedetection.io XXE vulnerability
2r 1t
high advisory

CI4MS Authenticated Remote Code Execution via Theme Upload

CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.

ci4-cms-erp/ci4ms code-execution web-application php
2r 2t
critical advisory

CVE-2022-2068 c_rehash Command Injection Vulnerability

CVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.

cve-2022-2068 command-injection c_rehash certificate-management
2r 1t 1c
low advisory

Detection of New GitHub Actions Secrets Creation

This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.

GitHub Actions github persistence privilege-escalation initial-access
3r 3t
medium advisory

Expired or Revoked Driver Loaded

An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.

Elastic Defend privilege-escalation defense-evasion windows
2r 3t
high advisory

gix-fs Symlink Prefix-Reuse Worktree Escape

A vulnerability in rust's gix-fs library (<= 0.21.0) allows a malicious actor to construct a tree that, when checked out with gitoxide, permits writing an attacker-controlled symlink into any existing directory the user has write access to, potentially leading to code execution.

gix-fs symlink worktree-escape gitoxide code-execution
3r 2t
low advisory

MsXsl.exe Network Connection for Defense Evasion

Msxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.

Elastic Defend +1 defense-evasion command-and-control windows msxsl
2r 2t
medium advisory

Azure AD Authentication from Unexpected Geo-locations

Detection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.

Azure Active Directory azuread authentication geo-location unauthorized-access credential-compromise privilege-escalation
2r 1t
high advisory

Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability

A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.

EEMS Enterprise Power Operation and Maintenance Cloud Platform sql-injection web-application vulnerability
2r 1t 1c
medium advisory

Admidio SAML Assertion Consumer Service (ACS) URL Validation Bypass

Admidio's SAML IdP implementation in its SSO module is vulnerable to sending SAML responses to unvalidated Assertion Consumer Service URLs, allowing an attacker to craft a SAML AuthnRequest with an arbitrary AssertionConsumerServiceURL, causing the IdP to send the signed SAML response, containing user identity attributes, to an attacker-controlled URL, enabling impersonation of the victim user on the legitimate SP by replaying the SAML assertion.

admidio saml sso acs-bypass cve-2026-41670
2r 2t 2i
high advisory

AWS Identity API Access from Rare ASN Organizations

This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.

aws cloudtrail initial-access credential-access
2r 1t
high threat

Firefox 0-day Drops OSX.Mokes.B Backdoor on macOS

A Firefox 0-day exploit was used to target Mac users, dropping a second backdoor identified as a new variant of the cross-platform Mokes malware (OSX.Mokes.B) with screen capture, audio capture, and document exfiltration capabilities.

exploited Firefox +2 malware backdoor osx.mokes macos
2r 5t 1i
high advisory

gix and gitoxide Submodule Path Traversal Vulnerability

A path traversal vulnerability exists in gix and gitoxide where unvalidated submodule names from `.gitmodules` can be used to escape the `.git/modules` directory, potentially leading to repository confusion by redirecting submodule state inspection and open operations to attacker-controlled paths.

gix +1 path-traversal git repository-confusion supply-chain
2r 1t
medium advisory

Kubernetes Cluster Enumeration via Audit Logs

Attackers attempt to enumerate and discover sensitive information within a Kubernetes cluster by leveraging common shells, utilities, and specialized tools, as reflected in audit logs.

kubernetes enumeration cloud
3r 2t
critical advisory

macOS Privilege Escalation via Feedback Assistant Race Condition (CVE-2019-8565)

A race condition vulnerability (CVE-2019-8565) exists in macOS where a privileged XPC service, com.apple.appleseed.fbahelperd, improperly validates XPC messages based on process ID, allowing an unprivileged process to escalate privileges to root.

macOS +1 privilege-escalation xpc race-condition
2r 1t 1c
medium advisory

Multiple Logon Failure from the Same Source Address

Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.

Windows credential-access brute-force password-spraying
2r 2t
medium advisory

Okta Policy Rule Modification or Deletion

An Okta policy rule was modified or deleted, potentially weakening security controls.

okta identity policy attack.impact
2r 1t
medium advisory

Program Files Directory Masquerading

Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.

Elastic Defend +2 defense-evasion masquerading windows
2r 1t
high advisory

rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability

The rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.

openssl aes keywrap oob-write memory-corruption
2r
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
medium advisory

Suspicious Registry Modifications by Scripting Engines

The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.

Windows defense-evasion persistence execution registry-modification
2r 3t
medium advisory

VaultCmd Usage for Listing Windows Credentials

Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.

Microsoft Defender XDR +1 credential-access windows vaultcmd
2r 2t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
medium advisory

Potential Abuse of Certreq for File Transfer via HTTP POST

Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.

Microsoft Defender XDR +2 lolbin command-and-control exfiltration certreq
2r 4t
critical advisory

vm2 NodeVM Nesting Bypass Allows Arbitrary Command Execution

A vulnerability in vm2's NodeVM, when nesting is enabled, allows sandbox code to bypass require restrictions, enabling arbitrary OS command execution on the host.

vm2 sandbox-escape code-execution
2r 2t
medium advisory

Windows Registry Classes Autorun Keys Modification for Persistence

Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.

Windows attack.privilege-escalation attack.persistence attack.t1547.001
3r 1t