Skip to content
Threat Feed

January 2024 (30)

medium advisory

Potential Abuse of Certreq for File Transfer via HTTP POST

Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.

Microsoft Defender XDR +2 lolbin command-and-control exfiltration certreq
2r 4t
medium advisory

Kerberos Pre-authentication Disabled for User Account

Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.

Active Directory kerberos credential-access as-rep-roasting active-directory windows
3r 4t
medium advisory

Remote File Download via Script Interpreter

Attackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.

Windows Script Host command-and-control execution windows script_interpreter
2r 3t
critical advisory

vm2 NodeVM Nesting Bypass Allows Arbitrary Command Execution

A vulnerability in vm2's NodeVM, when nesting is enabled, allows sandbox code to bypass require restrictions, enabling arbitrary OS command execution on the host.

vm2 sandbox-escape code-execution
2r 2t
medium advisory

Windows Registry Classes Autorun Keys Modification for Persistence

Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.

Windows attack.privilege-escalation attack.persistence attack.t1547.001
3r 1t
medium advisory

Detection of Obfuscated IP Address Usage in Download Commands

This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.

Windows discovery evasion obfuscation
2r 2t
high advisory

AMSI Enable Registry Key Modification for Defense Evasion

Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.

Microsoft Defender XDR +4 defense-evasion amsi registry windows
2r 1t
critical advisory

ToTok iOS Application Used for Government Surveillance

The ToTok iOS application, developed by Breej Holding Ltd., was identified as a spying tool used by the government of the United Arab Emirates (UAE) to track users' conversations, movements, and relationships by collecting sensitive user data and transmitting it to servers using self-signed certificates.

ToTok +1 spyware ios surveillance
2r 2t 2i
low advisory

Microsoft Office 'Office Test' Registry Persistence Abuse

Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.

Microsoft Office +4 persistence registry windows
2r 2t
medium advisory

Kyverno Controller Denial of Service via forEach Mutation Panic

An unchecked type assertion in Kyverno versions v1.13.0 to v1.17.1 allows a user with permission to create a Policy or ClusterPolicy to crash the cluster-wide background controller into a persistent CrashLoopBackOff, leading to a denial of service, by crafting a malicious policy that triggers a nil pointer dereference in the forEach mutation handler.

Kyverno denial-of-service kubernetes policy-engine
2r 2t
medium advisory

Active Directory msPKIAccountCredentials Modification

Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.

Active Directory privilege-escalation credential-roaming active-directory windows
2r 2t
medium advisory

Kaspersky Anti-Virus Reverse Engineering for Document Detection

A blog post details the reverse engineering of the Kaspersky anti-virus engine on macOS to demonstrate the potential for crafting signatures capable of detecting and flagging classified documents, leveraging the product's scanning capabilities and dynamic signature updates, without implying any malicious activity by Kaspersky.

Kaspersky Internet Security anti-virus reverse-engineering signature-analysis macos
2r 1t
medium advisory

Okta Network Zone Deactivation or Deletion

An Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.

Okta Identity Engine okta network-zone impact
2r 1t
high advisory

OSX/CreativeUpdater Cryptominer Distributed via MacUpdate

OSX/CreativeUpdater is a macOS cryptominer distributed through compromised download links on the MacUpdate website, using a trojanized application bundle to execute a script that downloads and installs a persistent Monero miner using launch agents.

Firefox +3 cryptominer macos malware
3r 2t 7i
medium advisory

XSL Script Execution via COM Interface in Microsoft Office

Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.

Microsoft Office +3 xsl-script com-interface office-macro
2r 5t
medium advisory

macOS Mojave Sandbox Distributed Notification Bypass

A vulnerability in macOS Mojave allows sandboxed applications to bypass sandbox restrictions and surreptitiously monitor user activities by registering for distributed notifications by name, circumventing intended privacy protections.

macOS sandbox-escape privacy
2r 1t
critical advisory

macOS Local Privilege Escalation via CVE-2017-7170

CVE-2017-7170 is a local privilege escalation vulnerability in macOS stemming from insecure use of the `AuthorizationExecuteWithPrivileges` API, allowing unprivileged users to execute arbitrary code as root by sniffing authorization references.

macOS privilege-escalation cve-2017-7170
2r 1t 1c
high advisory

Suspicious Alternate Data Stream (ADS) File Creation

Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.

M365 Defender +3 defense-evasion ads file-creation windows
2r 1t
high advisory

Malicious Word Document Targeting macOS Delivers Meterpreter

A malicious Word document targeting macOS users employs macros to download and execute a Meterpreter payload, leveraging a sandbox escape vulnerability and launch agent plist for persistence.

Office for Mac macos word macros meterpreter sandbox escape
2r 4t 2i
medium advisory

LSASS Credential Dumping via Windows Error Reporting (WER) Abuse

Attackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.

Elastic Defend +2 credential-access windows lsass wepw
2r 2t
critical advisory

MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)

CVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.

MindsDB cve vulnerability file-upload
2r 1t 1c
high advisory

Nerdbank.MessagePack DateTime Decoding Stack Overflow Vulnerability

A malicious MessagePack payload can trigger a StackOverflowException in Nerdbank.MessagePack due to an uncontrolled stack allocation when decoding DateTime values with oversized timestamp extension lengths, leading to process termination.

Nerdbank.MessagePack denial-of-service stack-overflow messagepack
2r 1t
high advisory

Potential Kerberos Coercion via DNS-Based SPN Spoofing

Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.

Active Directory kerberos coercion dns spn spoofing credential-access
2r 1t
high advisory

PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access

Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.

PowerShell credential-access kerberos windows
2r 1t
high advisory

Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)

CVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.

cve-2026-24082 use-after-free memory corruption qualcomm
2r 1t 1c
high advisory

S3Browser IAM Policy Creation with Default Bucket Name

An AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.

AWS IAM +1 aws iam s3browser s3 policy cloudtrail
2r 3t
medium advisory

System Shells Launched via Windows Services

Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.

Windows +2 persistence execution privilege_escalation
2r 4t
critical advisory

Vvveb Unrestricted File Upload Leads to Remote Code Execution (CVE-2026-41938)

An unrestricted file upload vulnerability in Vvveb versions before 1.0.8.2 allows authenticated users with media upload permissions to achieve remote code execution by uploading a .htaccess file to execute arbitrary PHP code via a .phtml file.

Vvveb cve-2026-41938 rce file-upload
2r 1t 1c
high advisory

Windows EFI Bootloader File Modification Detection

A process writing to critical EFI bootloader files (bootmgfw.efi or bootx64.efi) within the \EFI\Boot\ directory may indicate a bootkit installation, malicious code persistence at the firmware level, or tampering with the system boot process.

Splunk Enterprise +2 bootkit persistence efi bootloader windows
2r 1t 1c
high advisory

xmldom XML Node Injection via Comment Serialization

The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.

xmldom xml injection deserialization vulnerability
2r 1t