Skip to content
Threat Feed

January 2024 (30)

high advisory

Crowdstrike RTR Script Execution via PowerShell

Detection of PowerShell execution initiated via Crowdstrike Real Time Response (RTR) 'runscript' command, potentially indicating malicious actors leveraging compromised Crowdstrike Dashboard access to execute commands on remote hosts using encoded commands.

Splunk Enterprise +3 living-off-the-land rtr script-execution
2r 1t
medium advisory

Detection of Custom Shim Database Installation for Persistence

Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.

Windows +7 persistence app-compat shim
2r 1t
medium advisory

Disabling Windows Defender Security Settings via PowerShell

Attackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.

Windows Defender defense-evasion powershell windows
2r 2t
critical advisory

Evolver Remote Code Execution via Command Injection in `_extractLLM()`

A command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.

@evomap/evolver command-injection rce evolver
2r 1t
high advisory

GitPython Command Injection Vulnerability

GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.

GitPython command-injection vulnerability
2r 1t
medium advisory

IIS AppCmd Tool Used to Dump Service Account Credentials

Attackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.

IIS credential-access appcmd windows
2r 2t
high advisory

Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function

A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.

kaggle-mcp path-traversal web-application cve
2r 1t 1c
high advisory

Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)

Adversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.

defense-evasion ads rundll32 windows
2r 1t
medium advisory

CoreDNS DoH GET Query Denial-of-Service

CoreDNS is vulnerable to a denial-of-service attack where processing oversized DNS-over-HTTPS GET requests exhausts resources prior to returning an error.

CoreDNS cve dos
2r 1t
high advisory

Detecting Windows Remote Image Loading for Malicious Activities

This analytic detects instances where a process loads a file from a remote share path, potentially indicating execution, defense evasion, or lateral movement by attackers loading code from attacker-controlled infrastructure.

Windows +3 remote-image-load defense-evasion lateral-movement sysmon
2r 5t
high advisory

FlightPHP Sensitive Information Disclosure via Default Error Handler

The default error handler in FlightPHP core writes the full exception message, exception code, and stack trace directly into the HTTP 500 response, disclosing sensitive information such as internal paths, secrets, and application structure.

flightphp/core information-disclosure web-application flightphp
2r 1t
high advisory

GitPython Path Traversal Vulnerability Allows Arbitrary File Manipulation

A path traversal vulnerability in GitPython allows attackers who can supply a crafted reference path to an application using GitPython to write, overwrite, move, or delete files outside the repository’s .git directory via insufficient validation of reference paths in reference creation, rename, and delete operations.

GitPython path-traversal file-manipulation
3r 1t
high advisory

Lemur LDAP Filter Injection Vulnerability

Lemur versions before 1.9.0 are vulnerable to LDAP filter injection, where an authenticated LDAP user can inject LDAP filter metacharacters through the username field to manipulate group membership queries and escalate their privileges to administrator.

Lemur ldap injection privilege-escalation
2r 1t
high advisory

Royal Elementor Addons Plugin SSRF Vulnerability

The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.

Royal Elementor Addons <= 1.7.1057 wordpress ssrf cve-2026-6229 plugin
2r 1t 1c
high advisory

rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)

CVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.

rust-openssl openssl buffer overflow cve-2026-41676
2r 1c
high advisory

Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment

Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.

Struts 2 apache-struts webshell cve-2023-50164 initial-access persistence command-and-control
2r 3t 1c
high advisory

Potential Privilege Escalation in Container via Runc Init

Detection of runc init child processes with root effective user and non-root login user ID, indicating potential container privilege escalation.

Auditd Manager container privilege-escalation linux
2r 1t
low advisory

Suspicious PDF Reader Child Process Activity

Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.

Elastic Defend execution initial-access defense-evasion discovery
2r 13t
medium advisory

Detection of Downloaded URL Files Used in Phishing Campaigns

This detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.

Elastic Defend phishing execution url-file windows
2r 3t
low advisory

GitHub Repository Archive Status Changed

Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.

GitHub repository archive unarchive persistence impact defense-impairment
2r 3t
medium advisory

Abuse of Windows Update Client for DLL Loading

The Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.

Windows Auto Update Client defense-evasion execution lolbas windows
2r 3t
medium advisory

DCOM Lateral Movement via ShellWindows/ShellBrowserWindow

This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.

Windows lateral-movement dcom
2r 2t
medium advisory

Detection of Command and Control Activity via Commonly Abused Web Services

This rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.

OneDrive +7 command-and-control windows threat-detection
2r 2t
medium advisory

GitHub Enterprise Audit Log Streaming Paused

Detection of a user pausing audit log event streaming in GitHub Enterprise, potentially indicating an attempt to evade detection by disabling the audit trail.

GitHub Enterprise +3 github audit-log defense-evasion
2r 2t
medium advisory

Kubernetes Sensitive Role Creation or Modification

Detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.

Kubernetes rbac privilege-escalation persistence
2r 2t
medium advisory

Persistence via Malicious Microsoft Outlook VBA Template

Attackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.

Outlook persistence vba windows
2r 1t
medium advisory

Process Execution from Suspicious Windows Directories

Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.

Windows +2 defense-evasion masquerading
2r 1t
medium advisory

UAC Bypass via DiskCleanup Scheduled Task Hijack

Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.

Defender XDR +1 uac-bypass privilege-escalation windows diskcleanup scheduled-task
2r 3t
medium advisory

Unusual Service Host Child Process - Childless Service

This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.

m365_defender +3 process_injection privilege_escalation defense_evasion windows
2r 2t
medium advisory

Disable Windows Event and Security Logs Using Built-in Tools

Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.

Microsoft Defender XDR +2 defense-evasion windows eventlog
3r 3t