Skip to content
Threat Feed

January 2024 (30)

high advisory

Suspicious Process Accessing Sensitive Identity Files via Auditd

This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.

Elastic Agent Auditd Manager +4 credential-access linux auditd
3r 2t
high advisory

Suspicious Process Execution from Unusual File Paths

Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.

Splunk Enterprise +2 defense-evasion persistence windows
2r 2t
high advisory

Suspicious Process Terminating LSASS Process

Detection of a process attempting to terminate the Lsass.exe process, indicating a potential attempt to perform credential dumping, privilege escalation, or evasion of security policies.

Splunk Enterprise +2 lsass process-termination windows
2r
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Adversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.

Windows attack.execution attack.t1059
2r 1t
medium advisory

Suspicious Script Object Execution via scrobj.dll

Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.

Elastic Defend +3 defense-evasion execution windows
2r 2t
medium advisory

Suspicious SMB Connections via LOLBin or Untrusted Process

This rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.

Elastic Defend lateral-movement smb windows
3r 1t
low threat

Suspicious SMTP Activity on Port 26/TCP

This rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.

BadPatch command-and-control exfiltration network-traffic
2r 3t
medium advisory

Suspicious SolarWinds Child Process Execution

Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.

Elastic Defend +3 supply-chain execution solarwinds
2r 2t
high advisory

Suspicious SUID Binary Execution on Linux

This rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.

privilege-escalation suid linux
3r 2t
low advisory

Suspicious Use of sc.exe for Remote Service Manipulation

The rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.

Elastic Defend lateral-movement windows sc.exe
3r 3t
low advisory

Suspicious Whoami Process Activity

This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.

Microsoft Monitoring Agent +1 discovery windows threat-detection
2r 2t
high threat

Suspicious WMIC Application Uninstallation

This analytic identifies the use of the WMIC command-line tool to uninstall applications non-interactively, a technique used to evade detection by removing security software, as observed in IcedID campaigns.

Splunk Enterprise +2 IcedID defense-evasion application-uninstall wmic
2r
critical advisory

Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)

A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.

HG3 2.0 300003070 command-injection router tenda
2r 1t 1c
critical advisory

Thymeleaf Server-Side Template Injection Vulnerability

A server-side template injection vulnerability exists in Thymeleaf versions up to 3.1.4.RELEASE due to improper neutralization of specific constructs, allowing the execution of potentially dangerous expressions in sandboxed contexts if unsanitized variables are passed to the template engine.

thymeleaf +2 ssti template-injection cve-2026-41901
2r 1t
critical advisory

Totolink A8000RU OS Command Injection Vulnerability

A remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.

A8000RU 7.1cu.643_b20200521 command-injection rce totolink
2r 1t 1c
high advisory

Traccar GPS Tracking System 6.11.1 Cross-Site WebSocket Hijacking

Traccar GPS Tracking System 6.11.1 is vulnerable to Cross-Site WebSocket Hijacking (CSWSH), enabling attackers to steal sensitive GPS data by exploiting a lack of origin validation.

Traccar GPS Tracking System <= 6.11.1 cswsh websocket gps infostealer
2r 1t 1c
medium advisory

UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer

This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.

Microsoft Defender XDR +2 uac-bypass privilege-escalation com ieinstal
2r 3t
high advisory

Unauthorized Access to Chrome Local State File

Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.

Chrome +3 credential-access password-stealing
2r 1t
medium advisory

Unauthorized Conditional Access Policy Creation in Azure AD

An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.

Azure Active Directory azure conditional-access privilege-escalation attack.privilege-escalation attack.t1548
2r 1t
medium advisory

Unauthorized Guest User Invitation Attempt in Azure

Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.

Azure privilege-escalation initial-access persistence stealth
2r 1t
medium advisory

Uncommon Registry Persistence Change Detection

This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.

Windows persistence registry
2r 2t
high advisory

Unexpected Linux Auditd Daemon Shutdown

This analytic detects unexpected shutdowns of the Linux auditd daemon, potentially indicating attempts to disable security monitoring and evade detection by attackers.

Splunk Enterprise +3 auditd linux defense-evasion endpoint
3r 1t
high advisory

Unsecured Outlook Credentials Access in Windows Registry

An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.

Outlook credential-access windows
2r 1t
medium advisory

Unused Privileged Identity Management (PIM) Roles in Azure

Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.

Azure pim privileged-identity-management role-based-access-control initial-access privilege-escalation
2r 1t
medium advisory

Unusual Parent Process for cmd.exe

The detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.

Elastic Defend +2 execution windows cmd.exe
2r 1t
low advisory

Unusual Persistence via Services Registry Modification

Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.

Microsoft Defender XDR +2 persistence windows registry modification
2r 3t
medium advisory

Unusual Process Connecting to Docker or Containerd Socket

An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.

Auditbeat +4 container privilege-escalation lateral-movement linux
2r 3t
low advisory

Unusual Scheduled Task Update

This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.

Windows persistence scheduled-task
2r 1t
low advisory

Unusual System Utilities Initiating Network Connections

Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 3t
low advisory

Unusual Windows Processes Connecting to Domains Using Free SSL Certificates

This rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.

MicrosoftEdge command-and-control encrypted-channel freessl
2r 1t 4i