January 2024 (30)
macOS Local Privilege Escalation via Dylib Hijacking in App Store Applications
3 rules 2 TTPsA local privilege escalation vulnerability in macOS allows attackers to gain root privileges by hijacking dylibs in applications installed from the Mac App Store.
macOS Mojave System Lockup via vmmap Utility Targeting PID 1
2 rulesA bug in macOS Mojave causes a system lockup when the vmmap utility is executed against process ID 1 (launchd), due to a deadlock triggered by XPC calls during symbolication.
macOS QuickLook Thumbnail Cache Leak
2 rules 1 TTPmacOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.
Malicious Use of Microsoft Intune Device Management Configuration Policies
2 rules 3 TTPsAttackers can abuse Microsoft Intune device management configuration policies, typically used for legitimate remote device management, to disable defenses and evade detection on managed devices.
mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)
2 rules 1 TTP 1 CVEAn OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.
MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name
2 rules 2 TTPsMCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.
Metasploit Exploitation via Malicious Confluence Plugin
2 rules 3 TTPsA Metasploit module exploits Atlassian Confluence servers by deploying a malicious Java plugin that downloads Meterpreter, granting the attacker full control over the compromised system.
Microsoft 365 Copilot Jailbreak Attempts via Prompt Injection
3 rulesThe detection identifies attempts to jailbreak Microsoft 365 Copilot through prompt injection techniques that attempt to circumvent built-in safety controls by manipulating rules, bypassing system commands, or requesting AI impersonation.
Microsoft 365 Risk-Based Step-Up Consent Disabled
2 rules 1 TTPThe Microsoft 365 'risk-based step-up consent' security setting is disabled by an adversary to allow users to grant consent to malicious applications, potentially leading to unauthorized access and data breaches.
Microsoft 365 Suspicious Email Delivery
2 rules 2 TTPsThis brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.
Microsoft Build Engine Executed After Renaming
2 rules 2 TTPsAttackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.
Microsoft CVE-2017-3736 Vulnerability
2 rulesCVE-2017-3736 is a vulnerability tracked by Microsoft, potentially leading to exploitation of affected systems.
Microsoft Defender Tampering via Registry Modification
2 rules 2 TTPsAdversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.
Microsoft Excel XLM Macro Remote Code Execution on macOS
3 rulesA logic flaw in Microsoft Excel allows remote code execution on macOS via malicious XLM macros in SYLK files, bypassing the 'Disable all macros without notification' setting.
Microsoft IIS Connection String Decryption via aspnet_regiis
3 rules 1 TTPAn attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.
Microsoft Word RTF Heap Overflow Vulnerability (CVE-2023-21716)
2 rules 1 TTP 1 CVECVE-2023-21716 is a critical heap-based buffer overflow vulnerability in Microsoft Word 2016's RTF parser, triggered by a malformed RTF file, leading to remote code execution on Windows 7.
Mimikatz MemSSP Log File Detection
2 rules 1 TTP 1 IOCDetects the creation of 'mimilsa.log', the default log file created by the Mimikatz MemSSP module after injecting a malicious Security Support Provider into LSASS, potentially exposing credentials from subsequent logons on the host.
MindsDB Path Traversal Vulnerability Leading to Remote Code Execution
3 rules 2 TTPs 1 CVEA path traversal vulnerability in MindsDB versions prior to 25.9.1.1 allows an attacker to achieve remote code execution by uploading a malicious payload and triggering its execution.
MiroFish Command Injection Vulnerability (CVE-2026-7058)
2 rules 1 TTP 1 CVEA command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.
MoreConvert Pro WordPress Plugin Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEThe MoreConvert Pro plugin for WordPress versions 1.9.14 and earlier is vulnerable to authentication bypass due to improper handling of guest waitlist verification tokens, allowing unauthenticated attackers to potentially gain administrative access.
MpCmdRun Execution with RemoveDefinitions Argument
2 rulesThe execution of MpCmdRun.exe with the '-RemoveDefinitions' argument, used to remove definitions from the Windows Malware Protection Engine, can indicate potential malware activity or attempts to bypass security measures.
MSBuild Executed by Scripting Host
2 rules 1 TTPDetects the suspicious spawning of MSBuild.exe by Windows Script Host processes (cscript.exe or wscript.exe), a behavior often associated with malware executing malicious MSBuild processes via scripts.
MSBuild Started by System Process for Defense Evasion and Execution
2 rules 2 TTPsAdversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.
Mshta Making Network Connections Indicative of Defense Evasion
2 rules 1 TTPMshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.
MSSQL xp_cmdshell Stored Procedure Abuse for Persistence
2 rules 2 TTPsAttackers may leverage the xp_cmdshell stored procedure in Microsoft SQL Server to execute arbitrary commands for privilege escalation and persistence, often bypassing default security configurations.
MuddyWater PowGoop Beacon Decoding Detection
2 rules 4 TTPsThis detection identifies a DLL decoding and executing the PowGoop config.txt payload, indicating a stage in the MuddyWater infection chain where an obfuscated PowerShell beacon is unwrapped and live C2 communication starts.
Multiple Alerts in Same ATT&CK Tactic by Host
2 rules 4 TTPsThis rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.
Multiple Remote Management Tool Vendors on Same Host
2 rulesThis rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
Mustang Panda USB-Borne Tool Execution
2 rules 3 TTPsThis brief details detection of executables associated with Mustang Panda being launched from non-standard locations, potentially indicating compromise via USB or other removable media.
n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay
2 rules 1 TTPA credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.