January 2024 (30)
i18next-http-middleware HTTP Response Splitting and DoS Vulnerability
2 rules 1 TTPi18next-http-middleware versions before 3.9.3 are vulnerable to HTTP response splitting and denial-of-service attacks due to unsanitized Content-Language headers, potentially leading to session fixation, cache poisoning, reflected XSS, or complete service disruption depending on the Node.js version.
Incoming Execution via WinRM Remote Shell
2 rules 1 TTPThis rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell
2 rules 2 TTPsAttackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.
IOBit Unlocker Extension DLL Registration via Regsvr32
2 rules 1 TTPThe IOBit Unlocker Extension DLL is being registered via regsvr32.exe, a Windows utility used to unlock files or folders by terminating locking processes, which could be abused for malicious purposes.
JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability
2 rules 1 TTP 1 CVEA server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.
Jupyter Server CORS Origin Validation Bypass via Regex
2 rules 1 TTPJupyter Server versions 2.17.0 and earlier are vulnerable to a CORS origin validation bypass due to improper use of `re.match()` in validating the Origin header against the `allow_origin_pat` configuration, allowing attackers to bypass CORS restrictions.
Kata Containers CopyFile Policy Subversion via Symlinks
3 rules 2 TTPs 1 CVEAn oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.
Katalyst Koi Session Cookies Replayable After Logout
2 rules 1 TTPKatalyst Koi versions before 4.20.0 and between 5.0.0 and 5.6.0 fail to invalidate admin session cookies upon logout, allowing attackers with a valid cookie to maintain unauthorized access.
Keras Model Loader Vulnerable to Denial-of-Service via Malicious HDF5 Shape Bombs
2 rules 1 TTP 1 CVE 1 IOCKeras model loader is vulnerable to denial-of-service by loading specially crafted .keras files containing HDF5-based weight files with maliciously oversized dataset metadata, leading to immediate memory exhaustion during model loading.
Kirby CMS Missing Authorization Vulnerability
3 rules 1 TTPKirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.
Kubernetes and Cloud Credential Path Access via Process Arguments
2 rules 2 TTPsThis rule detects Linux process executions that access sensitive Kubernetes, cloud, and SSH credential files via common utilities, potentially indicating credential theft.
Kubernetes Pod Exec Cloud Instance Metadata Access
2 rules 2 TTPsDetection of Kubernetes pod exec sessions accessing cloud instance metadata endpoints, indicating potential credential theft from AWS, GCP, or Azure.
Kubernetes Pod Exec Potential Reverse Shell Activity Detected
3 rules 2 TTPsThis rule flags potential reverse shell activity via kubectl exec commands in Kubernetes pods by detecting specific shell and socket idioms within URL-decoded command payloads in Kubernetes audit logs, indicating post-exploitation interactive access and command-and-control.
Kubernetes Rapid Secret GET Activity Against Multiple Objects
2 rules 1 TTPDetects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.
Kubernetes Secret Access with Suspicious User Agent
2 rules 1 TTPDetects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.
LatePoint WordPress Plugin Stored XSS Vulnerability
2 rules 1 CVEThe LatePoint WordPress plugin is vulnerable to stored XSS via the booking_form_page_url parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that execute when a user accesses the injected page.
Linux Auditd Daemon Abort Detection
2 rules 1 TTPDetection of abnormal Linux audit daemon (auditd) termination via DAEMON_ABORT events, indicating potential auditing subsystem failure due to resource exhaustion, corruption, or malicious interference.
Linux Defense Impairment via Process Termination
2 rulesDetection of 'pkill' command execution on Linux systems, a technique used by threat actors to disable security defenses or terminate critical processes, potentially leading to data corruption or destruction.
Linux Iptables Firewall Modification Detection
2 rules 1 TTPThis brief details a Splunk search that identifies suspicious command-line activity modifying iptables firewall settings on Linux systems, potentially indicating Cyclops Blink malware activity allowing C2 communication by opening specific TCP ports.
Linux Kernel proc_readdir_de() Use-After-Free Local Privilege Escalation
2 rules 1 TTP 1 CVEA local privilege escalation vulnerability exists in the Linux Kernel versions ~3.14+ through 6.18-rc5 due to a use-after-free in the proc_readdir_de() function, where a concurrent traversal can dereference a freed entry's fields during network device unregistration, leading to privilege escalation via modprobe_path overwrite.
liquidjs Denial of Service via Circular Block Reference
2 rules 1 TTPA vulnerability in liquidjs versions prior to 10.25.7 allows for denial of service due to a circular block reference in the layout, causing an infinite recursive loop that exhausts memory and crashes the Node.js process.
LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints
2 rules 1 TTPAuthenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.
LOLBIN Network Connection for Defense Evasion
2 rules 1 TTPAdversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
LSA PPL Protection Setting Modification via CommandLine
2 rules 1 TTPAttackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.
macOS Kernel-to-Userland Process Creation Notification via undocumented kev_msg_post
2 rulesThe kev_msg_post function can be abused by malware to broadcast process creation notifications from a kernel extension (kext) to a user-mode application, potentially bypassing security tools that rely on standard APIs and leading to undetected malicious activity.
macOS Local Privilege Escalation via Dylib Hijacking in App Store Applications
3 rules 2 TTPsA local privilege escalation vulnerability in macOS allows attackers to gain root privileges by hijacking dylibs in applications installed from the Mac App Store.
macOS Mojave System Lockup via vmmap Utility Targeting PID 1
2 rulesA bug in macOS Mojave causes a system lockup when the vmmap utility is executed against process ID 1 (launchd), due to a deadlock triggered by XPC calls during symbolication.
macOS QuickLook Thumbnail Cache Leak
2 rules 1 TTPmacOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.
Malicious Use of Microsoft Intune Device Management Configuration Policies
2 rules 3 TTPsAttackers can abuse Microsoft Intune device management configuration policies, typically used for legitimate remote device management, to disable defenses and evade detection on managed devices.