January 2024 (30)
ESXi Encryption Settings Modification
2 rulesDetection of modifications to ESXi host encryption settings, such as disabling secure boot or executable verification, which may indicate attempts to weaken hypervisor integrity and allow unauthorized code execution.
ESXi Firewall Disabled Detection
2 rulesThis detection identifies when the ESXi firewall is disabled or set to permissive mode, potentially exposing the host to unauthorized access and network-based attacks, often preceding lateral movement, data exfiltration, or malware installation.
ESXi Syslog Configuration Changes via esxcli
2 rules 1 TTPDetection of ESXi syslog configuration changes via esxcli command, potentially indicating an attempt to disrupt logging and evade detection.
ESXi VIB Acceptance Level Tampering Detection
2 rulesThis detection identifies changes to the VIB (vSphere Installation Bundle) acceptance level on an ESXi host, potentially allowing the installation of unsigned or unverified software and lowering the system's integrity enforcement.
Evomap Evolver Validator RCE via NPM/NPX in Sandbox Allowlist
2 rules 1 TTPThe validator-mode sandbox executor in @evomap/evolver versions 1.70.0-beta.4 and earlier places `npm` and `npx` in its executable allowlist, allowing arbitrary code execution because validator nodes consume unsigned Hub responses without signature checks, leading to remote code execution on every validator node via lifecycle scripts.
Excessive Service Control Start as Disabled
2 rules 1 TTPDetection of an excessive number of `sc.exe` processes launched with the `start= disabled` argument indicating potential attempts to disable critical services and impair system defenses.
Excessive Taskkill Usage for Defense Evasion
2 rules 1 TTPAdversaries use taskkill.exe to disable security tools, and this detection identifies instances where taskkill.exe is executed excessively within a short timeframe, indicative of malicious activity aimed at defense evasion.
Excessive Windows Service Disabling Events
2 rules 1 TTPAn adversary may disable critical Windows services to evade defenses or disrupt system operations, detected by monitoring for an excessive number of service-disabled events on a single host.
Exchange Mailbox Export via PowerShell
2 rules 4 TTPsAdversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.
Executable or Script Creation in Temporary Paths
2 rules 1 TTPAdversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.
Execution from Removable Media with Network Connection
2 rules 1 TTPDetects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.
Execution of a Downloaded Windows Script
3 rules 7 TTPsThis rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.
Execution of SymbolicLink-Testing-Tools Utility for Privilege Escalation
2 rules 2 TTPsThe execution of utilities from the `symboliclink-testing-tools` toolkit is detected, which can be used by attackers to exploit Windows symbolic link vulnerabilities to achieve local privilege escalation from a standard user to SYSTEM.
Execution via Local SxS Shared Module
2 rules 2 TTPsThis rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.
Execution via Windows Subsystem for Linux
2 rules 2 TTPsThis detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.
exiftool-vendored Argument Injection Vulnerability
2 rules 1 TTPexiftool-vendored is vulnerable to argument injection (CVE-2026-43893) via newline characters in tag names, potentially allowing attackers to read or write files accessible to the ExifTool process by injecting arguments through caller-supplied strings.
FacturaScripts Remote Code Execution via Zip Slip Vulnerability
2 rules 2 TTPsFacturaScripts is vulnerable to remote code execution due to insufficient validation of file paths within uploaded ZIP archives, allowing a Zip Slip attack and arbitrary file write leading to RCE.
fast-jwt Authentication Bypass Vulnerability via Empty HMAC Secret
2 rules 2 TTPsA critical vulnerability in the fast-jwt library allows attackers to forge JWTs by exploiting the acceptance of empty HMAC secrets in the async key resolver, leading to authentication bypass.
fast-xml-builder Vulnerability Allows Attribute Injection
2 rules 1 TTPThe fast-xml-builder library allows attribute injection when handling attribute values containing quotes, leading to potential execution of arbitrary code.
FireFighter Unauthenticated SSRF Leads to Potential IAM Credential Theft
2 rules 2 TTPsFireFighter versions before 0.0.54 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `/api/v2/firefighter/raid/jira_bot` endpoint, allowing attackers to potentially steal IAM credentials in cloud environments.
Firewall Allowed Program Enable
3 rulesDetection of firewall rule modification to allow specific application execution, potentially bypassing restrictions and enabling unauthorized network communication.
Firewall Disabled via Netsh Command
2 rules 1 TTPDetection of Windows Firewall being disabled via the `netsh` command, potentially exposing the system to external threats and unauthorized communication.
Firewall Modification for File and Printer Sharing
2 rules 1 TTPThis analytic detects the modification of Windows Firewall settings to enable file and printer sharing, a common technique used by ransomware to facilitate lateral movement and broader network encryption.
First Time Seen Driver Loaded
2 rules 3 TTPsThe rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.
Flax Typhoon Masquerading SoftEther VPN as Legitimate Windows Binaries
2 rules 2 TTPsThe Flax Typhoon group uses SoftEther VPN, masquerading the VPN client as legitimate Windows binaries like conhost.exe and dllhost.exe, to obfuscate their network activity within compromised Taiwanese organizations.
Flight Framework SQL Injection Vulnerability
2 rules 2 TTPsFlight framework is vulnerable to SQL Injection; an attacker can inject arbitrary SQL by crafting malicious array keys due to SimplePdo::insert(), SimplePdo::update(), and SimplePdo::delete() building SQL statements by concatenating the $table argument and the keys of the $data array directly into the query, with no identifier quoting or validation, leading to privilege escalation, arbitrary column writes, data destruction, and exfiltration.
florensiawidjaja BioinfoMCP Path Traversal Vulnerability
2 rules 1 TTP 1 CVEA path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.
Frappe Framework ERPNext 13.4.0 Sandbox Escape Vulnerability
2 rules 1 TTP 1 CVEFrappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability allowing authenticated users with System Manager role to execute arbitrary code via frame introspection and `os.popen`.
Free5GC PCF Authentication Bypass Vulnerability
2 rules 1 TTPFree5GC PCF versions prior to 1.4.3 are vulnerable to an authentication bypass due to missing middleware, allowing unauthenticated access to SM policy handlers and disclosure of subscriber SUPI.
Frequent Azure PIM Role Activation Detected
2 rules 3 TTPsDetection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.