<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chrome — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/chrome/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 02:21:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/chrome/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</guid><description>A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7359 describes a use-after-free vulnerability present in ANGLE (Almost Native Graphics Layer Engine), a crucial component of the Chromium open-source project. This vulnerability impacts applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the provided source does not give specific exploitation details, use-after-free vulnerabilities can allow for arbitrary code execution. Google Chrome has already addressed this vulnerability, and Microsoft Edge has incorporated the fix from Chromium. This vulnerability matters to defenders because successful exploitation could lead to compromise of the browser and potentially the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing JavaScript code that leverages a flaw in ANGLE&rsquo;s memory management.</li>
<li>A user visits the malicious web page through Chrome or Edge.</li>
<li>The JavaScript code triggers the use-after-free vulnerability by freeing a memory object in ANGLE and then attempting to access it again.</li>
<li>This memory corruption leads to a controlled crash or allows the attacker to overwrite memory with arbitrary data.</li>
<li>The attacker leverages the memory overwrite to inject malicious code into the browser process.</li>
<li>The injected code executes within the context of the browser, granting the attacker access to user data, cookies, and other sensitive information.</li>
<li>The attacker may then use this access to perform actions on behalf of the user, such as stealing credentials, installing malware, or spreading the attack to other systems.</li>
<li>The attacker achieves arbitrary code execution on the user&rsquo;s system, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit of CVE-2026-7359 could allow an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, data theft, and potentially full system compromise. The scope of impact is broad, affecting any user who visits a malicious webpage while using a vulnerable version of Chrome or Edge. Since Chrome and Edge are widely used, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WebGL Usage</code> to identify potential exploitation attempts targeting ANGLE via WebGL.</li>
<li>Monitor web server logs for suspicious requests (cs-uri-query) that may be related to the exploitation of CVE-2026-7359.</li>
<li>Ensure that all Chrome and Edge installations are updated to the latest versions to patch CVE-2026-7359.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category><category>cve-2026-7359</category></item><item><title>CVE-2026-7339: Heap Buffer Overflow in WebRTC</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</guid><description>A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7339 is a critical heap buffer overflow vulnerability affecting the WebRTC (Web Real-Time Communication) component in Google Chrome and Microsoft Edge (Chromium-based). This vulnerability stems from improper memory management within WebRTC, potentially allowing a remote attacker to execute arbitrary code by crafting malicious web content. As Microsoft Edge ingests Chromium, it is also vulnerable. Users of Chrome and Edge are affected. Defenders should apply available patches promptly to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious website designed to trigger the WebRTC vulnerability.</li>
<li>The victim visits the malicious website using a vulnerable version of Chrome or Edge.</li>
<li>The website uses JavaScript to initiate a WebRTC session.</li>
<li>The crafted WebRTC data triggers a heap buffer overflow during memory allocation within the WebRTC component.</li>
<li>The overflow overwrites adjacent memory regions on the heap.</li>
<li>The attacker carefully crafts the overflow data to overwrite critical program data or function pointers.</li>
<li>The corrupted data leads to arbitrary code execution within the context of the browser process.</li>
<li>The attacker gains control of the user&rsquo;s browser and potentially the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7339 can lead to arbitrary code execution, allowing an attacker to potentially install malware, steal sensitive information, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability could impact a large number of users across various sectors, including individuals, businesses, and government organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge (Chromium-based) to patch CVE-2026-7339.</li>
<li>Deploy the Sigma rule &ldquo;Detect WebRTC Heap Overflow Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-7339.</li>
<li>Monitor web server logs for unusual requests or patterns associated with WebRTC usage that could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>webrtc</category><category>heap-overflow</category><category>code-execution</category><category>cve-2026-7339</category></item><item><title>Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</guid><description>CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7355 is a critical use-after-free vulnerability residing in the Media component of the Chromium browser engine. This vulnerability affects Google Chrome and Microsoft Edge, as Edge incorporates Chromium. A use-after-free vulnerability occurs when an application attempts to use memory after it has been freed, which can lead to crashes, arbitrary code execution, or other unexpected behavior. Successful exploitation could allow an attacker to execute arbitrary code within the context of the browser. This vulnerability was reported and patched by the Chromium project.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage containing specially crafted media content.</li>
<li>A user opens the malicious webpage in a vulnerable version of Chrome or Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the use-after-free vulnerability in the Media component.</li>
<li>The vulnerable code attempts to access a freed memory region.</li>
<li>The attacker gains control of the memory region due to the use-after-free condition.</li>
<li>The attacker injects malicious code into the controlled memory region.</li>
<li>The browser executes the attacker-controlled code.</li>
<li>The attacker achieves arbitrary code execution within the context of the browser process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7355 can lead to arbitrary code execution within the context of the browser process. An attacker could potentially gain control of the user&rsquo;s system, steal sensitive information, or install malware. Given the widespread use of Chrome and Edge, a successful exploit could impact a large number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7355.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Use-After-Free in Media Component&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging to capture events related to potential exploitation attempts, facilitating detection rule functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>cve-2026-7355</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</guid><description>CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7357 is a critical use-after-free vulnerability residing within the GPU component of the Chromium rendering engine. This flaw directly impacts Google Chrome and, due to Microsoft Edge&rsquo;s reliance on Chromium, also affects Edge users. A remote attacker could potentially exploit this vulnerability to execute arbitrary code on a targeted system. The vulnerability stems from improper memory management within the GPU processing routines. While the specific exploitation details are not provided in this brief, successful exploitation generally involves crafting malicious web content to trigger the vulnerability during GPU operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that triggers specific GPU functions.</li>
<li>User visits the malicious website using Chrome or Edge.</li>
<li>The browser&rsquo;s rendering engine processes the malicious JavaScript, leading to the allocation and subsequent freeing of a memory region in the GPU component.</li>
<li>The attacker&rsquo;s JavaScript code then attempts to access the previously freed memory region, triggering the use-after-free vulnerability.</li>
<li>By manipulating the memory layout, the attacker can overwrite the freed memory with controlled data.</li>
<li>The overwritten memory is later accessed by the GPU, leading to the execution of attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker leverages the code execution to escalate privileges or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7357 can lead to arbitrary code execution on the victim&rsquo;s machine. The attacker could potentially install malware, steal sensitive data, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability poses a significant risk to a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7357.</li>
<li>Apply the latest security updates for Microsoft Edge to address CVE-2026-7357.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WebAssembly Execution&rdquo; to identify potential exploitation attempts involving WebAssembly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</guid><description>CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7333 is a critical use-after-free vulnerability residing in the GPU component of the Chromium browser engine. This flaw allows an attacker to potentially corrupt memory and execute arbitrary code in the context of the browser process. As Microsoft Edge is built upon the Chromium engine, it is also susceptible to this vulnerability. Public details are limited, but exploitation likely involves crafting malicious web content that triggers the use-after-free condition within the GPU processing routines. This vulnerability poses a significant threat as it could allow attackers to compromise user systems simply by visiting a malicious website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that interacts with the GPU functionality of the browser.</li>
<li>The user visits the malicious page via a phishing email or drive-by download.</li>
<li>The JavaScript code triggers the use-after-free vulnerability in the Chromium GPU component.</li>
<li>The vulnerability allows the attacker to corrupt memory allocated for GPU processing.</li>
<li>The attacker manipulates memory to gain control of program execution.</li>
<li>The attacker injects malicious code into the browser process.</li>
<li>The injected code executes with the privileges of the browser process, allowing the attacker to perform actions such as stealing cookies, credentials, or installing malware.</li>
<li>The attacker gains persistent access to the compromised system and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-7333 could allow an attacker to execute arbitrary code on a user&rsquo;s system. This could lead to the theft of sensitive information, installation of malware, or complete system compromise. Given the widespread use of Chromium-based browsers such as Chrome and Edge, this vulnerability has the potential to affect millions of users. The impact is considered critical due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7333.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious GPU Process Creation&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging with command-line arguments to detect suspicious processes spawned by the browser (logsource: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>use-after-free</category><category>chromium</category><category>gpu</category><category>cve-2026-7333</category><category>remote code execution</category></item><item><title>Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</guid><description>CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7348 is a critical use-after-free vulnerability residing within the Codecs component of the Chromium browser engine. This vulnerability affects applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the specific details of the vulnerability are documented in Google Chrome Releases, the underlying issue stems from improper memory management within the Codecs library. Successful exploitation could allow an attacker to execute arbitrary code within the context of the affected browser, potentially leading to data theft, system compromise, or other malicious activities. This vulnerability requires immediate attention from organizations utilizing Chrome or Edge.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing specially crafted media content designed to trigger the use-after-free condition in the Codecs library.</li>
<li>The user visits the malicious web page using Google Chrome or Microsoft Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the vulnerable code path within the Codecs library.</li>
<li>The use-after-free condition is triggered when the browser attempts to access memory that has already been freed.</li>
<li>The attacker leverages the use-after-free condition to corrupt memory and gain control of program execution.</li>
<li>The attacker injects and executes arbitrary code within the context of the browser process.</li>
<li>The attacker gains unauthorized access to sensitive data, such as cookies, credentials, or browsing history.</li>
<li>The attacker potentially escalates privileges or installs malware on the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7348 allows an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, such as credentials or browsing history. The attacker could potentially gain full control of the user&rsquo;s system. Given the widespread use of Chromium-based browsers, a successful exploit could impact a significant number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to the latest version that addresses this vulnerability; refer to <a href="https://chromereleases.googleblog.com/2025">Google Chrome Releases</a>.</li>
<li>Ensure Microsoft Edge is updated to the latest version incorporating the Chromium security patch.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Codecs Use-After-Free Exploit Attempt&rdquo; to identify potential exploitation attempts via webserver logs.</li>
<li>Enable webserver logging to capture HTTP requests, which is required for the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>vulnerability</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</guid><description>CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7349 is a use-after-free vulnerability found in the Cast component of the Chromium browser engine. This vulnerability affects Google Chrome and, by extension, Microsoft Edge, as Edge is built upon Chromium. Use-after-free vulnerabilities can allow an attacker to execute arbitrary code or cause a denial-of-service. While the original report comes from Chrome, the nature of Chromium&rsquo;s shared codebase means that other Chromium-based browsers are also vulnerable. Successful exploitation of this vulnerability could lead to code execution within the context of the browser process. Defenders need to prioritize patching and monitoring for unusual browser behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage designed to trigger the use-after-free vulnerability in the Cast component.</li>
<li>The user visits the malicious webpage using a vulnerable version of Chrome or Edge.</li>
<li>The Cast component attempts to access a freed memory location.</li>
<li>The attacker exploits the use-after-free condition to corrupt memory.</li>
<li>The attacker overwrites a function pointer or other critical data structure in memory.</li>
<li>The attacker triggers the execution of the corrupted function pointer or data structure.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker could potentially escalate privileges or perform other malicious activities, such as installing malware or stealing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7349 could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to data theft, malware installation, or further system compromise. Given the widespread use of Chrome and Edge, this vulnerability has a significant impact. The specific number of potential victims is dependent on the speed of patching, but could potentially affect millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7349.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor browser process execution for unexpected code loading or memory access patterns using process creation logs.</li>
<li>Implement memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>browser</category><category>chromium</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</guid><description>CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7338 is a critical use-after-free vulnerability residing within the Cast component of the Chromium browser engine. Google Chrome and Microsoft Edge (Chromium-based) are both affected by this flaw. While the provided source does not specify the exact vulnerable versions, it indicates that Microsoft Edge ingests Chromium, and thus is affected by vulnerabilities addressed in Chromium releases. Successful exploitation of this vulnerability could lead to arbitrary code execution in the context of the user running the browser. This poses a significant risk, as attackers could potentially gain control of the user&rsquo;s system. Defenders should prioritize patching affected browsers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage or injects malicious code into a legitimate website that utilizes the Cast functionality.</li>
<li>The victim visits the malicious website or interacts with the compromised legitimate website using an affected browser (Chrome or Edge).</li>
<li>The malicious webpage triggers the use-after-free vulnerability in the Cast component.</li>
<li>The vulnerability allows the attacker to access memory that has already been freed.</li>
<li>The attacker overwrites the freed memory with attacker-controlled data.</li>
<li>The attacker manipulates the memory layout to redirect program execution.</li>
<li>The browser attempts to execute code from the attacker-controlled memory location.</li>
<li>This results in arbitrary code execution within the context of the browser process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7338 allows an attacker to execute arbitrary code on a victim&rsquo;s machine. This can lead to complete system compromise, data theft, installation of malware, or other malicious activities. Given the widespread use of Chromium-based browsers like Chrome and Edge, this vulnerability has the potential to impact a large number of users across various sectors. The severity is critical due to the potential for remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7338 as detailed in Google Chrome Releases.</li>
<li>Apply the latest security updates for Microsoft Edge (Chromium-based) to address CVE-2026-7338, ensuring the ingested Chromium version contains the fix.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting the Cast component.</li>
<li>Enable enhanced browser security features, such as sandboxing and site isolation, to limit the impact of potential exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chrome</category><category>edge</category><category>cve-2026-7338</category><category>remote code execution</category></item><item><title>Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</guid><description>CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7353 is a critical heap buffer overflow vulnerability residing within the Skia graphics library, a core component of the Chromium open-source project. This vulnerability impacts applications that utilize Chromium, including Google Chrome and Microsoft Edge. While the specific details of exploitation are not provided in this brief, the nature of a heap buffer overflow suggests a high potential for arbitrary code execution. Successful exploitation could allow an attacker to gain control of the affected browser process. Given the widespread use of Chromium-based browsers, this vulnerability poses a significant risk to a large user base. Defenders should prioritize patching and consider implementing mitigations to detect and prevent potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page or injects malicious content into a trusted website.</li>
<li>The victim visits the malicious web page or interacts with the injected content using a Chromium-based browser (Chrome or Edge).</li>
<li>The browser&rsquo;s rendering engine, utilizing the Skia library, processes the malicious content, triggering the heap buffer overflow in Skia.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions in the heap.</li>
<li>By carefully crafting the overflowed data, the attacker can overwrite critical data structures within the browser process.</li>
<li>The attacker gains control of the execution flow by overwriting function pointers or other control data.</li>
<li>The attacker executes arbitrary code within the context of the browser process.</li>
<li>The attacker could then perform actions such as installing malware, stealing sensitive data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7353 allows for arbitrary code execution within the context of the affected browser process. This can lead to a complete compromise of the user&rsquo;s browser session, potentially enabling the attacker to steal credentials, inject malicious code into other websites, or install malware on the victim&rsquo;s system. Given the widespread use of Chrome and Edge, the potential impact is significant, affecting potentially millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7353.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts based on suspicious process execution originating from the browser (see &ldquo;Detect Suspicious Process Creation from Browser&rdquo;).</li>
<li>Enable enhanced browser security features such as site isolation to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap overflow</category><category>chromium</category><category>cve-2026-7353</category></item><item><title>Multiple Vulnerabilities in Google Chrome</title><link>https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</link><pubDate>Thu, 30 Apr 2026 09:09:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</guid><description>Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities have been identified in Google Chrome. An attacker exploiting these vulnerabilities could potentially execute arbitrary code, circumvent security measures, expose and manipulate sensitive information, and trigger a denial-of-service condition. The specifics of these vulnerabilities, including CVE identifiers, are not detailed in the source document. The lack of detail makes it difficult to determine the scope of the attack, but successful exploitation could lead to significant compromise of systems running Chrome. Defenders should prioritize monitoring for suspicious activity within Chrome processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of Google Chrome.</li>
<li>The attacker crafts a malicious web page or injects malicious code into a legitimate website.</li>
<li>A user visits the malicious web page or a compromised legitimate website using Google Chrome.</li>
<li>The attacker exploits a vulnerability in Chrome, such as a use-after-free or buffer overflow.</li>
<li>Successful exploitation allows the attacker to execute arbitrary code within the context of the Chrome process.</li>
<li>The attacker leverages the code execution to bypass security mechanisms like sandboxing.</li>
<li>The attacker gains access to sensitive data, such as cookies, browsing history, or credentials.</li>
<li>The attacker manipulates data or causes a denial-of-service condition by crashing the browser or consuming excessive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition. The impact ranges from data theft and credential compromise to complete system takeover, depending on the specific vulnerability and the attacker&rsquo;s objectives. While the exact number of potential victims is unknown, the widespread use of Chrome makes this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes spawned by chrome.exe, especially those involving command-line interpreters or scripting engines. Use the &ldquo;Detect Suspicious Child Process of Chrome&rdquo; Sigma rule.</li>
<li>Inspect network connections originating from chrome.exe for unusual destinations or protocols. Deploy the &ldquo;Detect Outbound Connection from Chrome without User Interaction&rdquo; Sigma rule.</li>
<li>Implement web content filtering to block access to known malicious websites that might attempt to exploit Chrome vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>vulnerability</category><category>code-execution</category><category>defense-evasion</category><category>information-disclosure</category><category>denial-of-service</category></item><item><title>Detection of Command and Control Activity via Commonly Abused Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-04-c2-web-services/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-04-c2-web-services/</guid><description>This rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.</description><content:encoded><![CDATA[<p>Adversaries may implement command and control (C2) communications that use common web services to hide their activity. This attack technique is typically targeted at an organization and uses web services common to the victim network, which allows the adversary to blend into legitimate traffic activity. These popular services are typically targeted since they have most likely been used before compromise, which helps malicious traffic blend in. This detection focuses on identifying connections from Windows hosts to a predefined list of commonly abused web services from processes running outside of typical program installation directories, indicating a potential C2 channel leveraging legitimate services. The rule aims to detect this behavior by monitoring network connections and DNS requests originating from unusual locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved via an unknown method (e.g., phishing, exploit).</li>
<li>Malware is installed on the victim&rsquo;s system, likely outside typical program directories.</li>
<li>The malware establishes a DNS connection to a commonly abused web service (e.g., pastebin.com, raw.githubusercontent.com) to obscure C2 traffic.</li>
<li>The malware sends encrypted or encoded commands to the web service.</li>
<li>The web service acts as an intermediary, relaying the commands to the attacker&rsquo;s C2 server.</li>
<li>The C2 server responds with instructions, which are then relayed back to the compromised host through the same web service.</li>
<li>The malware executes the received commands, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
<li>The attacker maintains persistent access and control over the compromised system using the web service as a hidden C2 channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to data theft, system compromise, and further propagation within the network. Since commonly used web services are utilized, the malicious activity can blend in with legitimate network traffic, making it difficult to detect. The impact can range from minor data breaches to complete network compromise, depending on the attacker&rsquo;s objectives and the level of access gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Commonly Abused Web Services via DNS</code> to your SIEM to identify suspicious DNS queries to known C2 web services originating from anomalous processes.</li>
<li>Enable DNS query logging on Windows endpoints to provide the data source required for the Sigma rule.</li>
<li>Review network connection logs for processes outside standard installation directories communicating with domains listed in the <code>query</code> section of the Sigma rule to identify potential C2 activity.</li>
<li>Implement network segmentation to limit the potential impact of compromised hosts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>windows</category><category>threat-detection</category></item><item><title>Browser Process Spawned from an Unusual Parent</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</guid><description>Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where a browser process, specifically Google Chrome or Microsoft Edge, is initiated from an unexpected parent process on a Windows system. The rule focuses on scenarios where browsers are launched with arguments indicative of remote debugging, headless automation, or minimal user interaction. Such activity can signal an attempt to manipulate a browser session for malicious purposes, potentially leading to credential theft or unauthorized access to sensitive information. The rule is designed to leverage data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Process Creation Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or command to launch a browser process (chrome.exe or msedge.exe).</li>
<li>The browser is launched with specific command-line arguments, such as <code>--remote-debugging-port</code>, <code>--headless</code>, or <code>--window-position=-x,-y</code>, to enable remote control or hide the browser window.</li>
<li>The parent process of the browser is an unusual executable, not typically associated with launching browsers (e.g., not explorer.exe).</li>
<li>The attacker leverages the remote debugging port to interact with the browser session programmatically.</li>
<li>The attacker attempts to steal credentials or session cookies from the browser.</li>
<li>The attacker uses stolen credentials to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of user credentials, enabling unauthorized access to sensitive data and systems. This could result in financial loss, data breaches, and reputational damage for affected organizations. The targeted use of browser manipulation techniques increases the likelihood of bypassing traditional security controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Browser Process Spawned from Unusual Parent</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the <code>Browser Process Spawned from Unusual Parent</code> Sigma rule.</li>
<li>Review process command lines for arguments like <code>--remote-debugging-port</code> or <code>--headless</code> to identify potential browser manipulation attempts.</li>
<li>Monitor network connections originating from browser processes for unexpected destinations, as described in the investigation guide from the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>browser-exploitation</category></item><item><title>Detection of Command and Control Activity via Common Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</guid><description>This rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.</description><content:encoded><![CDATA[<p>This detection rule, sourced from Elastic, identifies potential command and control (C2) activity by detecting connections to commonly abused web services. Adversaries often leverage popular web services like pastebin, GitHub, Dropbox, and Discord to mask malicious communications within legitimate network traffic. This technique makes it challenging for defenders to distinguish between normal user activity and malicious C2 traffic. The rule focuses on Windows systems and monitors DNS queries to identify processes communicating with a predefined list of services known to be abused by attackers. The rule was last updated on 2026-05-04 and is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. The goal is to identify anomalous network connections originating from unusual processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user on a Windows host unknowingly executes a malicious file (e.g., via phishing or drive-by download).</li>
<li>The malicious file executes a process outside of typical program directories (e.g., <code>C:\Windows\Temp</code>).</li>
<li>This process initiates a DNS query to a domain associated with a commonly abused web service (e.g., <code>pastebin.com</code>, <code>githubusercontent.com</code>).</li>
<li>The DNS query resolves to an IP address, and a network connection is established to the web service.</li>
<li>The malicious process uploads or downloads data from the web service, potentially containing commands for the compromised host or exfiltrated data.</li>
<li>The web service acts as an intermediary, relaying commands from the attacker to the compromised host or exfiltrated data from the compromised host to the attacker.</li>
<li>The attacker uses the C2 channel to perform further actions on the compromised host, such as lateral movement or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using common web services for C2 can lead to data exfiltration, system compromise, and further propagation within the network. The low severity suggests a focus on detecting early-stage C2 activity, which if left unchecked, could escalate into a significant incident. The usage of popular web services makes detection difficult, requiring careful analysis and tuning to avoid false positives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Connection to Commonly Abused Web Services&rdquo; to your SIEM and tune it for your environment to minimize false positives.</li>
<li>Enable Sysmon DNS query logging to accurately capture DNS requests for improved detection capabilities, activating the &ldquo;DNS Query to Commonly Abused Web Services&rdquo; rule.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain and network connections to determine the legitimacy of the activity, referencing the investigation steps described in the rule documentation.</li>
<li>Review and update the list of excluded processes in the Sigma rule to reflect your organization&rsquo;s approved software and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-and-control</category><category>webservice</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Unauthorized Access to Chrome Local State File</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</guid><description>Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to the Chrome &lsquo;Local State&rsquo; file, a critical component of the Chrome browser that stores settings and, more importantly, the encrypted master key used to protect saved passwords. The &lsquo;Local State&rsquo; file is typically accessed only by the Chrome browser itself. When other processes attempt to read this file, it&rsquo;s a strong indicator of malicious activity, potentially involving credential theft or reconnaissance by malware such as RedLine Stealer. This analytic leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. Detecting and responding to this activity is crucial for preventing attackers from gaining access to sensitive user credentials stored within the Chrome browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing or exploitation of a software vulnerability (not specified in this advisory).</li>
<li>Malware is deployed on the victim machine (e.g., RedLine Stealer).</li>
<li>The malware attempts to locate the Chrome &lsquo;Local State&rsquo; file, typically found at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Local State</code>.</li>
<li>The malware process accesses the &lsquo;Local State&rsquo; file, triggering a Windows Security Event 4663.</li>
<li>The malware extracts the encrypted master key from the &lsquo;Local State&rsquo; file.</li>
<li>The malware decrypts the master key using attacker-controlled methods.</li>
<li>The decrypted master key is used to decrypt saved passwords stored by Chrome.</li>
<li>The stolen credentials are exfiltrated to the attacker&rsquo;s command and control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials stored in the Chrome browser. This can lead to unauthorized access to email accounts, social media profiles, banking websites, and other sensitive online services. The impact could range from identity theft and financial fraud to corporate espionage and data breaches. The number of potential victims depends on the number of systems compromised and the extent of Chrome usage on those systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to ensure Windows Security Event 4663 is generated for file access, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chrome Local State File Access by Non-Chrome Processes&rdquo; to your SIEM to detect unauthorized access attempts (see &ldquo;rules&rdquo; section). Tune the rule&rsquo;s filter list to reduce false positives related to legitimate software uninstallers.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process name and path involved in accessing the &lsquo;Local State&rsquo; file, as described in the rule&rsquo;s description.</li>
<li>Consider implementing network egress filtering to prevent exfiltration of stolen credentials to known malicious command and control servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>chrome</category></item><item><title>RMM Domain DNS Queries from Non-Browser Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</guid><description>Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious use of Remote Monitoring and Management (RMM) tools by detecting DNS queries to known RMM domains originating from processes that are not web browsers. Attackers frequently abuse legitimate RMM software for command and control, persistence, and lateral movement within compromised networks. This rule focuses on surfacing RMM clients, scripts, or other non-browser activity contacting these services, thereby increasing the likelihood of detecting unauthorized remote access or malicious activity. The rule aims to reduce false positives by excluding common browser processes and focusing on unusual network activity. The identified domains are associated with various RMM tools like TeamViewer, AnyDesk, and ScreenConnect. This detection is relevant for organizations concerned about insider threats, supply chain attacks, or general compromise leading to unauthorized remote access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker installs an unauthorized RMM tool (e.g., using a script or installer).</li>
<li>The RMM tool initiates a DNS query to resolve its command and control domain (e.g., teamviewer.com).</li>
<li>The system, now running the RMM agent, establishes a connection to the attacker-controlled RMM server.</li>
<li>The attacker uses the RMM tool to execute commands on the compromised system.</li>
<li>The attacker uses the RMM tool for lateral movement within the network.</li>
<li>The attacker uses the RMM tool to maintain persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via unauthorized RMM tools can provide attackers with persistent remote access, enabling them to perform a range of malicious activities, including data theft, ransomware deployment, and further lateral movement within the network. Successful exploitation can lead to significant financial loss, reputational damage, and disruption of business operations. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>RMM Domain DNS Queries from Non-Browser Processes</code> to your SIEM and tune it to your environment, excluding legitimate non-browser processes that use RMM tools.</li>
<li>Investigate any alerts generated by the rule, focusing on identifying the process making the DNS query and its parent process, as outlined in the rule&rsquo;s description.</li>
<li>Monitor DNS query logs for queries to the RMM domains listed in the IOC table, and block them at the DNS resolver if unauthorized RMM use is confirmed.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to provide the necessary data for this detection, as recommended in the &ldquo;Setup&rdquo; section of the content.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>rmm</category><category>dns</category></item><item><title>Non-Chrome Process Accessing Chrome Login Data</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</guid><description>This analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to Chrome&rsquo;s &ldquo;Login Data&rdquo; file, a local SQLite database that stores user credentials. Attackers, after gaining initial access to a Windows system, may attempt to steal these credentials by directly accessing and parsing this file. The &ldquo;Login Data&rdquo; file contains sensitive information, including usernames, passwords, and URLs. The technique is commonly associated with credential-stealing malware families like RedLine Stealer, DarkGate, and others listed below. Successful exploitation allows attackers to harvest credentials for lateral movement and further compromise. This detection is based on Windows Security Event logs, specifically event ID 4663, which records attempts to access objects like files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a malicious executable or script on the compromised system.</li>
<li>The malicious process attempts to access the Chrome &ldquo;Login Data&rdquo; file, typically located at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data</code>.</li>
<li>Windows Security Event Log generates an event with EventCode 4663, recording the file access attempt.</li>
<li>The attacker&rsquo;s process reads the &ldquo;Login Data&rdquo; SQLite database.</li>
<li>The attacker extracts and potentially decrypts stored usernames and passwords from the &ldquo;Login Data&rdquo; file.</li>
<li>The attacker uses the stolen credentials for lateral movement within the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Chrome &ldquo;Login Data&rdquo; files can lead to widespread credential theft, granting attackers unauthorized access to numerous online accounts. Depending on the user&rsquo;s browsing habits and password reuse, this can include access to sensitive corporate resources, financial accounts, and personal email. The impact can range from financial loss to significant data breaches and reputational damage. The references section in the original source mentions Redline Stealer which is used in various attacks, indicating a potentially large number of victims across different sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to generate Windows Security Event 4663, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule <code>Chrome Login Data Accessed by Non-Browser Process</code> to your SIEM and tune the <code>process_path</code> filter to exclude legitimate software in your environment.</li>
<li>Investigate any alerts generated by the <code>Chrome Login Data Accessed by Non-Browser Process</code> Sigma rule to determine if credential theft has occurred and remediate any affected accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>windows</category></item><item><title>DNS-over-HTTPS Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</guid><description>Detection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.</description><content:encoded><![CDATA[<p>The use of DNS-over-HTTPS (DoH) can obscure network activity, potentially allowing malicious actors to bypass traditional DNS monitoring and conceal data exfiltration. When DoH is enabled, visibility into DNS query types, responses, and originating IPs is lost, hindering the detection of malicious activity. This behavior is detected by monitoring registry modifications associated with enabling DoH in popular browsers such as Microsoft Edge, Google Chrome, and Mozilla Firefox. The registry keys targeted are associated with settings that force the browsers to use secure DNS resolution, potentially circumventing organizational security policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation (if necessary):</strong> The attacker may need to escalate privileges to modify registry settings.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the Windows registry to enable DNS-over-HTTPS (DoH) in web browsers like Edge, Chrome, or Firefox. This is achieved by modifying specific registry keys such as <code>HKLM\SOFTWARE\Policies\Microsoft\Edge\BuiltInDnsClientEnabled</code>, <code>HKLM\SOFTWARE\Google\Chrome\DnsOverHttpsMode</code>, or <code>HKLM\SOFTWARE\Policies\Mozilla\Firefox\DNSOverHTTPS</code>.</li>
<li><strong>Obfuscation:</strong> By enabling DoH, the attacker encrypts DNS queries, making it difficult for network monitoring tools to inspect DNS traffic.</li>
<li><strong>Command and Control:</strong> The attacker establishes command and control (C2) communication with a remote server over encrypted DNS traffic, evading traditional network-based detection methods.</li>
<li><strong>Data Exfiltration:</strong> The attacker uses the encrypted DNS channel to exfiltrate sensitive data, bypassing network security controls that rely on DNS inspection.</li>
<li><strong>Persistence (Optional):</strong> The attacker might establish persistence by ensuring the DoH settings remain enabled across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to a loss of visibility into DNS traffic, hindering incident response and threat hunting efforts. Attackers can effectively hide command-and-control communications and data exfiltration activities. Although this activity by itself isn&rsquo;t inherently malicious, it removes a layer of defense, increasing the risk that malicious activities will go undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect the enabling of DNS-over-HTTPS via registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the provided Sigma rules to function effectively.</li>
<li>Review and update security policies to ensure DNS-over-HTTPS is only enabled through approved channels and for legitimate purposes, reducing the risk of misuse, and create exceptions in the detection rule for systems where this is a known requirement.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the user account, process, and associated network activity (reference the investigation guide in the source URL).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>dns-over-https</category><category>registry-modification</category></item><item><title>CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-7337-v8-type-confusion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-7337-v8-type-confusion/</guid><description>CVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).</description><content:encoded><![CDATA[<p>CVE-2026-7337 is a type confusion vulnerability residing within the V8 JavaScript engine, the core component of Chromium-based browsers. This vulnerability impacts Google Chrome and Microsoft Edge (Chromium-based), as Edge incorporates the Chromium project. The vulnerability stems from improper handling of object types within the V8 engine during JavaScript execution, potentially leading to exploitable conditions. Successful exploitation could allow an attacker to execute arbitrary code within the context of the browser. Public details are available via the Google Chrome Releases blog and the Microsoft Security Response Center (MSRC). Defenders should prioritize patching to the latest available versions of Chrome and Edge.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing JavaScript code designed to trigger the type confusion vulnerability in the V8 engine.</li>
<li>The victim visits the malicious web page using a vulnerable version of Google Chrome or Microsoft Edge.</li>
<li>The browser&rsquo;s V8 engine attempts to execute the attacker-controlled JavaScript code.</li>
<li>Due to the type confusion vulnerability, the V8 engine misinterprets the type of a JavaScript object.</li>
<li>This misinterpretation leads to memory corruption within the browser process.</li>
<li>The attacker leverages the memory corruption to overwrite critical data structures within the browser&rsquo;s memory space.</li>
<li>The attacker gains control of the browser process&rsquo;s execution flow.</li>
<li>The attacker executes arbitrary code on the victim&rsquo;s machine within the security context of the browser process, potentially leading to information disclosure, data theft, or further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7337 allows an attacker to execute arbitrary code within the context of the user&rsquo;s browser. This could lead to sensitive information being stolen, such as cookies, browsing history, and stored credentials. Attackers could also potentially use this vulnerability to install malware or gain further access to the victim&rsquo;s system. Given the widespread use of Chromium-based browsers, this vulnerability poses a significant threat to a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7337. Refer to the Google Chrome Releases blog for details.</li>
<li>Apply the latest security updates for Microsoft Edge (Chromium-based) to address CVE-2026-7337 as described in the MSRC advisory.</li>
<li>Implement a web proxy with content filtering to block access to known malicious websites that may attempt to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>type confusion</category><category>v8 engine</category><category>chromium</category><category>cve-2026-7337</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item></channel></rss>