<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Elastic Endpoint Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/elastic-endpoint-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 22:46:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/elastic-endpoint-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>PowerShell Script with Encryption/Decryption Capabilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-powershell-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-powershell-encryption/</guid><description>PowerShell scripts employing .NET cryptography APIs are used to encrypt data for impact or decrypt payloads for defense evasion.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of PowerShell scripts utilizing .NET cryptography APIs for file encryption or decryption. Attackers often leverage these capabilities to encrypt data for impact, potentially leading to data exfiltration or ransomware deployment, or to decrypt staged payloads, circumventing traditional security measures. Defenders should be aware of PowerShell scripts employing symmetric cryptography classes (AES/Rijndael, SymmetricAlgorithm), key derivation helpers (PasswordDeriveBytes, Rfc2898DeriveBytes), explicit cipher configurations (CipherMode, PaddingMode), and functions that generate encryptors/decryptors. Identifying such scripts is crucial for preventing both data compromise and the execution of malicious payloads. This detection specifically targets Windows systems where PowerShell is commonly used for both legitimate administration and malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or a phishing attack).</li>
<li>Attacker uploads or stages a PowerShell script containing encryption/decryption capabilities.</li>
<li>The PowerShell script utilizes .NET cryptography APIs (e.g., <code>AESManaged</code>, <code>RijndaelManaged</code>, <code>PasswordDeriveBytes</code>, <code>Rfc2898DeriveBytes</code>).</li>
<li>The script configures the cipher using <code>CipherMode</code> and <code>PaddingMode</code>.</li>
<li>The script invokes <code>.CreateEncryptor()</code> or <code>.CreateDecryptor()</code> methods to initialize the cryptographic operation.</li>
<li>If encrypting, the script iterates through target files, encrypting their content and potentially renaming or deleting originals.</li>
<li>If decrypting, the script processes an encrypted payload, converting it to executable form or writing it to a new artifact.</li>
<li>The attacker executes the decrypted payload or exfiltrates the encrypted data, completing their objective.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant data loss, system downtime, and financial damage. Data encryption for impact can render systems unusable, while the decryption of staged payloads can introduce malware into the environment. The number of victims can vary widely depending on the scope of the attack, ranging from individual workstations to entire networks. Targeted sectors may include any organization reliant on Windows-based systems, with potential consequences including operational disruption, reputational damage, and regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the events required for detection, specifically event ID 4104, as detailed in the <a href="https://ela.st/powershell-logging-setup">Elastic PowerShell logging setup guide</a>.</li>
<li>Deploy the Sigma rule <code>PowerShell Script with Encryption/Decryption Capabilities</code> to your SIEM to detect suspicious PowerShell scripts utilizing .NET cryptography APIs.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on <code>powershell.file.script_block_text</code> to understand the cryptographic intent and data flow.</li>
<li>Tune the Sigma rule by adding exceptions for legitimate PowerShell scripts that use encryption, referencing the &ldquo;False positive analysis&rdquo; section in this brief.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>encryption</category><category>defense-evasion</category><category>windows</category></item><item><title>Persistence via WMI Event Subscription</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</guid><description>Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.</description><content:encoded><![CDATA[<p>Windows Management Instrumentation (WMI) provides a powerful framework for managing Windows systems, but adversaries can abuse its capabilities to establish persistence. By creating WMI event subscriptions, attackers can execute arbitrary code in response to defined system events. This technique involves creating event filters, providers, consumers, and bindings that automatically run malicious code. This can be achieved through tools like <code>wmic.exe</code>, which allows the creation of event consumers such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>. Successful exploitation of WMI for persistence allows attackers to maintain unauthorized access to a compromised system, even after reboots or other system changes. This activity has been observed across various environments, highlighting the need for robust detection mechanisms to identify and prevent WMI-based persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker uses <code>wmic.exe</code> to create a WMI event filter that defines a specific event to monitor.</li>
<li>A WMI event consumer, such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, is created using <code>wmic.exe</code> specifying the malicious code or script to execute when the event occurs.</li>
<li>A WMI binding is established between the event filter and the event consumer using <code>wmic.exe</code>, linking the event to the action.</li>
<li>The malicious WMI event subscription is activated, monitoring for the defined event.</li>
<li>When the specified event occurs, the WMI service triggers the execution of the associated malicious code or script through the event consumer.</li>
<li>The attacker gains persistent access to the system, as the WMI event subscription will re-activate after reboots.</li>
<li>The attacker can then perform additional malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of WMI for persistence can allow an attacker to maintain long-term, unauthorized access to a compromised system. This can result in data theft, system compromise, and further malicious activities. While the exact number of victims is not specified in the source, the broad applicability of this technique means that many Windows systems are potentially at risk. If the attack succeeds, the attacker gains a foothold on the system that is difficult to detect and remove, which can lead to significant operational disruption and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and monitor for <code>wmic.exe</code> with command-line arguments related to creating event consumers, specifically <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, to trigger the Sigma rule &ldquo;Detect Suspicious WMIC Process&rdquo;.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious WMI event subscription creation.</li>
<li>Review the investigation steps outlined in the provided documentation to triage and analyze potential WMI persistence attempts.</li>
<li>Monitor Windows Security Event Logs and Sysmon for events related to WMI activity for broader coverage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>wmi</category></item><item><title>Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)</title><link>https://feed.craftedsignal.io/briefs/2024-01-kali-wsl-install/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kali-wsl-install/</guid><description>Adversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.</description><content:encoded><![CDATA[<p>This detection identifies attempts to install or utilize Kali Linux through the Windows Subsystem for Linux (WSL). Attackers may leverage WSL to deploy Kali Linux as a means of circumventing traditional security measures and carrying out malicious operations within a Windows operating system. This behavior enables them to potentially blend their activities with legitimate WSL usage, making detection more challenging. The detection focuses on identifying specific processes and command-line arguments associated with Kali Linux installations and executions within the WSL environment, aiming to expose malicious actors utilizing this technique for nefarious purposes. This activity started being tracked in early 2023. Defenders should be aware of this technique, as it can be used to bypass security controls and perform malicious activities discreetly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods outside the scope of this specific detection (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker enables WSL on the target Windows system using PowerShell or command-line tools.</li>
<li>The attacker downloads the Kali Linux distribution for WSL from the Microsoft Store or another source.</li>
<li>The attacker uses <code>wsl.exe</code> with arguments like <code>-d</code>, <code>--distribution</code>, <code>-i</code>, or <code>--install</code> along with &ldquo;kali*&rdquo; to install the Kali Linux distribution.</li>
<li>Alternatively, the attacker directly executes the <code>kali.exe</code> binary located within the Kali Linux package path (e.g., <code>C:\\Users\\*\\AppData\\Local\\packages\\kalilinux*</code>).</li>
<li>Once Kali Linux is installed, the attacker uses it to perform various malicious activities, such as penetration testing, vulnerability scanning, or exploiting other systems on the network.</li>
<li>The attacker may leverage tools and utilities within Kali Linux to escalate privileges, move laterally, or exfiltrate sensitive data.</li>
<li>The final objective is typically to compromise the target system or network, steal valuable information, or disrupt operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using Kali Linux within WSL can lead to significant damage, including data breaches, system compromise, and disruption of services. The use of Kali Linux provides attackers with a wide range of tools and capabilities for reconnaissance, exploitation, and post-exploitation activities. Depending on the attacker&rsquo;s objectives, this can result in financial losses, reputational damage, and legal liabilities. Organizations across various sectors are vulnerable, as this technique can be used against any Windows system with WSL enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Kali Linux Installation via WSL&rdquo; to your SIEM to detect the use of <code>wsl.exe</code> with specific Kali Linux installation arguments (rule).</li>
<li>Deploy the Sigma rule &ldquo;Detect Kali Linux Executable via WSL&rdquo; to your SIEM to detect the direct execution of <code>kali.exe</code> from the common install directories (rule).</li>
<li>Monitor process creation events for the execution of <code>wsl.exe</code> and <code>kali.exe</code> within the Windows environment (logsource).</li>
<li>Review and restrict the usage of WSL within the organization to only authorized users and systems (overview).</li>
<li>Implement application control policies to prevent the execution of unauthorized binaries, including <code>kali.exe</code> (overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>wsl</category><category>kalilinux</category></item></channel></rss>