<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FortiGate — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fortigate/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fortigate/feed.xml" rel="self" type="application/rss+xml"/><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item></channel></rss>