<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jan — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/jan/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 May 2024 14:22:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/jan/feed.xml" rel="self" type="application/rss+xml"/><item><title>GenAI Process Connection to Unusual Domain on macOS</title><link>https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</link><pubDate>Thu, 02 May 2024 14:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</guid><description>This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of GenAI tools on macOS connecting to unusual domains, which may indicate a compromised state. Attackers can exploit GenAI tools through prompt injection, malicious MCP (Model Context Protocol) servers, or poisoned plugins to establish command-and-control (C2) channels or exfiltrate sensitive data. Given the network access capabilities of AI agents, adversaries may manipulate them to beacon to external servers, download malicious payloads, or transmit harvested credentials and documents. The Elastic detection rule <code>9050506c-df6d-4bdf-bc82-fcad0ef1e8c1</code> focuses on identifying such anomalous network connections originating from a predefined list of GenAI processes, excluding known legitimate domains. The rule has been actively maintained since its creation on December 4, 2025, with its latest update on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary compromises a GenAI tool on a macOS system through prompt injection, malicious MCP servers, or poisoned plugins.</li>
<li>The compromised GenAI tool is configured to connect to an attacker-controlled domain for C2.</li>
<li>The GenAI process initiates a network connection attempt to the unusual domain using standard web protocols (HTTP/HTTPS).</li>
<li>The macOS system&rsquo;s network stack resolves the attacker&rsquo;s domain to its corresponding IP address.</li>
<li>The GenAI process sends data to the attacker-controlled domain, potentially including sensitive information.</li>
<li>The attacker uses the C2 channel to send commands to the compromised GenAI tool.</li>
<li>The GenAI tool executes the commands, potentially leading to further compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised GenAI tools can lead to data exfiltration, unauthorized access to sensitive information, and the establishment of persistent C2 channels within an organization&rsquo;s network. The impact ranges from the loss of intellectual property and customer data to the potential disruption of business operations. The risk is amplified if the GenAI tool has access to internal systems or sensitive data stores, allowing attackers to pivot and escalate their attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Connecting to Unusual Domain&rdquo; to your SIEM and tune for your environment (see rule below).</li>
<li>Enable process creation and network connection logging on macOS endpoints to collect the data required for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the domain and the GenAI process&rsquo;s behavior.</li>
<li>Block any identified malicious domains at the network level (see query in the provided source).</li>
<li>Review the GenAI tool&rsquo;s configuration for unauthorized MCP servers, plugins, or extensions that initiated the connection.</li>
<li>Regularly update the list of allowed domains in the Sigma rule&rsquo;s filter to account for legitimate updates to GenAI tool infrastructure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>genai</category><category>command and control</category><category>macos</category><category>network connection</category></item></channel></rss>