<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Outlook — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/outlook/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 04 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/outlook/feed.xml" rel="self" type="application/rss+xml"/><item><title>Persistence via Malicious Microsoft Outlook VBA Template</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-vba-persistence/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-vba-persistence/</guid><description>Attackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.</description><content:encoded><![CDATA[<p>Attackers can leverage Microsoft Outlook&rsquo;s VBA scripting capabilities to establish persistence on compromised systems. This is achieved by installing malicious VBA templates within the Outlook environment. These templates are designed to execute upon application startup, granting the attacker sustained access and control. The attack centers around unauthorized modifications to the <code>VbaProject.OTM</code> file, a critical component for VBA script storage in Outlook. This technique allows threat actors to maintain a foothold even after system restarts or user logoffs. Defenders need to monitor for suspicious changes to this file to identify and mitigate potential compromises.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or other social engineering methods (not detailed in source).</li>
<li>The attacker identifies a user with Microsoft Outlook installed and running on a Windows system.</li>
<li>The attacker modifies or replaces the existing <code>VbaProject.OTM</code> file located in the user&rsquo;s Outlook profile (<code>C:\Users\*\AppData\Roaming\Microsoft\Outlook\</code>).</li>
<li>The modified <code>VbaProject.OTM</code> file contains malicious VBA code designed to execute when Outlook starts.</li>
<li>The victim launches Microsoft Outlook.</li>
<li>The malicious VBA code within <code>VbaProject.OTM</code> executes automatically upon Outlook startup, establishing persistence.</li>
<li>The VBA script can perform various malicious actions, such as downloading and executing additional payloads, establishing command and control, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access to the compromised system, allowing attackers to steal sensitive information, deploy ransomware, or use the system as a staging ground for further attacks within the network. The number of victims and specific sectors targeted depends on the attacker&rsquo;s objectives and scope of the campaign. If the attack succeeds, an attacker could gain complete control over the user&rsquo;s email account and associated data, leading to significant data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Outlook VBA Template Modification</code> to your SIEM to identify unauthorized modifications to the <code>VbaProject.OTM</code> file based on file creation events.</li>
<li>Enable Sysmon file creation logging (Event ID 11) to activate the <code>Detect Outlook VBA Template Modification</code> rule.</li>
<li>Implement application control policies to restrict unauthorized modifications to Outlook VBA files as described in the &ldquo;Response and remediation&rdquo; section of the source.</li>
<li>Monitor file creation events related to <code>VbaProject.OTM</code> in the specified paths (<code>C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Outlook\\VbaProject.OTM</code>) as highlighted in the rule query.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>vba</category><category>outlook</category><category>windows</category></item><item><title>Unsecured Outlook Credentials Access in Windows Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-unsecured-outlook-credentials-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unsecured-outlook-credentials-access/</guid><description>An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.</description><content:encoded><![CDATA[<p>Attackers may attempt to access unsecured Outlook credentials stored within the Windows registry to compromise user email accounts. This involves leveraging tools or scripts to directly read sensitive registry keys containing password or authentication information. This activity often occurs after initial access has been gained through phishing, exploitation of vulnerabilities, or other means. Successful compromise of Outlook credentials can lead to significant data breaches, financial losses, and reputational damage. The credential access activity is detected via Windows Security Event logs, specifically Event ID 4663, focusing on registry paths associated with Outlook profiles. Multiple stealers and keyloggers have been observed utilizing this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via phishing, exploiting vulnerabilities, or other methods.</li>
<li>The attacker executes a malicious process (e.g., Snake Keylogger) on the compromised system.</li>
<li>The malicious process attempts to access the Windows registry using standard Windows APIs.</li>
<li>The process targets specific registry paths where Outlook stores profile information: <code>*\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676*</code> and <code>*\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676*</code>.</li>
<li>Windows Security Event logging generates Event ID 4663 when the registry object is accessed.</li>
<li>The attacker extracts the unsecured Outlook credentials from the registry.</li>
<li>The attacker uses the stolen credentials to access the victim&rsquo;s Outlook account.</li>
<li>The attacker exfiltrates sensitive information, sends malicious emails, or performs other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Outlook credentials can lead to unauthorized access to email accounts, enabling attackers to steal sensitive information, impersonate users, and conduct further malicious activities. This can result in significant financial losses, data breaches, and reputational damage. The impact ranges from individual user compromise to enterprise-wide breaches depending on the scope of the attack. Threat actors may use compromised accounts to launch further attacks, potentially impacting other systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy for Windows Security Event logs to track Event ID 4663 (per the &ldquo;how_to_implement&rdquo; section) and monitor registry access.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Outlook Registry Access</code> to identify unauthorized processes accessing Outlook credential registry paths.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Detect Suspicious Outlook Registry Access</code> to determine if credential theft occurred.</li>
<li>Monitor for processes other than <code>outlook.exe</code> accessing the specific registry paths outlined in the <code>search</code> field to identify potentially malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category></item><item><title>Suspicious MS Office Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</guid><description>Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook), which are commonly targeted for initial access via malicious documents or macro exploitation. The rule focuses on identifying anomalous process executions originating from these applications, a tactic often employed to execute arbitrary code or download additional payloads. Attackers leverage Office applications due to their widespread use and inherent scripting capabilities. Successful exploitation can lead to arbitrary code execution, lateral movement, and data exfiltration. This detection helps defenders identify and respond to potential security breaches originating from Microsoft Office applications, reducing the attack surface and minimizing potential damage. The rule specifically looks for processes like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, <code>wscript.exe</code>, and others being spawned by Office applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious Microsoft Office document (e.g., Word, Excel) via email or downloads it from a compromised website.</li>
<li>The user opens the document, triggering the execution of a malicious macro or exploitation of a vulnerability within the Office application.</li>
<li>The Office application (e.g., <code>winword.exe</code>, <code>excel.exe</code>) spawns a suspicious child process such as <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The spawned process executes a command to download a malicious payload from a remote server using <code>bitsadmin.exe</code> or <code>certutil.exe</code>.</li>
<li>The downloaded payload is a reverse shell or a malware dropper, which establishes a connection to an attacker-controlled server.</li>
<li>The attacker gains initial access to the compromised system and attempts to escalate privileges and perform reconnaissance.</li>
<li>The attacker uses discovery commands with <code>net.exe</code>, <code>ipconfig.exe</code>, <code>tasklist.exe</code>, and <code>whoami.exe</code> to map the environment and identify valuable targets.</li>
<li>The attacker moves laterally to other systems within the network, aiming to compromise critical assets and achieve their objectives, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain initial access to the compromised system. This can result in data theft, installation of malware, lateral movement to other systems, and ultimately, significant disruption to business operations. The widespread use of Microsoft Office makes it a prime target, potentially affecting a large number of users and organizations. Failure to detect and respond to these attacks can result in significant financial losses, reputational damage, and compromise of sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Event Logs) to ensure the visibility required to detect suspicious child processes.</li>
<li>Deploy the Sigma rule <code>Suspicious MS Office Child Process</code> to your SIEM and tune the rule based on your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the <code>Suspicious MS Office Child Process</code> Sigma rule by examining the parent process tree and associated network connections.</li>
<li>Implement application control policies to restrict the execution of unauthorized processes from Microsoft Office applications.</li>
<li>Regularly update Microsoft Office applications to patch known vulnerabilities.</li>
<li>Block known malicious domains or IPs associated with malware delivery and command and control, based on threat intelligence feeds and IOCs from external sources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>discovery</category><category>windows</category></item><item><title>Potential Masquerading as Communication Apps</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-communication-apps/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-communication-apps/</guid><description>Attackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.</description><content:encoded><![CDATA[<p>Attackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications. This involves using names and icons that resemble trusted applications like Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird to trick users and bypass security measures. This technique can be used to conceal malicious activity, bypass allowlists, or trick users into executing malware. The detection rule identifies suspicious instances by checking for unsigned or improperly signed processes, ensuring they match known trusted signatures, which helps in flagging potential threats that mimic trusted communication tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>The attacker deploys a malicious executable onto the compromised system.</li>
<li>The attacker renames the malicious executable to resemble a legitimate communication application, such as &ldquo;slack.exe&rdquo; or &ldquo;Teams.exe&rdquo;.</li>
<li>The attacker modifies or removes the code signature of the malicious executable to avoid detection based on trusted publishers.</li>
<li>The attacker executes the renamed and potentially unsigned malicious executable.</li>
<li>The masqueraded process performs malicious actions, such as establishing a reverse shell or downloading additional payloads.</li>
<li>The attacker uses the compromised system to move laterally within the network, escalating privileges and compromising additional systems.</li>
<li>The final objective is to exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful masquerading attacks can lead to significant security breaches, including data theft, system compromise, and financial loss. By disguising malicious processes as legitimate communication apps, attackers can bypass security controls and operate undetected for extended periods. This can result in widespread damage and disruption, as well as reputational damage for the targeted organization. The impact can range from a few compromised systems to a complete network takeover, depending on the attacker&rsquo;s objectives and the effectiveness of the masquerading technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Masquerading as Communication Apps - Generic&rdquo; to your SIEM and tune for your environment to detect unsigned or improperly signed communication applications.</li>
<li>Deploy the Sigma rule &ldquo;Potential Masquerading as Communication Apps - Specific&rdquo; to your SIEM and tune for your environment to detect unsigned or improperly signed instances of specific communication applications.</li>
<li>Enable process creation logging on Windows systems to capture the necessary events for the Sigma rules.</li>
<li>Review and validate the code signatures of all communication apps on your systems to ensure they are properly signed by trusted entities.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Suspicious Inter-Process Communication via Outlook COM</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-com-abuse/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-com-abuse/</guid><description>Adversaries may target user email to collect sensitive information or send email on their behalf via API by abusing Outlook's Component Object Model (COM) interface from unusual processes.</description><content:encoded><![CDATA[<p>Attackers may exploit the Component Object Model (COM) interface in Microsoft Outlook to automate tasks such as sending emails or exfiltrating sensitive information. This attack involves leveraging unusual processes to interact with Outlook, potentially bypassing security measures. The activity is detected by monitoring for unexpected processes initiating communication with Outlook, especially those lacking trusted signatures or recently modified, indicating potential malicious activity. The detection focuses on identifying processes like rundll32.exe, mshta.exe, powershell.exe, cmd.exe, cscript.exe, and wscript.exe interacting with Outlook. This activity can lead to unauthorized access to sensitive email data or the ability to send malicious emails from compromised accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker uses a scripting language or executable, such as PowerShell or cmd.exe, to interact with the Outlook application via its COM interface.</li>
<li>The script attempts to enumerate mailboxes and email messages.</li>
<li>Sensitive data from the email messages is collected and prepared for exfiltration.</li>
<li>The script initiates a network connection to a remote server controlled by the attacker.</li>
<li>The collected data is then exfiltrated to the attacker&rsquo;s server.</li>
<li>Alternatively, the attacker crafts and sends emails from the compromised Outlook account to further propagate malware or conduct phishing campaigns.</li>
<li>The attacker cleans up any traces of the malicious script or executables to maintain persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the compromise of sensitive information contained within user email accounts. This includes confidential business communications, personal data, and potentially credentials. The impact extends to potential data breaches, financial losses, and reputational damage. The number of affected users and the extent of the damage depends on the attacker&rsquo;s objectives and the level of access achieved within the compromised email environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unusual processes (rundll32.exe, mshta.exe, powershell.exe, pwsh.exe, cmd.exe, regsvr32.exe, cscript.exe, wscript.exe) spawning or interacting with OUTLOOK.EXE. Deploy the &ldquo;Suspicious Outlook COM abuse by Scripting Host&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Implement code signature validation for all executables in your environment. This will help identify and block unsigned or untrusted executables.</li>
<li>Monitor for any network activity associated with the identified unusual processes. This helps to identify potential data exfiltration attempts.</li>
<li>Enable process creation logging with command line arguments to enhance visibility into potential malicious activities. This is critical for the Sigma rules to function correctly.</li>
<li>Regularly review and update your endpoint protection policies to ensure that similar threats are detected and blocked.</li>
<li>Investigate any alerts generated by the &ldquo;Suspicious Outlook COM abuse by New Process&rdquo; Sigma rule, correlating with user activity and network connections.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>email_collection</category><category>com_abuse</category><category>windows</category></item><item><title>Suspicious Command Prompt Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</guid><description>This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.</description><content:encoded><![CDATA[<p>This detection identifies suspicious network connections initiated by the command prompt (cmd.exe) on Windows systems. The rule focuses on cmd.exe processes executed with specific arguments, such as those indicating script execution (e.g., *.bat, *.cmd), access to remote resources (e.g., URLs), or those spawned by Microsoft Office applications (Excel, Word, etc.). Attackers frequently abuse cmd.exe to download malicious payloads, execute commands, or establish command and control channels. This detection aims to identify such potentially malicious activity by correlating process creation events with subsequent network connections. The rule excludes common private and reserved IP address ranges to reduce false positives. The targeted systems are Windows endpoints where adversaries attempt to leverage cmd.exe for malicious purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious document (e.g., Word, Excel) or executes a seemingly benign application.</li>
<li>The document or application contains a macro or script that initiates a cmd.exe process.</li>
<li>The cmd.exe process is launched with arguments indicating script execution (<code>/c</code>, <code>/k</code>) and referencing a remote resource (e.g., a URL) or a local batch file.</li>
<li>The cmd.exe process attempts to download a payload from a remote server using protocols like HTTP, HTTPS, or FTP.</li>
<li>The downloaded payload is saved to disk, often with a disguised filename.</li>
<li>The cmd.exe process executes the downloaded payload, initiating further malicious actions.</li>
<li>The malicious payload establishes a command and control (C2) channel with a remote server.</li>
<li>The attacker uses the C2 channel to send commands to the compromised system, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of Windows endpoints, potentially enabling attackers to download and execute malicious payloads, establish command and control channels, and perform further malicious activities such as data theft, lateral movement, or ransomware deployment. While this detection has a low severity, it serves as an early warning sign of potential compromise and should be investigated promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the full context of cmd.exe executions.</li>
<li>Monitor network connections from cmd.exe processes, focusing on connections to external IP addresses, using a network monitoring solution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious cmd.exe network connections.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on cmd.exe processes spawned by Office applications or those executing scripts from remote URLs.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-prompt</category><category>network-connection</category><category>windows</category><category>execution</category><category>command-and-control</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item></channel></rss>