<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Low — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/severities/low/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:49:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/severities/low/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential PowerShell Obfuscated Script via High Entropy</title><link>https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</link><pubDate>Mon, 04 May 2026 14:49:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</guid><description>This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.</description><content:encoded><![CDATA[<p>Attackers frequently employ PowerShell obfuscation techniques to evade detection and hinder analysis. These techniques involve encoding, encrypting, or compressing PowerShell scripts to mask their true intent. This detection identifies PowerShell script blocks exhibiting high entropy and non-uniform character distributions, statistical characteristics often associated with obfuscated content. The rule specifically targets script blocks longer than 1000 characters with entropy bits &gt;= 5.5 and surprisal standard deviation &gt; 0.7. This detection is designed to highlight potentially malicious PowerShell activity that warrants further investigation by security analysts and incident responders. This rule was created by Elastic and last updated on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., via phishing or exploit).</li>
<li>The attacker leverages PowerShell, a built-in Windows scripting language, to execute malicious commands.</li>
<li>The attacker uses obfuscation techniques (encoding, encryption, compression) to disguise the PowerShell script&rsquo;s true intent.</li>
<li>The obfuscated script is executed, bypassing basic signature-based detections.</li>
<li>The script may download and execute additional payloads or establish persistence.</li>
<li>The script performs malicious actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using obfuscated PowerShell can lead to various negative impacts, including data breaches, system compromise, and disruption of services. The low severity reflects the need for further analysis to confirm malicious intent, given potential false positives from legitimate encoded scripts. While the exact number of affected systems and sectors is unknown, the widespread use of PowerShell makes this a potentially significant threat across many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to generate the necessary events (4104) as outlined in the setup instructions: <a href="https://ela.st/powershell-logging-setup">https://ela.st/powershell-logging-setup</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the thresholds (<code>powershell.file.script_block_length</code>, <code>powershell.file.script_block_entropy_bits</code>, <code>powershell.file.script_block_surprisal_stdev</code>) based on your environment&rsquo;s baseline.</li>
<li>Investigate alerts generated by the Sigma rule, focusing on execution context (<code>user.name</code>, <code>host.name</code>), script provenance (<code>file.path</code>), and reconstructed script content (<code>powershell.file.script_block_text</code>).</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> section for detailed triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>obfuscation</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Potential Remote File Execution via MSIEXEC</title><link>https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</guid><description>The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a built-in Windows component used for installing, modifying, and removing software. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files, bypassing security controls and potentially leading to initial access or defense evasion. This activity is often part of a broader attack chain, used to deliver and execute malicious payloads. The detection rule provided by Elastic identifies suspicious msiexec.exe activity by monitoring process starts, network connections, and child processes. It filters out known benign signatures and paths to highlight potential misuse. This detection is designed to work with Elastic Defend data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means to execute commands on the target system.</li>
<li>The attacker uses msiexec.exe with the <code>/V</code> parameter to initiate the installation of a remote MSI package. This allows the attacker to bypass typical execution restrictions.</li>
<li>Msiexec.exe attempts a network connection (T1105) to retrieve the remote MSI package from a malicious server.</li>
<li>Msiexec.exe spawns a child process to handle the installation of the downloaded MSI package.</li>
<li>The spawned child process executes malicious code embedded within the MSI package.</li>
<li>The malicious code performs actions such as installing malware, modifying system settings, or establishing persistence.</li>
<li>The attacker leverages the compromised system for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system and network. While this specific rule has a low risk score, it can be an early indicator of more serious attacks. It is crucial to investigate any alerts generated by this rule to determine the full scope and impact of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM to detect suspicious usage of <code>msiexec.exe</code> to install remote packages. Tune the rule for your environment by adding exceptions for legitimate software installation processes.</li>
<li>Enable process monitoring and network connection logging on Windows endpoints to provide the necessary data for the Sigma rule to function effectively (Data Source: Elastic Defend).</li>
<li>Review the &ldquo;Possible investigation steps&rdquo; section in the Elastic rule&rsquo;s documentation to investigate potential false positives and legitimate uses of <code>msiexec.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications, including potentially malicious MSI packages.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>msiexec</category><category>remote-file-execution</category><category>initial-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Microsoft CVE-2026-30656 Information Published</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</link><pubDate>Sun, 03 May 2026 07:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</guid><description>Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.</description><content:encoded><![CDATA[<p>On May 3, 2026, Microsoft published a security update guide entry for CVE-2026-30656. At this time, no details regarding the nature of the vulnerability, affected products, or potential impact are available. Defenders should monitor Microsoft&rsquo;s security resources for updates and apply patches as they become available. Due to the limited information, creating targeted detections is currently not possible. More information is required to understand the potential attack vectors and develop effective mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of details regarding CVE-2026-30656, a specific attack chain cannot be outlined at this time. The steps below represent a generic exploitation scenario:</p>
<ol>
<li>Initial Access: Attacker identifies a vulnerable system exposed to the network.</li>
<li>Exploitation: Attacker leverages CVE-2026-30656 to execute arbitrary code.</li>
<li>Privilege Escalation: Attacker escalates privileges to gain higher-level access.</li>
<li>Lateral Movement: Attacker moves laterally to other systems on the network.</li>
<li>Persistence: Attacker establishes persistent access to the compromised systems.</li>
<li>Data Exfiltration: Attacker exfiltrates sensitive data from the compromised network.</li>
<li>Impact: Attacker achieves their objective, such as data theft or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-30656 is currently unknown. Depending on the affected product and the nature of the vulnerability, successful exploitation could lead to a range of outcomes, including remote code execution, denial of service, or information disclosure. Without further details, the potential damage is difficult to assess, but defenders should prioritize monitoring for updates from Microsoft and promptly apply any released patches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656</a>) for updates and technical details regarding CVE-2026-30656.</li>
<li>When details are released, prioritize patching affected systems based on their criticality and exposure.</li>
<li>Review existing security controls and incident response plans to ensure they are adequate for addressing potential exploitation attempts targeting Microsoft products.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category></item><item><title>Rapid Enumeration of AWS S3 Buckets</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</guid><description>An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.</description><content:encoded><![CDATA[<p>This threat brief covers suspicious activity related to the rapid enumeration of AWS S3 buckets. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs from the same source IP address within a short timeframe. This pattern is often associated with reconnaissance efforts, security scanning tools, or post-compromise enumeration activities. The behavior is similar to that observed with CSPM tools and by threat actors like Team PCP. The detection specifically excludes AWS service principals and requires programmatic-style sessions (i.e., not Management Console credentials). It focuses on scenarios where resource and identity fields are populated to avoid skewed results from null values. The detection threshold is set to greater than 15 distinct <code>aws.cloudtrail.resources.arn</code> values within a 10-second window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment using compromised credentials or through an exposed IAM role. (T1530)</li>
<li>The attacker authenticates to AWS using the obtained credentials, creating a programmatic session.</li>
<li>The attacker issues a series of <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code> API calls to S3.</li>
<li>These API calls are directed towards multiple distinct S3 buckets within a short timeframe (10 seconds).</li>
<li>The attacker collects information about the bucket&rsquo;s access control lists (ACLs), public access blocks, policies, versioning status, and other metadata. (T1526, T1580, T1619)</li>
<li>The collected information is analyzed to identify publicly accessible buckets, misconfigurations, or sensitive data storage locations.</li>
<li>The attacker uses identified vulnerabilities to exfiltrate data.</li>
<li>The attacker attempts lateral movement within the AWS environment, leveraging the discovered information to compromise other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of S3 buckets can lead to the discovery of sensitive data, misconfigurations, and publicly accessible resources. This can result in data breaches, unauthorized access, and further compromise of the AWS environment. The enumeration allows an attacker to map out the S3 storage landscape, identifying targets for data exfiltration or privilege escalation. The rapid nature of the enumeration suggests automated scanning or reconnaissance, potentially indicating a larger attack campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect rapid S3 bucket enumeration activity based on AWS CloudTrail logs, adjusting the threshold of 15 distinct buckets to suit your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address (<code>source.ip</code>), AWS principal ARN (<code>aws.cloudtrail.user_identity.arn</code>), and the list of accessed buckets (<code>aws.cloudtrail.resources.arn</code>).</li>
<li>Review IAM policies associated with the identified principal to ensure least privilege for S3 read APIs.</li>
<li>Monitor CloudTrail logs for related events, such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, <code>AssumeRole</code>, or IAM changes, occurring within ±30 minutes of the detected enumeration activity.</li>
<li>Implement network-level restrictions on the source IP address if it is not authorized to perform S3 enumeration.</li>
<li>Document approved scanning accounts and add user agent filters to the provided Sigma rule to reduce noise from those identities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>s3</category><category>cloudtrail</category><category>discovery</category><category>enumeration</category><category>reconnaissance</category></item><item><title>AWS Discovery API Calls via CLI from a Single Resource</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</guid><description>This rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious AWS reconnaissance activity originating from the AWS CLI. It triggers when a single AWS identity (IAM user, role, or service principal) makes more than five unique discovery-related API calls (such as <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, or <code>Generate*</code>) within a 10-second window. The rule is designed to detect adversaries attempting to map out an AWS environment after gaining unauthorized access through compromised credentials or a compromised EC2 instance. The tool focuses on API calls related to key AWS services like EC2, IAM, S3, and KMS. This rule helps defenders identify and respond to early-stage reconnaissance activity, preventing further exploitation or data exfiltration. The rule excludes activity from AWS service accounts and the AWS Management Console, and it requires a minimum stack version of 9.2.0 with AWS integration version 4.6.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to an AWS environment, potentially through compromised credentials or by compromising an EC2 instance.</li>
<li><strong>Credential Usage:</strong> The attacker leverages the AWS CLI to interact with the AWS environment using the compromised credentials.</li>
<li><strong>Reconnaissance:</strong> The attacker initiates a series of discovery API calls to gather information about the AWS infrastructure. This includes using <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, and <code>Generate*</code> commands.</li>
<li><strong>Resource Enumeration:</strong> The attacker enumerates various AWS resources, including EC2 instances, IAM roles, S3 buckets, and KMS keys, by querying their respective APIs.</li>
<li><strong>Target Identification:</strong> The attacker analyzes the gathered information to identify potential targets for further exploitation, such as vulnerable EC2 instances or misconfigured S3 buckets.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the compromised credentials have limited permissions, the attacker might attempt to escalate privileges to gain broader access to the AWS environment.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker might attempt to move laterally to other AWS accounts or services to expand their reach and impact.</li>
<li><strong>Data Exfiltration/Impact:</strong> Based on the attacker&rsquo;s goals, they may attempt to exfiltrate sensitive data or cause disruption by modifying or deleting resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to sensitive data, such as customer information, intellectual property, or financial records. The attacker could also disrupt business operations by modifying or deleting critical resources. Identifying and responding to such activity in a timely manner can help prevent significant damage and maintain the security and integrity of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to your SIEM and tune for your environment to detect the described reconnaissance activity.</li>
<li>Enable AWS CloudTrail logging for all AWS regions and accounts in your organization to ensure the required logs are available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the affected AWS identity, the source IP address, and the specific API calls made (as captured by the Sigma rule).</li>
<li>If suspicious activity is confirmed, follow AWS&rsquo;s incident-handling guidance, including disabling or rotating the access key used and restricting outbound connectivity from the source (reference the AWS Security Incident Response Guide).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>cloudtrail</category><category>discovery</category></item><item><title>Microsoft CVE-2026-35236 Information Published</title><link>https://feed.craftedsignal.io/briefs/2024-05-cve-2026-35236-info-published/</link><pubDate>Thu, 23 Apr 2026 07:47:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-cve-2026-35236-info-published/</guid><description>Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft released a security advisory indicating the existence of CVE-2026-35236.
At the time of the advisory, no details were provided regarding the nature of the vulnerability,
affected products, potential impact, or mitigation strategies. This lack of information makes it
difficult to assess the immediate risk, but the existence of a CVE ID suggests the potential for
future exploitation. Defenders should monitor for updates from Microsoft regarding CVE-2026-35236
and prepare to implement patches or mitigations as they become available. The absence of specific
information at this stage necessitates a proactive monitoring approach to detect any potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Disclosure:</strong> Microsoft publishes the CVE ID CVE-2026-35236 without any details.</li>
<li><strong>Information Gathering (Attacker):</strong> Attackers monitor Microsoft&rsquo;s channels and other sources for further information on CVE-2026-35236.</li>
<li><strong>Vulnerability Analysis (Attacker):</strong> Once details are released (hypothetically), attackers analyze the vulnerability to develop an exploit.</li>
<li><strong>Exploit Development (Attacker):</strong> An exploit is created, potentially leveraging publicly available tools or custom-developed code.</li>
<li><strong>Target Selection (Attacker):</strong> Attackers identify vulnerable systems based on the (currently unknown) affected product.</li>
<li><strong>Exploitation Attempt (Attacker):</strong> The exploit is deployed against the target system.</li>
<li><strong>Privilege Escalation (Attacker):</strong> (Hypothetical) If the initial exploit doesn&rsquo;t provide sufficient privileges, further steps are taken to escalate privileges.</li>
<li><strong>Impact (Attacker):</strong> (Hypothetical) Depending on the vulnerability, the impact could range from remote code execution to denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The current impact is unknown due to the lack of information about the vulnerability associated with CVE-2026-35236.
If the vulnerability is severe and widely exploitable, successful attacks could lead to data breaches, system compromise,
or denial of service. The number of potential victims and affected sectors will depend on the affected product and its deployment scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Continuously monitor the Microsoft Security Response Center for updates regarding CVE-2026-35236 (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35236)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35236)</a>.</li>
<li>Once Microsoft releases details on CVE-2026-35236, prioritize patching or implementing recommended mitigations.</li>
<li>Deploy generic detection rules to identify exploitation attempts based on unusual network activity or suspicious process creation.</li>
<li>Review existing security controls and ensure they are up-to-date to protect against potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>microsoft</category></item><item><title>AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</guid><description>An AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.</description><content:encoded><![CDATA[<p>This threat brief details detection of rapid enumeration of AWS S3 bucket configurations. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs across numerous buckets within a short timeframe. This pattern is consistent with automated reconnaissance, security scanning, or post-compromise enumeration. The activity is detected by monitoring AWS CloudTrail logs for specific API calls such as <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code>. The detection logic excludes AWS service principals and sessions using Management Console credentials to reduce false positives. This activity is relevant for defenders as it can signal early-stage reconnaissance by threat actors like Team PCP, or unauthorized data discovery within the AWS environment. The rule uses a threshold of 15 distinct buckets accessed within 10 seconds to identify suspicious behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker uses the acquired credentials to authenticate to the AWS environment.</li>
<li>The attacker executes a script or tool that calls multiple S3 APIs (e.g., <code>GetBucketAcl</code>, <code>GetBucketPolicy</code>) to gather information about S3 buckets.</li>
<li>The tool iterates through a list of buckets, querying the configuration of each.</li>
<li>The attacker collects the responses from the S3 API calls, mapping out bucket names, permissions, and access control lists.</li>
<li>The attacker analyzes the collected data to identify potentially sensitive data or misconfigured buckets.</li>
<li>Based on the findings, the attacker may proceed to exfiltrate data from accessible buckets (T1530).</li>
<li>The attacker may also attempt to modify bucket policies or access controls to gain further access or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance of S3 bucket configurations allows attackers to identify vulnerable buckets, potentially leading to data breaches or unauthorized access to sensitive information. The source material does not provide specific victim counts or sectors. However, the impact can range from exposure of confidential data to full compromise of the AWS environment, depending on the level of access gained and the sensitivity of the data stored in the targeted buckets. Identifying the activity early can prevent further exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect rapid S3 bucket posture API calls (see: &ldquo;AWS S3 Rapid Bucket Enumeration&rdquo;).</li>
<li>Review IAM policies and enforce least privilege on S3 read APIs to limit the scope of potential reconnaissance activities.</li>
<li>Monitor CloudTrail logs for the same <code>aws.cloudtrail.user_identity.arn</code> and <code>source.ip</code> within approximately ±30 minutes for follow-on patterns such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, or <code>AssumeRole</code> activities (see Overview).</li>
<li>Rotate or disable keys for the affected identity, revoke active role sessions where possible, and restrict the source IP at the network layer if it is not authorized (see Overview).</li>
<li>Whitelist approved scanning accounts and tune the Sigma rule to reduce noise from those identities (see Overview).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>s3</category><category>reconnaissance</category></item><item><title>AWS SSM Command Document Created by Rare User</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-ssm-rare-user/</guid><description>An AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.</description><content:encoded><![CDATA[<p>This rule identifies when an AWS Systems Manager (SSM) command document is created by a user or role who does not typically perform this action. The rule focuses on detecting anomalous creation of SSM command documents. Adversaries may create SSM command documents to execute commands on managed instances, potentially leading to unauthorized access, command and control, and data exfiltration. The rule utilizes AWS CloudTrail logs to monitor the <code>CreateDocument</code> API call within the SSM service. This activity is flagged when the user or role creating the document deviates from established patterns, indicating a potential security risk. This detection is relevant for organizations using AWS SSM for managing their infrastructure and aims to prevent unauthorized command execution on managed instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exposed IAM role.</li>
<li>The attacker attempts to create a new SSM Command document using the <code>CreateDocument</code> API call.</li>
<li>The <code>CreateDocument</code> API call is logged by AWS CloudTrail with details about the user identity, request parameters, and document description.</li>
<li>The detection rule analyzes CloudTrail logs, specifically looking for the <code>CreateDocument</code> event with a document type of <code>Command</code>.</li>
<li>The rule identifies the user or role associated with the <code>CreateDocument</code> API call by inspecting the <code>aws.cloudtrail.user_identity.arn</code> field.</li>
<li>If the user or role is considered rare or unusual for creating SSM Command documents within the organization, the rule triggers an alert.</li>
<li>The attacker could then use the created document to execute arbitrary commands on managed instances.</li>
<li>Successful execution of these commands leads to various impacts, including unauthorized access, command and control, data exfiltration, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this technique can lead to unauthorized access to AWS resources, potentially affecting all systems managed by AWS SSM in the targeted environment. The creation of malicious SSM command documents can lead to data exfiltration, system compromise, or denial of service. If successful, this can impact hundreds or thousands of systems depending on the scope of AWS SSM usage in the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SSM Command Document Created by Rare User&rdquo; to your SIEM, ensuring proper indexing of CloudTrail logs (index = [&ldquo;filebeat-*&rdquo;, &ldquo;logs-aws.cloudtrail-*&rdquo;]).</li>
<li>Review the <code>aws.cloudtrail.request_parameters.content</code> field in the CloudTrail logs for any suspicious commands within the created SSM document.</li>
<li>Restrict SSM document creation permissions to specific, trusted roles or users to prevent unauthorized document creation as mentioned in the overview.</li>
<li>Monitor the <code>SendCommand</code> API call related to the created SSM document to see if it is used to execute commands on managed instances, as described in the triage section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>ssm</category><category>execution</category></item><item><title>Kubernetes Secret Access via Unusual User Agent</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</link><pubDate>Mon, 06 Apr 2026 12:05:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</guid><description>Detects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where Kubernetes secrets are accessed through atypical means, specifically flagging requests originating from unusual user agents, usernames, or source IPs. The underlying assumption is that after compromising a pod or stealing a kubeconfig file, adversaries often attempt to harvest sensitive information stored as secrets within the Kubernetes cluster. This includes service account tokens, registry credentials, cloud keys, and other critical data. This activity can lead to privilege escalation and lateral movement within the cluster or the wider cloud environment. The rule focuses on identifying deviations from established access patterns to Kubernetes secrets to detect potentially malicious activity. The rule leverages data from kubernetes.audit_logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to the Kubernetes cluster, potentially by exploiting a vulnerability in a pod or by stealing a kubeconfig file.</li>
<li><strong>Discovery:</strong> The attacker enumerates available resources within the cluster to identify potential targets, including secrets. This might involve using <code>kubectl get secrets --all-namespaces</code>.</li>
<li><strong>Credential Theft:</strong> The attacker attempts to access Kubernetes secrets using an unusual user agent, source IP, or user name. For example, using <code>curl</code> from a compromised pod to access the Kubernetes API.</li>
<li><strong>Data Exfiltration:</strong> The attacker retrieves the contents of the secrets. Secrets might contain service account tokens, registry credentials, cloud IAM keys, database passwords, etc.</li>
<li><strong>Lateral Movement:</strong> With stolen credentials, the attacker attempts to move laterally within the cluster or the connected cloud environment. They might use the credentials to access other pods, services, or cloud resources.</li>
<li><strong>Privilege Escalation:</strong> The attacker uses the stolen credentials to escalate their privileges within the Kubernetes cluster or the cloud environment. For example, creating new roles or role bindings.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating backdoors or modifying existing deployments. This might involve creating new pods or modifying existing deployments.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data theft, denial of service, or infrastructure compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive data stored within Kubernetes secrets. This could include database credentials, API keys, and service account tokens. The impact can range from unauthorized access to sensitive data, to complete compromise of the Kubernetes cluster and the connected cloud environment. This can affect any organization using Kubernetes to manage their applications, potentially leading to data breaches, service disruptions, and financial losses. The severity depends on the sensitivity of the data stored in the compromised secrets and the level of access the attacker gains.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secret Access via Unusual User Agent</code> to your SIEM and tune for your environment to detect unusual access patterns to Kubernetes secrets.</li>
<li>Investigate and validate any alerts generated by the deployed Sigma rule, focusing on the requesting identity, source IP, and user agent to confirm whether they align with approved access records.</li>
<li>Implement RBAC least privilege to limit access to secrets to only the required service accounts and users to minimize the potential impact of credential theft.</li>
<li>Monitor Kubernetes audit logs (<code>logs-kubernetes.audit_logs-*</code>) for suspicious activity, including unusual API calls and access patterns to sensitive resources.</li>
<li>Regularly rotate secrets and credentials to minimize the window of opportunity for attackers to use stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Unusual City for Azure Activity Logs Event</title><link>https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</link><pubDate>Thu, 02 Apr 2026 13:35:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-unusual-azure-city/</guid><description>A machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.</description><content:encoded><![CDATA[<p>This detection identifies Azure Activity Logs activity originating from a city that is atypical for the specific event action being performed. The underlying mechanism is a machine learning job, <code>azure_activitylogs_rare_event_action_for_a_city_ea</code>, designed to surface anomalous geolocation patterns. The rule is triggered when the anomaly score exceeds 50. Such deviations can indicate compromised credentials used by an attacker operating from a different geography than the authorized user. This activity can be an early indicator of account abuse, potentially preceding broader impact such as data exfiltration or resource exploitation. The rule is designed to be used with Elastic Stack version 9.4.0 and later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains valid Azure credentials (username/password or service principal keys) through phishing, credential stuffing, or other means.</li>
<li><strong>Initial Access:</strong> The attacker uses the compromised credentials to log in to the Azure environment from an unusual geographic location (city).</li>
<li><strong>Activity Log Generation:</strong> The login and subsequent actions generate Azure Activity Logs entries.</li>
<li><strong>Resource Access/Modification:</strong> The attacker performs actions such as adding privileged role assignments, creating virtual machines, modifying network configurations, or accessing Key Vault secrets.</li>
<li><strong>Lateral Movement (Potential):</strong> The attacker may use the initially compromised account to discover and access other resources or accounts within the Azure environment.</li>
<li><strong>Data Exfiltration/Resource Exploitation (Potential):</strong> The attacker exfiltrates sensitive data or uses compromised resources for malicious purposes like cryptocurrency mining.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, modification of critical infrastructure, and deployment of malicious resources within the Azure environment. The impact can range from data breaches and financial losses to disruption of services. While the risk score of this detection is low, further investigation is required to determine the extent and nature of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the associated Machine Learning job (<code>azure_activitylogs_rare_event_action_for_a_city_ea</code>) and ensure that the Azure Activity Logs integration is properly configured to provide the necessary data.</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> field to understand possible investigation steps, including validating user presence in the region and enriching the source IP.</li>
<li>Implement response and remediation steps outlined in the rule <code>note</code> field such as revoking active sessions, resetting passwords, and reverting changes executed from the unusual city.</li>
<li>Configure Conditional Access policies with country allowlists and named egress IP ranges, as recommended in the rule&rsquo;s <code>note</code> field, to prevent logins from unexpected locations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>anomaly-detection</category></item><item><title>Spike in Successful Logon Events from a Source IP</title><link>https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</link><pubDate>Thu, 02 Apr 2026 13:25:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</guid><description>A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.</description><content:encoded><![CDATA[<p>This alert triggers when an Elastic machine learning job identifies a significant spike in successful authentication events originating from a specific source IP address. The underlying cause may range from legitimate administrative activity to malicious attempts at credential compromise, such as password spraying, user enumeration, or brute force attacks. The rule requires a minimum Elastic Stack version of 9.4.0 and relies on data ingested via Elastic Defend, Auditd Manager, or the System integration. The machine learning job associated with this rule is named &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo;. While build servers and CI systems can trigger this alert as false positives, its presence should always prompt investigation to rule out credential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a network or system (not explicitly described in source).</li>
<li>Credential Harvesting: The attacker attempts to gather valid credentials through password spraying or brute-force attacks (T1110, T1110.003).</li>
<li>Account Discovery: The attacker enumerates user accounts to identify potential targets, often performed in conjunction with password attacks.</li>
<li>Successful Authentication: Using compromised credentials, the attacker successfully authenticates to a system or service (T1078, T1078.002, T1078.003).</li>
<li>Lateral Movement: After successful authentication, the attacker potentially moves laterally within the network using valid accounts (not explicitly described in source).</li>
<li>Privilege Escalation: The attacker may attempt to escalate privileges to gain higher-level access (not explicitly described in source).</li>
<li>Data Exfiltration/Impact: After gaining sufficient access, the attacker may exfiltrate sensitive data or cause damage to the system or network (not explicitly described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and services. The number of affected users and the extent of the damage depend on the scope of the compromised credentials and the attacker&rsquo;s objectives. This can impact any sector, as credential compromise is a common attack vector across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and configure the Elastic Defend, Auditd Manager, or System integrations to provide the necessary data for the machine learning job (see Setup section).</li>
<li>Install the associated Machine Learning job &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo; to enable the detection (see Setup section).</li>
<li>Tune the anomaly threshold of the machine learning job based on your environment to reduce false positives (anomaly_threshold metadata).</li>
<li>Investigate alerts triggered by this rule, focusing on identifying the involved assets, users, and source IP addresses (see Note section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>brute-force</category><category>password-spraying</category></item><item><title>Unusual Spike in Bytes Written to External Device Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2026-04-high-bytes-written-to-external-device/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-high-bytes-written-to-external-device/</guid><description>A machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.</description><content:encoded><![CDATA[<p>The Data Exfiltration Detection integration, part of the Elastic Security suite, includes a machine learning job designed to detect anomalies in data transfer patterns to external devices. This job, named &ldquo;ded_high_bytes_written_to_external_device,&rdquo; identifies unusual increases in the amount of data written to external devices, which could indicate data exfiltration attempts. The system establishes a baseline of normal activity and flags deviations from that baseline, operating on a 15-minute interval and examining data from the preceding two hours. While this rule is intended to detect malicious data exfiltration, legitimate activities like backups, software updates, archiving, and media creation can trigger false positives. The rule is enabled via the Data Exfiltration Detection integration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system via compromised credentials or other means.</li>
<li>The attacker enumerates sensitive data on the compromised system.</li>
<li>The attacker stages the data for exfiltration, possibly compressing or archiving it.</li>
<li>The attacker connects an external device (e.g., USB drive) to the system.</li>
<li>The attacker initiates a large data transfer to the external device.</li>
<li>The Data Exfiltration Detection machine learning job detects a significant increase in bytes written to the external device, triggering an alert.</li>
<li>The attacker removes the external device containing the exfiltrated data.</li>
<li>The attacker uses the external device to access the stolen data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data exfiltration event can result in the loss of sensitive information, potentially leading to financial losses, reputational damage, legal repercussions, and competitive disadvantage. Although the specific number of victims and targeted sectors are not specified, the potential impact is broad, affecting any organization that stores sensitive data on systems accessible to malicious actors. The severity depends on the nature and volume of the exfiltrated data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and tune the Data Exfiltration Detection integration&rsquo;s configuration, specifically the &ldquo;ded_high_bytes_written_to_external_device&rdquo; machine learning job, to reduce false positives related to legitimate data transfer activities.</li>
<li>Implement and enforce data transfer policies to restrict the unauthorized use of external devices and ensure compliance with organizational security standards.</li>
<li>Deploy endpoint detection and response (EDR) solutions to enhance visibility and control over data movements to external devices, as recommended in the rule&rsquo;s response and remediation guidance.</li>
<li>Investigate any alerts generated by the &ldquo;Spike in Bytes Sent to an External Device&rdquo; rule (rule_id: &ldquo;35a3b253-eea8-46f0-abd3-68bdd47e6e3d&rdquo;) to determine the legitimacy of the data transfer and take appropriate action.</li>
<li>Consult the investigation guide provided in the rule&rsquo;s notes section to aid in the triage and analysis of potential data exfiltration incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data exfiltration</category><category>machine learning</category><category>external device</category></item><item><title>Kubectl Network Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-kubectl-network-modification/</link><pubDate>Wed, 01 Apr 2026 14:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-kubectl-network-modification/</guid><description>This rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.</description><content:encoded><![CDATA[<p>This detection rule identifies potential malicious activity involving the <code>kubectl</code> command-line tool, specifically focusing on modifications to network configurations within Kubernetes environments. The rule monitors for <code>kubectl</code> commands executed with arguments like &ldquo;port-forward&rdquo;, &ldquo;proxy&rdquo;, or &ldquo;expose,&rdquo; which can be used to manipulate network settings. The activity is considered suspicious when initiated from atypical parent processes or directories, such as temporary folders or user home directories. This behavior might indicate an adversary attempting to establish unauthorized access channels or exfiltrate sensitive data. The rule is designed to work with endpoint detection and response (EDR) solutions like Elastic Defend, Crowdstrike, SentinelOne, and cloud workload protection platforms. The rule was last updated on March 30, 2026, and is intended for use in production environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with <code>kubectl</code> installed and configured to interact with a Kubernetes cluster.</li>
<li>The attacker executes the <code>kubectl</code> command with arguments like <code>port-forward</code> to create a local port that forwards traffic to a service or pod within the cluster.</li>
<li>The attacker uses <code>kubectl proxy</code> to create a proxy server that allows them to access the Kubernetes API server from their local machine.</li>
<li>The attacker employs <code>kubectl expose</code> to create a new service that exposes a deployment, replication controller, or pod as a new Kubernetes service, potentially opening up unintended access points.</li>
<li>The attacker may execute these commands from a shell like <code>bash</code>, or from a script located in a temporary directory like <code>/tmp/</code> or <code>/var/tmp/</code>, to evade detection.</li>
<li>The attacker leverages the modified network configurations to establish unauthorized access to sensitive services or data within the Kubernetes cluster.</li>
<li>The attacker may use the proxied or forwarded connections to exfiltrate data from the cluster to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>kubectl</code> network configuration modification can lead to unauthorized access to sensitive data and services within a Kubernetes cluster. This can result in data breaches, service disruptions, and lateral movement within the cluster. The low severity score suggests that while the risk exists, the impact might be limited if proper Kubernetes security best practices are followed. The rule aims to detect these actions early, preventing potential damage to the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Elastic Defend integration or equivalent EDR solutions to monitor process execution and network connections (<code>Data Source: Elastic Defend</code>, <code>Data Source: Crowdstrike</code>, <code>Data Source: SentinelOne</code>).</li>
<li>Deploy the provided Sigma rule to detect suspicious <code>kubectl</code> commands with network-related arguments (<code>rules</code> section). Tune the rule based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process and the command-line arguments of the <code>kubectl</code> command (<code>rules</code> section, <code>Resources: Investigation Guide</code>).</li>
<li>Implement enhanced monitoring and logging for <code>kubectl</code> activities and network configuration changes within the Kubernetes cluster to proactively detect and respond to similar threats in the future (<code>Resources: Investigation Guide</code>).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>kubectl</category><category>kubernetes</category><category>command_and_control</category><category>network_configuration</category><category>linux</category><category>macos</category></item><item><title>CrowdStrike Falcon Flex for Services Expansion</title><link>https://feed.craftedsignal.io/briefs/2026-03-falcon-flex-services/</link><pubDate>Sat, 28 Mar 2026 08:13:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-falcon-flex-services/</guid><description>CrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.</description><content:encoded><![CDATA[<p>CrowdStrike has extended its Falcon Flex model to its services offering, allowing organizations to consume cybersecurity services with greater flexibility. This model enables organizations to draw down from a standalone services entitlement, applying it across CrowdStrike&rsquo;s services portfolio based on their specific priorities and operational needs. The Falcon Flex for Services covers incident response, proactive security services, advisory, platform services, and training. Additionally, CrowdStrike is introducing the Zero Dollar Flex Fund, providing qualifying new services customers with access to 200 hours of CrowdStrike Services at no initiation cost, including 160 hours of incident response and 40 hours of proactive services. This initiative aims to lower the barrier for organizations to engage with CrowdStrike&rsquo;s expertise, especially those seeking expert support before committing to a broader platform. The key benefit is a more adaptable way to consume CrowdStrike expertise over time, without requiring a new procurement cycle for every shift in priorities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This brief describes a service offering that enables rapid incident response, rather than a specific attack chain. Therefore, the typical attack chain steps do not apply. However, the service is designed to improve resilience against attacks, which can be described as follows:</p>
<ol>
<li>Initial Access: An attacker gains initial access to the target environment through various means such as phishing, vulnerability exploitation, or stolen credentials (not directly mentioned in the source).</li>
<li>Lateral Movement: The attacker attempts to move laterally within the network, escalating privileges to gain control over critical systems (not directly mentioned in the source).</li>
<li>Data Exfiltration: The attacker identifies and exfiltrates sensitive data from the compromised systems (not directly mentioned in the source).</li>
<li>Impact: The attacker deploys ransomware or causes other damage to disrupt business operations (not directly mentioned in the source).</li>
<li>Detection: The organization detects the intrusion, potentially through existing security tools or alerts (not directly mentioned in the source).</li>
<li>Activation of CrowdStrike Services: The organization leverages CrowdStrike Flex for Services to engage incident response experts.</li>
<li>Incident Response: CrowdStrike experts rapidly assess the scope of the breach, contain the attacker&rsquo;s activities, and begin remediation efforts.</li>
<li>Remediation and Recovery: CrowdStrike assists in recovering compromised systems, patching vulnerabilities, and implementing security enhancements to prevent future incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful utilization of CrowdStrike Flex for Services can significantly reduce the impact of a cyberattack by enabling rapid incident response and minimizing downtime. Organizations can pre-arrange incident response coverage, providing access to elite expertise and a more adaptable approach to consuming cybersecurity services over time. The Zero Dollar Flex Fund provides a direct path to CrowdStrike expertise for first-time services customers, offering a standalone 12-month agreement with flexibility in applying proactive services to readiness and consulting priorities. This results in improved preparedness, faster containment of threats, and more effective recovery from incidents, minimizing potential financial losses, reputational damage, and operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Evaluate the CrowdStrike Falcon Flex for Services model to determine its suitability for your organization&rsquo;s incident response and cybersecurity service needs (Reference: CrowdStrike Flex for Services).</li>
<li>For qualifying new services customers, explore the Zero Dollar Flex Fund to gain initial access to CrowdStrike Services for incident response and proactive security measures (Reference: Zero Dollar Flex Fund).</li>
<li>Integrate CrowdStrike&rsquo;s incident response capabilities with existing security tools and processes to streamline incident handling and improve overall security posture (Reference: CrowdStrike Services).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>incident-response</category><category>security-services</category><category>crowdstrike</category></item><item><title>SOC Analyst Toolkit with Threat Hunting Queries</title><link>https://feed.craftedsignal.io/briefs/2026-03-soc-analyst-hub/</link><pubDate>Wed, 18 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-soc-analyst-hub/</guid><description>A free, offline SOC toolkit aimed at Tier 1 analysts includes IR checklists, triage playbooks, and threat hunting guides mapped to MITRE ATT&amp;CK, with Splunk and Elastic queries for threats such as Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports.</description><content:encoded><![CDATA[<p>A security practitioner has released a free, offline SOC toolkit intended for Tier 1 analysts and those new to blue team operations. This toolkit, contained within a single HTML file, provides resources for incident response, alert triage, threat hunting, and analyst onboarding. Released in March 2026, the toolkit includes interactive IR checklists for common incident types (Phishing, Malware, Brute Force, Data Exfil, Suspicious PowerShell), alert triage playbooks with decision trees, threat hunting guides mapped to MITRE ATT&amp;CK, and a structured curriculum for new Tier 1 hires. The threat hunting guides are noteworthy, as they include Splunk and Elastic queries for specific attack techniques like Kerberoasting, Pass-the-Hash, LOLBAS abuse, scheduled task persistence, and C2 communication on non-standard ports. Defenders can leverage the shared hunting queries to enhance their detection capabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This toolkit is designed to aid in the <em>detection</em> of the following attack chains:</p>
<ol>
<li><strong>Initial Access:</strong> (Phishing, Malware) An attacker gains initial access through methods such as phishing emails or malware-infected attachments.</li>
<li><strong>Credential Access:</strong> (Kerberoasting, Pass-the-Hash) After gaining initial access, the attacker attempts to harvest credentials using techniques like Kerberoasting to target service accounts or Pass-the-Hash to reuse existing credentials.</li>
<li><strong>Lateral Movement:</strong> (Pass-the-Hash) Using compromised credentials, the attacker moves laterally within the network, accessing additional systems and resources.</li>
<li><strong>Execution:</strong> (LOLBAS) The attacker utilizes Living-Off-The-Land Binaries and Scripts (LOLBAS) to execute malicious commands and evade detection.</li>
<li><strong>Persistence:</strong> (Scheduled Task Persistence) The attacker establishes persistence by creating scheduled tasks that execute malicious code at regular intervals.</li>
<li><strong>Command and Control:</strong> (C2 on non-standard ports) The attacker establishes a command and control channel, communicating with compromised systems over non-standard ports to evade detection.</li>
<li><strong>Exfiltration:</strong> (Data Exfil) The attacker exfiltrates sensitive data from the compromised systems.</li>
<li><strong>Impact:</strong> (Data Exfil) The attacker achieves their final objective of data exfiltration, resulting in data loss or exposure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The toolkit helps defenders to mitigate the impact of attacks by providing resources for incident response, alert triage, and threat hunting. Successful implementation of the toolkit&rsquo;s recommendations can lead to faster detection and containment of security incidents, reducing the potential for data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review the threat hunting guides within the toolkit and adapt the provided Splunk and Elastic queries for Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports to your environment.</li>
<li>Utilize the provided IR Checklists (Phishing, Malware, Brute Force, Data Exfil, Suspicious PowerShell) to standardize and improve incident response procedures.</li>
<li>Customize and integrate the Alert Triage Playbooks into your existing security operations workflows to assist with the analysis of alerts related to impossible travel, lateral movement, and DNS beaconing.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>soc</category><category>blueteam</category><category>threat-hunting</category></item><item><title>JPCERT/CC Study on Reverse Engineering Rust Binaries</title><link>https://feed.craftedsignal.io/briefs/2026-03-rust-binaries/</link><pubDate>Mon, 16 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-rust-binaries/</guid><description>JPCERT/CC published a study on the reverse engineering of binaries created with the Rust programming language, providing insights for malware analysis and detection engineering.</description><content:encoded><![CDATA[<p>On March 15, 2026, JPCERT/CC published a study examining the challenges and techniques involved in reverse engineering binaries compiled from the Rust programming language. This research aims to aid security analysts and reverse engineers in understanding the structure and characteristics of Rust-based malware. Rust&rsquo;s increasing popularity among malware authors necessitates specialized knowledge to effectively analyze and detect these threats. The study details specific features of Rust binaries that differ from those compiled from other languages like C or C++, focusing on aspects such as metadata handling, string encoding, and unique function calling conventions. The research provides practical guidance for overcoming common obstacles encountered during reverse engineering of Rust binaries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This threat brief focuses on the analysis of Rust binaries, not a specific attack chain. However, understanding the structure of these binaries is crucial for analyzing attacks leveraging them. The following steps outline a general reverse engineering process applicable to any binary, with considerations specific to Rust:</p>
<ol>
<li><strong>Initial Reconnaissance:</strong> Obtain the Rust binary and gather basic information such as file type, size, and compilation timestamp using tools like <code>file</code> and <code>strings</code>.</li>
<li><strong>Metadata Analysis:</strong> Examine the binary&rsquo;s metadata section to identify Rust version, crate dependencies, and potentially debug symbols. This can be done using tools like <code>objdump</code> or specialized Rust metadata parsers.</li>
<li><strong>String Extraction:</strong> Extract embedded strings from the binary. Note that Rust often uses UTF-8 encoding for strings, so ensure your tools support this encoding.</li>
<li><strong>Function Identification:</strong> Identify key functions such as <code>main</code>, and any other functions related to suspicious behavior. Tools like IDA Pro or Ghidra can be used for disassembly and function analysis.</li>
<li><strong>Control Flow Analysis:</strong> Analyze the control flow of the program, paying attention to function calls and branching logic. Rust&rsquo;s ownership and borrowing system can make control flow more complex than in C/C++.</li>
<li><strong>Dependency Analysis:</strong> Identify and analyze any external crates (libraries) used by the binary. These crates may contain known vulnerabilities or malicious code.</li>
<li><strong>Behavioral Analysis:</strong> Execute the binary in a controlled environment (sandbox) to observe its behavior, including file system access, network connections, and registry modifications.</li>
<li><strong>Detection Rule Creation:</strong> Based on the reverse engineering and behavioral analysis, create detection rules for identifying similar malicious Rust binaries.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The increasing use of Rust in malware development poses a challenge for security analysts. Successful reverse engineering and understanding of Rust binaries are crucial for detecting and mitigating threats. Failure to adapt to this trend could lead to a decreased ability to identify and respond to novel malware strains.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Familiarize detection engineers with the structure and characteristics of Rust binaries as described in the JPCERT/CC study to improve reverse engineering capabilities.</li>
<li>Implement the Sigma rules provided below to detect suspicious behaviors commonly associated with potentially malicious binaries, adjusting thresholds and whitelists as needed for your environment.</li>
<li>Utilize tools capable of parsing Rust metadata to extract crate dependencies and other useful information from Rust binaries during analysis, as described in the &ldquo;Metadata Analysis&rdquo; step above.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>rust</category><category>reverse-engineering</category><category>malware-analysis</category></item><item><title>AWS STS Role Assumption by User</title><link>https://feed.craftedsignal.io/briefs/2026-03-aws-sts-role-assumption/</link><pubDate>Wed, 04 Mar 2026 18:01:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aws-sts-role-assumption/</guid><description>Detection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>This detection rule identifies when an IAM user assumes a role in AWS Security Token Service (STS) within an AWS environment. The AWS Security Token Service (STS) allows users to request temporary, limited-privilege credentials for accessing AWS resources. While legitimate role assumption is common for authorized access, adversaries can abuse this mechanism to escalate privileges or move laterally within a compromised AWS account. This behavior is detected by monitoring AWS CloudTrail logs for <code>AssumeRole</code> events from IAM users. The rule focuses on identifying potentially malicious role assumptions by correlating the user identity, assumed role, and source information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account as an IAM user, potentially through compromised credentials or an exposed access key.</li>
<li>The attacker enumerates available IAM roles within the AWS environment to identify roles with elevated privileges or access to sensitive resources.</li>
<li>The attacker calls the <code>AssumeRole</code> API in AWS STS, requesting temporary credentials for the target role, using a <code>roleSessionName</code> for context.</li>
<li>The STS service validates the request and, if authorized, issues temporary credentials consisting of an <code>accessKeyId</code>, <code>secretAccessKey</code>, and <code>sessionToken</code>.</li>
<li>The attacker configures their AWS CLI or SDK with the temporary credentials obtained from the STS service.</li>
<li>The attacker uses the temporary credentials to access AWS resources and perform actions permitted by the assumed role, such as modifying security groups, accessing S3 buckets, or launching EC2 instances.</li>
<li>The attacker may attempt to further escalate privileges by assuming additional roles or creating new IAM users with administrative privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful role assumption can grant an attacker access to sensitive data, allow them to disrupt critical services, or provide a foothold for further attacks within the AWS environment. While this rule has a low severity, a high volume of alerts should be reviewed as it could indicate ongoing lateral movement and privilege escalation. The impact of a successful attack can range from data breaches and service disruptions to complete compromise of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM and tune for your environment to detect suspicious role assumptions.</li>
<li>Investigate any alerts generated by the rule by reviewing the associated CloudTrail logs, specifically the <code>aws.cloudtrail.user_identity.arn</code> and <code>aws.cloudtrail.resources.arn</code> fields.</li>
<li>Implement additional monitoring for high-risk roles with elevated permissions, and create exceptions for trusted patterns.</li>
<li>Regularly review IAM policies and roles to minimize the risk of privilege escalation.</li>
<li>Refer to the AWS STS documentation for more details on managing and securing AWS STS in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>privilege-escalation</category><category>lateral-movement</category></item><item><title>Unusual Spike in Okta User Lifecycle Management Change Events</title><link>https://feed.craftedsignal.io/briefs/2024-11-okta-user-lifecycle-spike/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-okta-user-lifecycle-spike/</guid><description>A machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.</description><content:encoded><![CDATA[<p>This alert detects potential privileged access activity within an Okta environment. The detection is triggered by a machine learning job that identifies anomalous spikes in user lifecycle management change events. Threat actors may target user accounts to escalate their privileges or to establish persistence within the environment. This is achieved by manipulating user accounts, such as modifying roles, permissions, or other attributes. The prebuilt ML job &ldquo;pad_okta_spike_in_user_lifecycle_management_changes_ea&rdquo; is used to detect these anomalies. The rule requires the Privileged Access Detection integration assets to be installed, as well as Okta logs collected by integrations such as Okta. The rule looks for activity within a 3-hour window, checking every 15 minutes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta account, possibly through compromised credentials or other means. (T1078)</li>
<li>The attacker begins enumerating user accounts and their associated roles and permissions within the Okta environment.</li>
<li>The attacker identifies a target user account with elevated privileges or a role that would grant them desired access.</li>
<li>The attacker modifies the target user account&rsquo;s attributes, such as adding the attacker&rsquo;s account to a privileged group or changing the user&rsquo;s role. (T1098)</li>
<li>The attacker leverages the newly acquired privileges to access sensitive resources or perform unauthorized actions.</li>
<li>The attacker may create new user accounts with elevated privileges to maintain persistent access to the environment. (T1098)</li>
<li>The attacker covers their tracks by deleting logs or modifying audit trails to conceal their activity.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can result in privilege escalation, allowing unauthorized access to sensitive data and systems. Depending on the level of access gained, attackers may be able to compromise critical infrastructure, steal confidential information, or disrupt business operations. The impact can range from minor data breaches to significant financial losses and reputational damage. Early detection of anomalous user lifecycle changes is crucial to mitigating these risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration is installed and properly configured, including the preconfigured anomaly detection job &ldquo;pad_okta_spike_in_user_lifecycle_management_changes_ea&rdquo;.</li>
<li>Investigate any alerts generated by this rule by following the investigation steps outlined in the rule&rsquo;s note section within the Kibana UI.</li>
<li>Review and update access management policies and procedures to prevent similar incidents in the future, ensuring that changes to user accounts are logged and regularly reviewed as described in the rule&rsquo;s documentation.</li>
<li>Monitor Okta logs for any unusual or unauthorized activity, focusing on user account changes, as described in the setup documentation.</li>
<li>Implement additional monitoring on the affected accounts and related systems to detect any further suspicious activity or attempts to regain unauthorized access as mentioned in the response and remediation guidelines.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>okta</category><category>user-lifecycle</category></item><item><title>New AWS Network ACL Entry Creation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</link><pubDate>Sat, 26 Oct 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-network-acl-created/</guid><description>Detection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.</description><content:encoded><![CDATA[<p>The creation of new Network Access Control List (ACL) entries in Amazon Web Services (AWS) environments can be a sign of malicious activity. While legitimate use cases exist, adversaries can leverage these ACL changes to impair existing defenses, create new pathways for lateral movement, or establish persistence mechanisms. This activity is logged by CloudTrail and can be monitored to identify unauthorized or suspicious modifications to network security configurations. Attackers could create overly permissive rules that allow unauthorized access to critical resources or restrictive rules that disrupt legitimate traffic. Monitoring the creation of Network ACL entries is important for maintaining the integrity and security of AWS environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker identifies the existing Network ACLs within the target Virtual Private Cloud (VPC).</li>
<li>The attacker uses the AWS Management Console, CLI, or API to create a new Network ACL entry. The <code>CreateNetworkAclEntry</code> event is logged in CloudTrail.</li>
<li>The new ACL entry may be configured to allow specific inbound or outbound traffic that was previously blocked, effectively opening a new attack vector.</li>
<li>Alternatively, the new ACL entry may be configured to deny legitimate traffic, causing a denial-of-service condition for specific services or resources.</li>
<li>The attacker leverages the newly created ACL entry to move laterally within the AWS environment, accessing previously inaccessible resources.</li>
<li>The attacker performs malicious actions, such as data exfiltration or resource compromise, using the newly opened network pathways.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The creation of unauthorized Network ACL entries can have significant consequences. It can lead to the opening of new attack vectors, allowing unauthorized access to sensitive data and critical resources. In some scenarios, it can result in a denial-of-service condition, disrupting legitimate business operations. Depending on the scope of the compromised resources and data, the impact can range from minor inconvenience to significant financial loss and reputational damage. Early detection of this activity is crucial to mitigating potential risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Network ACL Entry Added&rdquo; to your SIEM to detect suspicious ACL modifications (logsource: aws, service: cloudtrail).</li>
<li>Investigate any <code>CreateNetworkAclEntry</code> events that deviate from established baseline configurations or involve unexpected source/destination IP ranges.</li>
<li>Review and audit existing Network ACL configurations regularly to identify and remediate any overly permissive or restrictive rules.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise and unauthorized access.</li>
<li>Monitor CloudTrail logs for other related events, such as <code>DeleteNetworkAclEntry</code> or <code>ReplaceNetworkAclEntry</code>, which may indicate further tampering with network security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1686.001</category><category>cloud</category></item><item><title>Suspicious DNS-Named Record Creation in Active Directory Integrated DNS</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</link><pubDate>Wed, 22 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</guid><description>Detection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) is a core component of AD DS, storing DNS zones as AD objects. The default permission settings allow any authenticated user to create DNS-named records. This creates an opportunity for attackers to perform Dynamic Spoofing attacks by monitoring LLMNR/NBT-NS requests and creating DNS-named records to target systems or specific services like WPAD. This attack can enable credential access by redirecting traffic through attacker-controlled systems, leading to the capture of sensitive information. This activity is detectable by monitoring Windows event code 5137 related to DNS record creation and filtering out legitimate system accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a domain-joined system, possibly through compromised credentials or phishing.</li>
<li>The attacker passively monitors LLMNR/NBT-NS broadcast traffic to identify systems being requested on the network.</li>
<li>Upon observing a request for a target system (e.g., WPAD), the attacker creates a DNS-named record in ADIDNS that resolves the target system&rsquo;s name to an attacker-controlled IP address. This leverages the default permissions in ADIDNS that allow authenticated users to create DNS records.</li>
<li>When a legitimate user attempts to access the target system, the DNS query resolves to the attacker&rsquo;s IP address.</li>
<li>The user&rsquo;s traffic is redirected to the attacker&rsquo;s system.</li>
<li>The attacker intercepts the user&rsquo;s credentials or other sensitive information.</li>
<li>The attacker may relay captured credentials to other systems on the network.</li>
<li>The attacker achieves credential access and lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain unauthorized access to sensitive systems and data within the Active Directory domain. While the severity is low, it can be a stepping stone to further, more damaging attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (event code 5137) for detection.</li>
<li>Deploy the Sigma rule <code>Creation of a DNS-Named Record</code> to detect suspicious DNS record creation events.</li>
<li>Implement stricter access controls on DNS record creation within Active Directory to limit permissions to only necessary and trusted accounts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>active-directory</category></item><item><title>Potential Data Exfiltration to Unusual Geographic Region via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</guid><description>A machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.</description><content:encoded><![CDATA[<p>This alert is triggered by a machine learning job, <code>ded_high_sent_bytes_destination_region_name_ea</code>, that detects data exfiltration to unusual geographical regions based on network traffic patterns. The Data Exfiltration Detection integration, including Elastic Defend and Network Packet Capture, is required for this detection to function. This integration analyzes network and file events to identify abnormalities in data transfer volumes to different geographical locations, specifically by region name. Anomalous traffic patterns, particularly those involving high volumes of data being sent to regions outside the organization&rsquo;s typical network activity, could indicate malicious actors attempting to exfiltrate sensitive data via command and control channels. This detection provides defenders with an early warning of potential data breaches. Version requirements: Elastic Stack version 9.4.0 or later is required to leverage the Entity Analytics (EA) fields.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a system within the network through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>Command and Control: The attacker establishes a command and control (C2) channel to communicate with the compromised system.</li>
<li>Data Collection: The attacker identifies and collects sensitive data from various sources within the network.</li>
<li>Staging: The collected data is staged in a temporary location, compressed, and potentially encrypted for exfiltration.</li>
<li>Exfiltration: The attacker uses the C2 channel to transfer the staged data to an external location in an unusual geographic region.</li>
<li>Evasion: The attacker may attempt to obfuscate the data transfer by using techniques such as tunneling or encryption to avoid detection.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as deleting logs or files, to hinder investigation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data exfiltration attack can result in the loss of sensitive information, including intellectual property, customer data, and financial records. The risk score for this rule is 21, which indicates a moderate level of risk. Detection of this activity allows security teams to quickly respond and mitigate the potential damage. Early detection helps prevent large-scale data breaches and minimizes the impact on the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Data Exfiltration Detection integration assets are installed and properly configured, including Elastic Defend and Network Packet Capture (see Setup instructions in content).</li>
<li>Review the geo-location details flagged by the alert to determine if the region is indeed unusual for the organization&rsquo;s typical network traffic patterns (see Triage and Analysis in content).</li>
<li>Analyze the network traffic logs associated with the alert to identify the volume and type of data being transferred to the unusual region (see Triage and Analysis in content).</li>
<li>Implement geo-blocking measures to restrict data transfers to the identified unusual region, ensuring that only approved regions can communicate with the network (see Response and Remediation in content).</li>
<li>Deploy the Sigma rule below to detect processes initiating network connections to unusual regions based on the <code>DestinationGeoRegion</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>network-traffic</category></item><item><title>Unusual Remote File Size Indicating Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</link><pubDate>Tue, 30 Apr 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</guid><description>A machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.</description><content:encoded><![CDATA[<p>This detection leverages machine learning to identify unusual remote file sizes, a tactic often used during lateral movement. After gaining initial access, adversaries frequently aim to locate and exfiltrate valuable data. To avoid raising alarms with numerous small transfers, they may consolidate data into a single large file. This rule, built upon the Elastic Lateral Movement Detection integration, specifically uses the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. The integration requires the <code>host.ip</code> field to be populated and Elastic Defend to be properly configured. This detection is critical for organizations seeking to identify and prevent data exfiltration attempts early in the attack lifecycle. The integration assets must be installed and file and Windows RDP process events collected by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains access to a host within the network, potentially through compromised credentials or exploitation of a vulnerability.</li>
<li>Discovery: The attacker performs reconnaissance to identify valuable data stores, network shares, and potential exfiltration targets.</li>
<li>Collection: The attacker gathers sensitive data from various sources within the compromised network. This data could include documents, databases, or other confidential information.</li>
<li>Data Consolidation: To avoid detection, the attacker bundles the collected data into a single, large file. This could involve archiving, compression, or other methods of aggregation.</li>
<li>Lateral Tool Transfer: The attacker uses remote services or tools to transfer the large file to a remote host within the network (T1570).</li>
<li>Exfiltration Preparation: The attacker stages the large file on the remote host, preparing it for exfiltration outside the network.</li>
<li>Exfiltration: The attacker initiates the transfer of the large file from the compromised network to an external destination, potentially using protocols like RDP.</li>
<li>Cleanup: The attacker attempts to remove traces of the activity, such as deleting temporary files or logs, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, potentially resulting in financial loss, reputational damage, and legal liabilities. The detection of unusual remote file sizes can help organizations identify and prevent data exfiltration attempts before they cause significant harm. Depending on the sensitivity of the exfiltrated data, the impact could range from minor inconvenience to a major security breach affecting thousands of individuals or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated as required by the rule. For Elastic Defend versions 8.18 and above, verify that host IP collection is enabled following the provided <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets, including the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. Follow the setup instructions detailed in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">documentation</a>.</li>
<li>Review and tune the anomaly threshold (<code>anomaly_threshold = 70</code>) of the machine learning job based on your environment&rsquo;s baseline to reduce false positives.</li>
<li>Implement network segmentation to limit lateral movement, as suggested in the &ldquo;Response and remediation&rdquo; section of the rule documentation.</li>
<li>Enhance monitoring and logging for unusual file transfer activities and remote access attempts as stated in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-exfiltration</category><category>machine-learning</category></item><item><title>GitHub Push Protection Bypass Detection</title><link>https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</guid><description>Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.</description><content:encoded><![CDATA[<p>This alert detects when a GitHub user bypasses the push protection mechanism designed to prevent secrets from being committed to a repository. GitHub&rsquo;s push protection, part of its secret scanning feature, is intended to block commits containing sensitive information like API keys or credentials.  A bypass indicates a deliberate attempt to circumvent this security measure. Successful bypass can lead to exposure of secrets, increasing the risk of unauthorized access and data breaches. The activity is logged within GitHub&rsquo;s audit logs, provided that the audit log streaming feature is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Developer attempts to commit code containing a secret to a GitHub repository.</li>
<li>GitHub&rsquo;s push protection mechanism detects the secret and blocks the push.</li>
<li>The developer intentionally bypasses the push protection, potentially using allowed administrative activities to circumvent the block.</li>
<li>The code, including the secret, is successfully pushed to the repository.</li>
<li>The secret becomes exposed within the repository&rsquo;s history.</li>
<li>Unauthorized actors may discover the exposed secret by scanning the repository.</li>
<li>Unauthorized actors may use the exposed secret to gain unauthorized access to systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful bypass of GitHub push protection can lead to secrets being exposed in a repository. This exposure can lead to unauthorized access to sensitive systems or data. The severity of the impact depends on the scope of access granted by the exposed secret, and the visibility of the repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable audit log streaming in GitHub to ensure relevant events are captured.</li>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Bypass Detected&rdquo; to your SIEM and tune for your environment using GitHub audit logs.</li>
<li>Investigate any detected bypass events to determine the context and impact of the bypassed secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-impairment</category><category>t1685</category><category>github</category></item><item><title>Bitbucket Project Secret Scanning Allowlist Added</title><link>https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-allowlist/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-allowlist/</guid><description>An adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.</description><content:encoded><![CDATA[<p>The addition of a secret scanning allowlist rule to a Bitbucket project can be abused by malicious actors to bypass security controls. While not inherently malicious, this action can be exploited to weaken an organization&rsquo;s security posture. Secret scanning tools are designed to prevent the accidental or intentional commit of sensitive information (API keys, passwords, etc.) into version control systems. By adding an allowlist rule, specific patterns or files can be excluded from these scans. This could be leveraged by an attacker who has gained access to a Bitbucket account or project to intentionally introduce secrets while avoiding detection. The activity is logged by Bitbucket&rsquo;s audit logs, providing an opportunity for detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to a Bitbucket account with sufficient privileges to modify project settings.</li>
<li>The attacker navigates to the project settings within Bitbucket.</li>
<li>The attacker accesses the secret scanning configuration for the project.</li>
<li>The attacker adds a new allowlist rule, specifying a pattern or file to be excluded from secret scanning.</li>
<li>The attacker commits code containing secrets that match the allowlist rule, effectively bypassing the secret scanning tool.</li>
<li>The changes are pushed to the Bitbucket repository.</li>
<li>The secrets remain undetected due to the allowlist rule.</li>
<li>The attacker leverages the exposed secrets for further malicious activities, such as gaining access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the exposure of sensitive information such as API keys, passwords, or other credentials. This can result in unauthorized access to internal systems, data breaches, and reputational damage. The number of affected projects depends on the scope of the attacker&rsquo;s access and the configuration of the allowlist rule. The addition of the allowlist rule itself does not directly cause damage but creates a window of opportunity for the introduction and persistence of secrets within the codebase.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the addition of secret scanning allowlist rules (logsource: bitbucket, service: audit).</li>
<li>Investigate any detected instances of allowlist rule additions to verify their legitimacy and business justification.</li>
<li>Review and enforce strict access controls for Bitbucket projects to minimize the risk of unauthorized modifications.</li>
<li>Enable &ldquo;Basic&rdquo; log level in Bitbucket to ensure that the audit events required for detection are captured, as indicated in the rule definition.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>Spike in Number of RDP Connections from a Single Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</guid><description>A machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential for lateral movement within a network facilitated by an unusual spike in Remote Desktop Protocol (RDP) connections originating from a single source IP address. This activity is detected using an Elastic machine learning job designed to identify anomalies in network connection patterns. The rule &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; leverages this ML job to flag instances where a single host initiates RDP connections to a significantly higher than normal number of distinct destination IPs, potentially indicating that an attacker is attempting to pivot and gain access to additional systems after compromising an initial foothold. This detection mechanism is available in Elastic Security 9.4.0 and later, with the Lateral Movement Detection integration assets installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a host within the network through methods such as phishing, exploiting a vulnerability, or credential theft.</li>
<li><strong>Establish Foothold:</strong> The attacker establishes a foothold on the compromised system, potentially installing tools for reconnaissance and lateral movement.</li>
<li><strong>Internal Reconnaissance:</strong> The attacker performs internal reconnaissance to identify potential target systems accessible via RDP.</li>
<li><strong>RDP Connection Attempts:</strong> The attacker initiates RDP connections to a large number of internal IP addresses from the compromised host.</li>
<li><strong>Credential Harvesting:</strong> The attacker attempts to harvest credentials from the targeted systems to gain further access.</li>
<li><strong>Lateral Movement:</strong> The attacker successfully connects to additional systems using RDP, leveraging harvested or stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> On newly accessed systems, the attacker attempts to escalate privileges to gain administrative control.</li>
<li><strong>Objective Completion:</strong> With broader access and elevated privileges, the attacker achieves their objective, which may include data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this lateral movement can result in widespread compromise across the targeted network. A single compromised host can serve as a launching point to access sensitive data, critical systems, and ultimately, inflict significant damage. The &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; rule aims to detect these lateral movement attempts early, minimizing potential damage. The impact of a successful attack could range from data breaches and financial losses to operational disruption and reputational damage, affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection if using Elastic Defend (versions 8.18 and above), by following the configuration steps outlined in the Elastic documentation to ensure the <code>host.ip</code> field is populated.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://docs.elastic.co/en/integrations/lmd">official Elastic documentation</a>.</li>
<li>Review and tune the false positive analysis steps within the detection rule&rsquo;s documentation. Whitelist known administrative IPs or legitimate RDP usage patterns to minimize noise.</li>
<li>Implement network segmentation to limit RDP access to only necessary systems and users, reducing the attack surface as recommended in the rule&rsquo;s response and remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>elastic</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item><item><title>Detection of New GitHub Actions Secrets Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</guid><description>This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies the creation of new secrets within GitHub Actions. Threat actors may create or modify secrets to gain unauthorized access, establish persistence, or escalate privileges within the GitHub environment. The activity is captured via GitHub&rsquo;s audit logs. The scope of this detection encompasses the creation of secrets at the organization, environment, codespaces, or repository level. Successful detection of this activity allows security teams to investigate potentially malicious modifications to GitHub Actions secrets, which could lead to supply chain compromise or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub account, potentially through compromised credentials or phishing (T1078.004).</li>
<li>The attacker authenticates to the GitHub organization or repository.</li>
<li>The attacker navigates to the settings for the organization, environment, codespaces, or repository.</li>
<li>The attacker creates a new secret within the GitHub Actions settings, using the GitHub API or web interface.</li>
<li>The secret is stored within GitHub&rsquo;s infrastructure, accessible to GitHub Actions workflows.</li>
<li>The attacker modifies or creates a GitHub Actions workflow that utilizes the newly created secret.</li>
<li>The workflow executes, using the secret to perform privileged actions such as accessing sensitive data or deploying malicious code.</li>
<li>The attacker achieves persistence or elevates their privileges within the GitHub environment, potentially compromising the entire software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, code injection, and supply chain compromise. The impact ranges from low, in cases where the secret is used for benign purposes, to critical if the secret is used to deploy malicious code into production environments. While the number of affected organizations is unknown, the potential for widespread impact across the software supply chain makes this a critical area for monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the events necessary for this detection (see <code>logsource</code> definition).</li>
<li>Deploy the Sigma rule <code>Github New Secret Created</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the &ldquo;actor&rdquo; involved in creating the secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>persistence</category><category>privilege-escalation</category><category>initial-access</category></item><item><title>MsXsl.exe Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</link><pubDate>Tue, 30 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</guid><description>Msxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.</description><content:encoded><![CDATA[<p>MsXsl.exe is a Windows utility designed to transform XML data using XSLT stylesheets. Adversaries are known to abuse this utility to execute malicious scripts, bypassing application control and other security measures. This behavior is often used as a defense evasion technique to download or execute malicious payloads. This activity has been observed since at least March 2020. The abuse of msxsl.exe allows attackers to establish command and control or exfiltrate sensitive data without being easily detected, as the tool is a signed Microsoft binary. This matters for defenders because it highlights the need to monitor legitimate system utilities for anomalous behavior, specifically network connections to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker leverages msxsl.exe to execute a malicious script.</li>
<li>Msxsl.exe initiates a network connection to an external IP address.</li>
<li>The script downloads a malicious payload from the external server.</li>
<li>The downloaded payload is executed on the compromised system.</li>
<li>The attacker establishes a command and control channel through the network connection.</li>
<li>The attacker performs data exfiltration via the established C2 channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be used for further malicious activities, including data theft, lateral movement, and deployment of additional malware. Successful exploitation can lead to sensitive data exfiltration, disruption of services, or complete system compromise. The low risk score does not represent impact, but instead reflects that the behavior is not always malicious, and may be a feature of normal software operation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon network connection logging to monitor msxsl.exe network activity.</li>
<li>Deploy the Sigma rule &ldquo;Network Connection via MsXsl&rdquo; to your SIEM and tune for your environment to detect suspicious network connections originating from msxsl.exe.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the destination IP address and the parent process of msxsl.exe.</li>
<li>Whitelist legitimate uses of msxsl.exe in your environment based on known good processes or applications to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category><category>msxsl</category></item><item><title>Potential Exploitation of an Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</guid><description>This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.</description><content:encoded><![CDATA[<p>Unquoted service paths in Windows can be exploited to escalate privileges. When a service path lacks quotes, Windows may execute a malicious executable placed in a higher-level directory. This detection rule identifies suspicious processes starting from common unquoted paths, like &ldquo;C:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;, signaling potential exploitation attempts. The rule aims to detect early stages of privilege escalation threats. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, Windows Security Event Logs, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service running with an unquoted path, such as &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>The attacker places a malicious executable named &ldquo;Program.exe&rdquo; in &ldquo;C:&quot;</li>
<li>The operating system attempts to start the service &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>Due to the unquoted path, the OS incorrectly parses the path and first attempts to execute &ldquo;C:\Program.exe&rdquo;.</li>
<li>The malicious &ldquo;Program.exe&rdquo; executes with the privileges of the service account.</li>
<li>The malicious executable performs actions to escalate privileges, such as adding a user to the local administrators group.</li>
<li>The attacker gains elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of an unquoted service path vulnerability can lead to complete system compromise, as the attacker gains the privileges of the service account. This can allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is high, potentially leading to a loss of confidentiality, integrity, and availability of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review process executable paths to confirm if they match the patterns specified in the rule query, such as &ldquo;?:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Potential Exploitation of an Unquoted Service Path Vulnerability&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging with Event ID 1 to activate the Sigma rules above.</li>
<li>Conduct a thorough review of service configurations to identify and correct any unquoted service paths as part of remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>windows</category></item><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Group Policy Discovery via Microsoft GPResult Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</guid><description>Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>Attackers may leverage the <code>gpresult.exe</code> utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of <code>gpresult.exe</code> with specific command-line arguments (<code>/z</code>, <code>/v</code>, <code>/r</code>, <code>/x</code>) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li>The attacker executes <code>gpresult.exe</code> from the command line or through a script.</li>
<li>The attacker uses command-line arguments such as <code>/z</code>, <code>/v</code>, <code>/r</code>, or <code>/x</code> to request detailed information about Group Policy settings.</li>
<li><code>gpresult.exe</code> queries the Active Directory domain to retrieve GPO information applicable to the user or computer.</li>
<li>The attacker parses the output of <code>gpresult.exe</code> to identify security policies, user rights assignments, and other relevant configurations.</li>
<li>The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.</li>
<li>The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a comprehensive understanding of the target environment&rsquo;s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to your SIEM to detect the execution of <code>gpresult.exe</code> with suspicious parameters.</li>
<li>Enable Windows process creation logging to capture command-line arguments used with <code>gpresult.exe</code> and other executables.</li>
<li>Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to determine the context and intent of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>group_policy</category></item><item><title>Detection of Malicious Browser Extension Installation</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</guid><description>This rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies the installation of browser extensions on Windows systems, which can be a sign of malicious activity. Threat actors may install malicious browser extensions through app store downloads disguised as legitimate extensions, social engineering tactics, or by directly compromising a system. These extensions can then be used for persistence, data theft, or other malicious purposes. The rule focuses on monitoring file creation events related to browser extension installations, specifically targeting the file paths and types associated with Firefox (.xpi) and Chromium-based browsers (.crx). It excludes known safe processes and extensions to reduce false positives. This detection is relevant for defenders because malicious browser extensions can provide a persistent foothold for attackers, allowing them to maintain access to compromised systems and user data. The rule is based on EQL and can be used with Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user&rsquo;s system is compromised, potentially through social engineering or existing malware.</li>
<li>The attacker gains access to the system and attempts to install a malicious browser extension.</li>
<li>The attacker drops the extension file (.xpi for Firefox, .crx for Chromium) into the appropriate browser extension directory (e.g., <code>C:\\Users\\*\\AppData\\Roaming\\*\\Profiles\\*\\Extensions\\</code> for Firefox or <code>C:\\Users\\*\\AppData\\Local\\*\\*\\User Data\\Webstore Downloads\\</code> for Chromium).</li>
<li>A file creation event is triggered as the extension file is created in the target directory.</li>
<li>The detection rule identifies this file creation event based on the file name and path, filtering out known safe processes like firefox.exe.</li>
<li>The malicious extension installs itself into the browser.</li>
<li>The extension gains persistence by loading every time the browser starts.</li>
<li>The attacker can now perform malicious actions such as monitoring browsing activity, stealing credentials, or injecting malicious content into web pages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious browser extensions can lead to persistent access to the compromised system, allowing attackers to steal sensitive information such as credentials, financial data, or personal information. This can result in financial loss, identity theft, and reputational damage. The installation of malicious extensions can also lead to the injection of malicious content into web pages, redirecting users to phishing sites or distributing malware. The scope of the impact can range from individual users to entire organizations, depending on the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture the necessary file creation events for this detection.</li>
<li>Deploy the provided Sigma rule <code>Browser Extension Install via File Creation</code> to your SIEM and tune the exclusions for your specific environment.</li>
<li>Review and update the list of known safe processes and extensions in the Sigma rule <code>Browser Extension Install via File Creation</code> to minimize false positives.</li>
<li>Implement application whitelisting policies to restrict the installation of unauthorized browser extensions.</li>
<li>Educate users on the risks associated with installing browser extensions from untrusted sources and encourage them to only install extensions from official browser stores.</li>
<li>Implement policies to regularly review installed browser extensions across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>browser-extension</category><category>windows</category></item><item><title>Unusually High Mean of RDP Session Duration Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</link><pubDate>Wed, 24 Jan 2024 18:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</guid><description>A machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.</description><content:encoded><![CDATA[<p>This threat brief addresses the detection of unusually long Remote Desktop Protocol (RDP) sessions, identified by a pre-built Elastic machine learning job named <code>lmd_high_mean_rdp_session_duration_ea</code>. Attackers can abuse RDP for lateral movement and maintaining persistence within a network. Extended RDP sessions can also be used to evade detection mechanisms. This detection leverages machine learning to identify deviations from normal RDP session durations, potentially indicating malicious activity. The detection rule has been available since October 2023, and the corresponding ML job is part of the Lateral Movement Detection integration, requiring Elastic Stack version 9.4.0 or later. The rule depends on the <code>host.ip</code> field to be populated, which may require enabling host IP collection in Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network, possibly through phishing or exploiting a public-facing application.</li>
<li>The attacker leverages valid credentials or exploits a vulnerability to establish an RDP connection to a target system.</li>
<li>The RDP session is maintained for an extended period, significantly longer than typical RDP sessions within the environment.</li>
<li>During the prolonged RDP session, the attacker performs reconnaissance, gathering information about the network and target systems.</li>
<li>The attacker moves laterally to other systems within the network, using the established RDP session as a persistent access point.</li>
<li>The attacker executes malicious commands or transfers files, potentially installing malware or exfiltrating sensitive data.</li>
<li>The unusually long RDP session duration helps the attacker to remain undetected and evade security measures.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected lateral movement via prolonged RDP sessions can lead to significant data breaches, system compromise, and financial loss. The impact includes potential theft of sensitive information, disruption of business operations, and reputational damage. If an adversary establishes a persistent foothold via RDP, they can maintain long-term access to the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure <code>host.ip</code> field is populated by enabling host IP collection if using Elastic Defend versions 8.18 and above, as described in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install and configure the Lateral Movement Detection integration in Kibana as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup guide</a>.</li>
<li>Tune the machine learning job <code>lmd_high_mean_rdp_session_duration_ea</code> by adjusting the <code>anomaly_threshold</code> based on your environment and RDP usage patterns.</li>
<li>Investigate triggered alerts from the &ldquo;High Mean of RDP Session Duration&rdquo; rule following the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">triage and analysis guide</a>.</li>
<li>Monitor Windows RDP process events collected by the <a href="https://docs.elastic.co/en/integrations/endpoint">Elastic Defend</a> integration for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>machine-learning</category></item><item><title>Unusual Group Name Accessed by User via Privileged Access Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-group-access/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-group-access/</guid><description>A machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential for privilege escalation attempts on Windows systems, detected by Elastic&rsquo;s Privileged Access Detection (PAD) integration. Specifically, a machine learning job identifies users accessing group names that are unusual for their typical behavior, especially those associated with elevated privileges. This activity, while potentially legitimate, can also signify malicious attempts to manipulate group memberships or escalate privileges. This detection relies on the <code>pad_windows_rare_group_name_by_user_ea</code> machine learning job. The PAD integration requires Fleet and the Elastic Agent. While the source material does not specify an exact start date for this threat, the detection rule was initially created on 2025/02/18 and updated on 2026/04/01, suggesting ongoing relevance. The detection logic is designed to identify deviations from established user access patterns to identify abnormal activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (T1078):</strong> An attacker gains initial access using valid accounts, potentially through compromised credentials or other means.</li>
<li><strong>Discovery (T1069):</strong> The attacker performs permission group discovery to identify potential target groups for privilege escalation.</li>
<li><strong>Account Manipulation (T1098):</strong> The attacker attempts to add the compromised account to a privileged group.</li>
<li><strong>Registry Modification:</strong> The attacker modifies the registry settings to enable the newly acquired privileges.</li>
<li><strong>Privilege Escalation (T1068):</strong> The attacker exploits vulnerabilities or misconfigurations to escalate their privileges further.</li>
<li><strong>Persistence (T1098):</strong> The attacker attempts to maintain elevated privileges by adding the compromised account to additional local or domain groups (T1098.007).</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker moves laterally within the network, accessing sensitive resources.</li>
<li><strong>Data Exfiltration or System Damage:</strong> The attacker achieves their final objective, which may include data exfiltration, ransomware deployment, or other forms of system damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise resulting from this type of attack can lead to unauthorized access to sensitive data, system instability, and potentially significant financial losses. While the source does not specify the number of victims or specific sectors targeted, privilege escalation is a common tactic used in a wide range of attacks, making this a broadly applicable threat. A successful privilege escalation could allow the attacker to gain complete control over the targeted system and potentially the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Privileged Access Detection integration is installed and configured correctly in Elastic Security, including the <code>pad_windows_rare_group_name_by_user_ea</code> machine learning job, as referenced in the <code>machine_learning_job_id</code> field.</li>
<li>Enable Windows event collection via Elastic Defend or the Windows integration within Fleet, as detailed in the Setup section.</li>
<li>Deploy the Sigma rule provided below to detect attempts to add accounts to privileged groups and tune the rule based on your environment.</li>
<li>Review and update access control policies to ensure that only authorized users have access to sensitive group names and privileged operations, as mentioned in the Response and Remediation section.</li>
<li>Implement multi-factor authentication (MFA) for accessing sensitive group names to prevent unauthorized access, as recommended in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>privilege-escalation</category><category>windows</category></item><item><title>Spike in Number of Processes in an RDP Session</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-process-spike/</link><pubDate>Tue, 23 Jan 2024 14:35:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-process-spike/</guid><description>A machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement by flagging spikes in the number of processes initiated during a single RDP session. The rule, based on an Elastic machine learning job named <code>lmd_high_sum_rdp_number_of_processes_ea</code>, aims to uncover suspicious remote activity indicative of an attacker attempting to execute commands or deploy tools on a compromised host. This detection matters because RDP is a common vector for attackers to gain access to internal networks and subsequently move laterally. The detection leverages Windows RDP process events and file events collected by the Elastic Defend integration. Identifying anomalous process creation within RDP sessions can help defenders identify and respond to potential security incidents faster.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker leverages valid credentials or exploits an RDP vulnerability to establish a remote session (T1021.001).</li>
<li>Once connected via RDP, the attacker begins to execute a series of commands to enumerate the system and network.</li>
<li>The attacker attempts to install malware or other malicious tools, triggering the creation of multiple processes.</li>
<li>The machine learning job detects a significant increase in the number of processes started within the RDP session.</li>
<li>The detection rule triggers, alerting analysts to the anomalous activity.</li>
<li>The attacker uses the newly installed tools to move laterally to other systems on the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can lead to significant damage, including data breaches, system compromise, and financial loss. While the severity is low, a spike in RDP processes can be an early indicator of compromise. Attackers often use RDP to propagate through a network after gaining initial access, making this detection critical for preventing widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic Defend documentation</a> to ensure the <code>host.ip</code> field is populated.</li>
<li>Install the Lateral Movement Detection integration assets as described in the rule&rsquo;s setup instructions to enable the machine learning job <code>lmd_high_sum_rdp_number_of_processes_ea</code>.</li>
<li>Review and tune the anomaly threshold to reduce false positives based on your organization&rsquo;s typical RDP usage.</li>
<li>Investigate RDP sessions flagged by this rule to identify the source of the process spike and potential malicious activity as described in the rule&rsquo;s &ldquo;Triage and Analysis&rdquo; notes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Windows Defender Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</guid><description>Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.</description><content:encoded><![CDATA[<p>Attackers commonly disable Windows Defender to evade detection and facilitate malicious activities. This involves modifying specific registry settings to either disable the service entirely or prevent it from starting automatically. The rule specifically identifies modifications to the <code>DisableAntiSpyware</code> and <code>WinDefend\\Start</code> registry keys. The DFIR Report has documented this technique in real-world incidents, highlighting its effectiveness in bypassing built-in security measures. This allows threat actors to operate with reduced risk of detection, enabling them to deploy malware, exfiltrate data, or perform other malicious actions without immediate interference from the endpoint security solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker modifies the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> registry key to disable Windows Defender, setting its value to &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>Alternatively, the attacker modifies the <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry key to prevent the Windows Defender service from starting automatically. The attacker sets the value to &ldquo;3&rdquo; or &ldquo;4&rdquo; (or their hexadecimal equivalents &ldquo;0x00000003&rdquo;, &ldquo;0x00000004&rdquo;).</li>
<li>The attacker verifies that Windows Defender is disabled by checking the Security Center or attempting to run a scan.</li>
<li>With Windows Defender disabled, the attacker proceeds to deploy malware or execute malicious commands without interference from the antivirus software.</li>
<li>The attacker may further disable security settings and block security-related indicators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this attack can lead to a complete compromise of the affected system. With Windows Defender disabled, the system becomes vulnerable to malware infections, data exfiltration, and other malicious activities. This can result in financial losses, data breaches, and reputational damage for the targeted organization. The lack of immediate detection allows attackers to establish persistence and expand their foothold within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Modification to Disable Windows Defender&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to Windows Defender registry settings.</li>
<li>Monitor registry events for changes to the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> and <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry keys using the provided log sources.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process and user account responsible for the registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry modification</category></item><item><title>Unusual Process Spawned by a Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</guid><description>A machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.</description><content:encoded><![CDATA[<p>This alert originates from an Elastic machine learning job named <code>problem_child_rare_process_by_parent_ea</code> designed to detect Living off the Land (LotL) attacks on Windows systems. The model identifies processes spawned by parent processes that are statistically rare and have a high probability of being malicious based on the &ldquo;ProblemChild&rdquo; supervised learning model. This approach aims to uncover malicious activities that utilize legitimate system binaries (LOLbins) for nefarious purposes, effectively bypassing traditional signature-based detections. The alert relies on Windows process events collected by Elastic Defend or Winlogbeat with the LotL Attack Detection integration. This detection method becomes particularly important as attackers increasingly rely on existing tools to blend in with normal system activity and avoid raising suspicion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via unspecified means (e.g., phishing, compromised credentials).</li>
<li>Attacker leverages a legitimate system binary (LOLbin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLbin is used to execute a malicious payload or script.</li>
<li>The malicious process is spawned as a child process of the LOLbin.</li>
<li>Elastic&rsquo;s machine learning model identifies the child process as rare and potentially malicious based on its parent-child relationship and other features.</li>
<li>The rare process executes malicious commands, possibly downloading further payloads.</li>
<li>The attacker achieves their objective, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack utilizing LOLbins can lead to significant compromise, including data theft, system disruption, and further propagation within the network. The reliance on trusted system binaries makes these attacks difficult to detect with traditional methods, potentially allowing attackers to operate undetected for extended periods. The impact is directly correlated to the privileges of the initial compromised account and the effectiveness of lateral movement techniques employed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, as described in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review the parent and child process names identified in the alert to determine if they are legitimate applications or associated with LOLbins, as detailed in the investigation guide within the rule&rsquo;s <code>note</code> section.</li>
<li>Investigate the command-line arguments used by the suspicious process for potentially malicious commands or scripts as described in the rule <code>note</code> section.</li>
<li>Tune the <code>anomaly_threshold</code> setting in the machine learning job configuration based on your environment&rsquo;s baseline activity to reduce false positives, as described in the rule documentation.</li>
<li>Implement exceptions for legitimate administrative tools and software updates to reduce false positives, as mentioned in the rule&rsquo;s <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbins</category><category>windows</category><category>machine-learning</category></item><item><title>Okta User Account Created</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</guid><description>Detection of new user account creation in Okta, which could indicate malicious activity related to credential access.</description><content:encoded><![CDATA[<p>This alert detects the creation of new user accounts within an Okta environment. While legitimate user creation is common, malicious actors may create accounts to gain unauthorized access to resources, escalate privileges, or establish persistence within the network. Monitoring for anomalous user creation activity, such as accounts created outside of normal business hours or with suspicious naming conventions, is crucial for identifying potential security breaches. Reviewing the source IP and administrator account used for the user creation can also provide valuable context.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta administrator account, potentially through phishing, credential stuffing, or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Okta admin portal.</li>
<li>The attacker navigates to the user management section within the Okta admin console.</li>
<li>The attacker creates a new user account, potentially mimicking an existing user or using a generic naming convention.</li>
<li>The attacker assigns the new user account specific roles and permissions, potentially granting elevated privileges.</li>
<li>The attacker may use the newly created account to access sensitive applications and data within the Okta-protected environment.</li>
<li>The attacker uses the compromised or newly created account to maintain persistence within the Okta environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leading to unauthorized user creation can result in significant data breaches, privilege escalation, and unauthorized access to sensitive applications and resources. This could lead to financial loss, reputational damage, and compliance violations. The impact depends on the permissions granted to the created user and the applications they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Okta User Created&rdquo; to your SIEM to detect user creation events and tune for your environment.</li>
<li>Investigate any detected user creation events for legitimacy, focusing on the source IP address and the administrator account used.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to mitigate the risk of credential compromise.</li>
<li>Review Okta event logs regularly for suspicious activity, including user creation, permission changes, and application access.</li>
<li>Establish baseline user creation patterns to identify anomalous behavior, such as accounts created outside of normal business hours.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>user-creation</category><category>credential-access</category></item><item><title>Unusual Remote File Directory Lateral Movement Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</guid><description>An Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement within a network by flagging unusual remote file transfers to directories that are not commonly monitored. Attackers often leverage less scrutinized file paths to evade standard security measures and deploy malicious payloads. This detection relies on the &ldquo;lmd_rare_file_path_remote_transfer_ea&rdquo; machine learning job within Elastic Security, which analyzes file and Windows RDP process events to identify anomalous file transfers based on the destination directory. The detection is part of the Lateral Movement Detection integration and requires Elastic Defend and Fleet for full functionality. This is important for defenders because attackers will try to blend in with normal file transfer activity by using uncommon directories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the network (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a target host for lateral movement.</li>
<li>The attacker uses a remote service (e.g., RDP, SMB) to connect to the target host.</li>
<li>The attacker attempts to transfer malicious files to the target host.</li>
<li>Instead of using common directories like &ldquo;C:\Windows\Temp&rdquo; or &ldquo;C:\ProgramData&rdquo;, the attacker chooses a less monitored directory to evade detection.</li>
<li>The remote service is leveraged to perform the file transfer to the atypical directory.</li>
<li>The transferred file is then executed, potentially leading to command execution or privilege escalation.</li>
<li>The attacker achieves their objective (e.g., data exfiltration, ransomware deployment) on the target host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, compromise of critical systems, and potential disruption of business operations. Although this detection is rated as low severity, successful lateral movement can lead to significant damage. The number of affected hosts and the severity of the impact depends on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. Lateral movement allows attackers to gain a deeper foothold within the network and increase the scope of their malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated in Elastic Defend events by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic documentation</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Tune the anomaly_threshold in the machine learning job configuration based on your environment&rsquo;s baseline activity to minimize false positives, as mentioned in the rule&rsquo;s configuration.</li>
<li>Investigate any alerts generated by this rule, paying close attention to the source and destination IP addresses, the user account involved, and the specific directory used for the file transfer as outlined in the <a href="#triage-and-analysis">triage and analysis section</a>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>NLTEST.EXE Used for Domain Trust Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</link><pubDate>Thu, 11 Jan 2024 17:49:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</guid><description>Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.</description><content:encoded><![CDATA[<p>The <code>nltest.exe</code> utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>nltest.exe</code> with specific arguments such as <code>/DOMAIN_TRUSTS</code>, <code>/DCLIST:*</code>, <code>/DCNAME:*</code>, <code>/DSGET*</code>, <code>/LSAQUERYFTI:*</code>, <code>/PARENTDOMAIN</code>, or <code>/BDC_QUERY:*</code> to enumerate domain trusts.</li>
<li>The <code>nltest.exe</code> utility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information.</li>
<li>The attacker parses the output of <code>nltest.exe</code> to identify trust relationships, domain controllers, and other relevant information about the domain infrastructure.</li>
<li>The attacker uses the gathered information to map out potential lateral movement paths within the environment.</li>
<li>The attacker leverages discovered trust relationships to authenticate to other domains or resources.</li>
<li>The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.</li>
<li>The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts via <code>nltest.exe</code> can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>nltest.exe</code> with command-line arguments indicative of domain trust discovery, using the provided Sigma rule.</li>
<li>Investigate any instances of <code>nltest.exe</code> execution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule.</li>
<li>Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.</li>
<li>Review and restrict the use of <code>nltest.exe</code> to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain trust</category><category>lateral movement</category><category>windows</category></item><item><title>Uncommon Destination Port Connection by Web Server on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</link><pubDate>Tue, 09 Jan 2024 18:28:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</guid><description>The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying potentially malicious activity stemming from Linux-based web servers. The rule is triggered when a web server process, such as Apache, Nginx, or others, initiates an outbound network connection to a destination port that is considered non-standard. This activity can signal the presence of a web shell, a malicious script uploaded to a web server to enable remote access and control. Attackers may exploit compromised web servers to establish covert communication channels, exfiltrate data, or launch further attacks on internal systems. The rule leverages data from Elastic Defend to monitor network connections and filter out legitimate traffic based on a predefined list of common ports and internal IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via exploitation of a vulnerability in a web application or web server component running on a Linux system (e.g., through SQL injection or remote code execution).</li>
<li>A web shell is uploaded to the compromised web server, often disguised as a legitimate file or hidden within existing directories.</li>
<li>The attacker interacts with the web shell through HTTP requests, using it as a command and control interface.</li>
<li>The web shell executes commands on the server, initiating outbound network connections to non-standard ports.</li>
<li>These connections may be used to communicate with external C2 servers, download additional payloads, or exfiltrate sensitive data.</li>
<li>The attacker uses the web shell to move laterally within the network, targeting other systems and services.</li>
<li>The attacker attempts to establish persistence on the compromised server, ensuring continued access even after system reboots.</li>
<li>The final objective is data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised web servers can lead to significant data breaches, system downtime, and reputational damage. While this rule triggers on low-severity behavior, successful exploitation can lead to complete system compromise. The number of affected systems depends on the scope of the initial vulnerability and the attacker&rsquo;s ability to move laterally. Organizations in all sectors that rely on web-based applications are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect web server processes initiating connections to unusual destination ports and tune for your environment.</li>
<li>Enable Elastic Defend integration to collect the necessary network event data from Linux endpoints to activate the rule.</li>
<li>Review and customize the list of excluded destination ports and internal IP ranges in the Sigma rule to match your organization&rsquo;s specific network configuration and legitimate traffic patterns.</li>
<li>Investigate any alerts generated by the rule to determine if the activity is malicious or benign, focusing on the process name, user, destination IP, and destination port.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>command-and-control</category><category>web shell</category><category>linux</category></item><item><title>Potential DGA Activity Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-dga-activity/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dga-activity/</guid><description>A machine learning job detected potential DGA (domain generation algorithm) activity indicative of malware command and control (C2) channels, identifying source IP addresses making DNS requests with a high probability of being DGA-generated, a technique used by adversaries to evade detection.</description><content:encoded><![CDATA[<p>This brief describes a detection of potential DGA (Domain Generation Algorithm) activity identified by an Elastic machine learning job. DGAs are often used by malware for command and control (C2) communication, generating domain names dynamically to evade detection. The machine learning job, <code>dga_high_sum_probability_ea</code>, analyzes DNS requests to identify source IP addresses that exhibit a high probability of DGA activity. This detection relies on the DGA Detection integration, which includes an ML-based framework to detect DGA activity in DNS events. The integration requires Fleet and DNS events collected by integrations such as Elastic Defend, Network Packet Capture, or Packetbeat. This activity matters for defenders because successful DGA-based C2 channels can allow malware to maintain communication and control even when individual malicious domains are blocked.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the network, potentially through unpatched vulnerabilities or social engineering.</li>
<li>Malware is deployed on the compromised host. This malware contains a DGA.</li>
<li>The malware uses the DGA to generate a list of potential domain names.</li>
<li>The compromised host initiates DNS requests to resolve the generated domain names.</li>
<li>The DNS requests are sent to internal or external DNS servers.</li>
<li>The machine learning job <code>dga_high_sum_probability_ea</code> analyzes the DNS requests, specifically looking for source IPs with a high aggregate probability of generating DGA domains.</li>
<li>If the anomaly score exceeds the threshold (70), an alert is triggered.</li>
<li>The malware successfully establishes a C2 channel with a dynamically generated domain, enabling further malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of DGA-based command and control can lead to persistent malware infections, data exfiltration, and further compromise of systems within the network. While the severity is rated low, the potential impact can escalate quickly if the C2 channel is used for more damaging activities. This detection focuses on identifying potential DGA activity, enabling security teams to investigate and prevent further damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the DGA Detection integration is installed and properly configured, including the machine learning job <code>dga_high_sum_probability_ea</code> (references: <a href="https://docs.elastic.co/en/integrations/dga">Elastic DGA Detection documentation</a>, <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">prebuilt ML jobs</a>).</li>
<li>Verify that DNS events are being collected by Elastic Defend, Network Packet Capture, or Packetbeat and that the data view used by the machine learning job includes these events (references: <a href="https://docs.elastic.co/en/integrations/endpoint">Elastic Defend</a>, <a href="https://docs.elastic.co/integrations/network_traffic">Network Packet Capture</a>, <a href="https://www.elastic.co/guide/en/beats/packetbeat/current/packetbeat-overview.html">Packetbeat</a>).</li>
<li>Tune the anomaly threshold (currently 70) in the machine learning job based on your environment to reduce false positives and ensure timely detection of DGA activity.</li>
<li>Review and implement the triage and analysis steps outlined in the rule&rsquo;s note section, focusing on identifying the source IP, analyzing DNS request patterns, and cross-referencing domains with threat intelligence feeds.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>dga</category><category>command-and-control</category><category>machine-learning</category></item><item><title>Account Discovery Command via SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</guid><description>The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where the SYSTEM account is used to execute account discovery utilities, such as <code>whoami.exe</code> and <code>net1.exe</code>. This behavior is commonly observed after an attacker has successfully achieved privilege escalation within a Windows environment, or after exploiting a web application. The rule is designed to detect post-exploitation discovery activity where an adversary attempts to gain situational awareness by enumerating accounts and system information using the elevated SYSTEM context. The rule leverages data from Elastic Defend and Sysmon Event ID 1 to identify these behaviors, helping defenders spot potential privilege escalation and lateral movement attempts. The original rule was created 2020/03/18 and updated 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through exploiting a vulnerability in a web application or through phishing.</li>
<li>The attacker escalates privileges to the SYSTEM account, possibly by exploiting a local privilege escalation vulnerability.</li>
<li>The attacker executes <code>whoami.exe</code> or <code>net1.exe</code> via the SYSTEM account to enumerate user accounts and gather system information.</li>
<li>The <code>whoami.exe</code> or <code>net1.exe</code> process is spawned by a parent process such as a web server process (e.g., w3wp.exe) or a service process.</li>
<li>The attacker uses the discovered account information to plan further actions, such as lateral movement or credential theft.</li>
<li>The attacker may use <code>net1.exe</code> to query domain information.</li>
<li>The attacker leverages the gained information to identify valuable targets within the network.</li>
<li>The final objective is often data exfiltration, deployment of ransomware, or further compromise of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Although this rule has low severity, the execution of discovery commands by the SYSTEM account can be a critical indicator of compromise. Early detection of such activity can prevent more severe damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect account discovery commands executed via the SYSTEM account and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the necessary data is available for detection.</li>
<li>Investigate any alerts generated by these rules, focusing on the process execution chain to identify the source of the SYSTEM account usage.</li>
<li>If the process tree includes a web-application server process, investigate suspicious file creation or modification to assess for webshell backdoors.</li>
<li>Review and harden web application security to prevent initial access and privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>privilege-escalation</category><category>windows</category></item><item><title>Okta Group Lifecycle Change Spike Indicating Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-group-lifecycle-spike/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-group-lifecycle-spike/</guid><description>A machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.</description><content:encoded><![CDATA[<p>This alert identifies potential privileged access activity within Okta environments by detecting unusual spikes in group lifecycle change events. The activity is detected using Elastic&rsquo;s Anomaly Detection feature. Adversaries may manipulate group structures to achieve privilege escalation, establish persistence, or move laterally within an organization. The anomaly detection job, <code>pad_okta_spike_in_group_lifecycle_changes_ea</code>, monitors these changes. This activity matters because unauthorized group modifications can grant attackers elevated permissions, compromise sensitive data, and disrupt normal business operations. The detection is based on machine learning analysis of Okta logs collected via an integration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a user account, possibly through credential theft or phishing (not directly observed, but a common precursor).</li>
<li><strong>Account Enumeration:</strong> The attacker enumerates existing groups and their memberships within the Okta environment.</li>
<li><strong>Group Manipulation:</strong> The attacker initiates unauthorized group lifecycle changes, such as adding or removing members, to escalate privileges.</li>
<li><strong>Privilege Escalation:</strong> By adding their compromised account to a privileged group (e.g., Okta administrators, application owners), the attacker gains elevated access.</li>
<li><strong>Lateral Movement:</strong> The attacker leverages their newly acquired privileges to access other systems or applications within the organization&rsquo;s network.</li>
<li><strong>Persistence:</strong> The attacker modifies group memberships to maintain persistent access even if their initial access is revoked (T1098.007).</li>
<li><strong>Data Access/Exfiltration:</strong> The attacker accesses sensitive data or resources that were previously inaccessible due to insufficient privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, compromise of critical systems, and disruption of business operations. The number of victims and the scope of the impact depend on the level of access achieved by the attacker and the sensitivity of the compromised data. While the alert is low severity, the potential consequences of privilege escalation are significant, requiring prompt investigation and remediation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate triggered alerts by reviewing the specific group lifecycle change events that triggered the alert in Okta logs to identify which groups were altered and the nature of the changes.</li>
<li>Examine the user accounts associated with the changes to determine if they have a history of suspicious activity or if they have recently been granted elevated privileges using the provided investigation steps.</li>
<li>Tune the machine learning job anomaly threshold <code>anomaly_threshold</code> in the rule configuration to reduce false positives based on your environment&rsquo;s baseline.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>okta</category><category>group-lifecycle</category></item><item><title>Unusual Source IP for Okta Privileged Operations Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-ip/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-ip/</guid><description>A machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.</description><content:encoded><![CDATA[<p>This alert leverages machine learning to identify deviations in IP usage patterns associated with privileged Okta operations, flagging unusual access attempts that could signify privilege escalation or account compromise. It identifies a user performing privileged operations in Okta from an uncommon source IP, potentially indicating account compromise, misuse of administrative privileges, or an attacker leveraging a new network location. The detection rule analyzes Okta logs, specifically focusing on events related to privileged operations and source IP addresses, to establish baseline behavior and detect anomalies. This detection is important because Okta controls access to many downstream applications, and any compromise of Okta privileges can lead to widespread data breaches. The rule requires the Privileged Access Detection integration assets to be installed, as well as Okta logs collected by integrations such as Okta. The minimum stack version is 9.4.0</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to a valid user account through phishing, credential stuffing, or other means (T1078, T1078.004).</li>
<li>The adversary leverages the compromised account to authenticate to Okta, potentially bypassing or circumventing MFA.</li>
<li>The adversary attempts to perform privileged operations within Okta, such as modifying user permissions, accessing sensitive applications, or changing security settings.</li>
<li>Okta logs record the privileged operation attempt, including the source IP address of the request.</li>
<li>The machine learning job analyzes the source IP address and compares it to the user&rsquo;s historical access patterns.</li>
<li>If the source IP address is determined to be unusual or rare for the user, the machine learning job generates an anomaly.</li>
<li>The &ldquo;Unusual Source IP for Okta Privileged Operations Detected&rdquo; rule triggers based on the anomaly score exceeding a predefined threshold (anomaly_threshold = 75).</li>
<li>The alert triggers, potentially leading to account takeover, data exfiltration, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive applications and data managed by Okta. This can result in data breaches, financial loss, reputational damage, and legal liabilities. Since Okta is a widely used identity management service, a compromise can impact numerous downstream applications and services that rely on Okta for authentication and authorization. The number of affected users and systems can vary depending on the scope of the privileged access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Privileged Access Detection integration assets, as well as Okta logs collected by integrations such as Okta, as described in the &ldquo;Setup&rdquo; section of the rule to enable the machine learning job.</li>
<li>Review the source IP address flagged by the alert to determine its geolocation and assess if it aligns with the user&rsquo;s typical access patterns or known locations, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
<li>Tune the <code>anomaly_threshold</code> parameter in the machine learning job based on your environment to reduce false positives.</li>
<li>Correlate the flagged IP address with any known threat intelligence feeds to check for any history of malicious activity associated with it, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>okta</category><category>machine-learning</category></item><item><title>Suspicious PDF Reader Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</link><pubDate>Thu, 04 Jan 2024 18:45:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</guid><description>Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging PDF reader applications as an initial access vector, exploiting vulnerabilities within these programs or using social engineering to trick users into opening malicious PDF documents. Upon successful exploitation, adversaries often spawn built-in Windows utilities from the compromised PDF reader process to perform reconnaissance, escalate privileges, or establish persistence. This activity is designed to blend in with normal system operations, making it difficult to detect without specific monitoring and detection rules. The targeted software commonly includes Adobe Acrobat, Adobe Reader, and Foxit Reader. Defenders should be vigilant for unexpected child processes of PDF readers, especially command-line interpreters and system administration tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious PDF document via phishing or other means.</li>
<li>The user opens the PDF document using a vulnerable PDF reader application (e.g., Adobe Acrobat, Foxit Reader).</li>
<li>The PDF document exploits a vulnerability or uses a malicious script to execute an arbitrary command.</li>
<li>The PDF reader application spawns a command-line interpreter (e.g., cmd.exe, powershell.exe) or a system administration tool (e.g., reg.exe, net.exe).</li>
<li>The spawned process executes commands to gather system information (e.g., ipconfig.exe, systeminfo.exe, whoami.exe).</li>
<li>The attacker may attempt to discover network configuration, user accounts, or running processes.</li>
<li>The attacker could leverage the spawned process to download and execute further payloads.</li>
<li>The attacker gains a foothold on the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PDF reader applications can lead to initial access, privilege escalation, and further compromise of the affected system. While individual incidents may have a low risk score, widespread exploitation can lead to significant data breaches, system downtime, and reputational damage. The use of legitimate system utilities for malicious purposes can make detection challenging, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of suspicious child processes (Sysmon Event ID 1, Windows Security Event Logs).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious PDF Reader Child Process&rdquo; to your SIEM and tune for your environment to detect the execution of suspicious processes spawned by PDF reader applications.</li>
<li>Monitor for network connections originating from PDF reader applications to unusual or external IP addresses.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>initial-access</category><category>defense-evasion</category><category>discovery</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>Unusual Time or Day for an RDP Session Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-rdp-session/</link><pubDate>Wed, 03 Jan 2024 18:50:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-rdp-session/</guid><description>A machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.</description><content:encoded><![CDATA[<p>This alert originates from a machine learning job designed to detect anomalous RDP session start times. RDP is a common vector for lateral movement, and attackers may initiate sessions during off-peak hours to evade detection. The machine learning model flags sessions started outside of normal business hours or on unusual weekdays. While not inherently malicious, this activity warrants investigation as it can be an early indicator of a broader attack. The rule is part of the Lateral Movement Detection (LMD) integration from Elastic, requiring a minimum stack version of 9.4.0 and leverages Entity Analytics (EA) fields. Lateral Movement Detection integration detects lateral movement activity by identifying abnormalities in file and Windows RDP events using Elastic&rsquo;s Anomaly Detection feature.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or a software vulnerability (not described in source).</li>
<li>The attacker leverages RDP to attempt lateral movement to other systems within the network.</li>
<li>The RDP session is initiated at an unusual time or day, deviating from typical user behavior.</li>
<li>The machine learning job detects this anomaly based on the unusual RDP session start time.</li>
<li>An alert is triggered, flagging the potentially suspicious activity.</li>
<li>The attacker may attempt to access sensitive data or resources on the target system.</li>
<li>The attacker could install malware or establish persistence mechanisms (not described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an attacker to gain access to sensitive data, compromise critical systems, and ultimately disrupt business operations. While the detection of an unusual RDP session is an early warning sign, it is critical to investigate these alerts promptly to prevent further escalation. If the suspicious RDP session is part of a broader attack, the impact could range from data theft to ransomware deployment. The lack of immediate action could lead to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection within Elastic Defend if using versions 8.18 and above, following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Ensure the Lateral Movement Detection integration assets are installed, as well as file and Windows RDP process events collected by the Elastic Defend integration, as mentioned in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Investigate all alerts generated by the &ldquo;Unusual Time or Day for an RDP Session&rdquo; rule, correlating the RDP session with other security events.</li>
<li>Tune the anomaly threshold (currently 70) to reduce false positives while maintaining effective detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Suspicious Windows Process Cluster Detection via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</guid><description>A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.</description><content:encoded><![CDATA[<p>This detection identifies suspicious Windows processes exhibiting high malicious probability scores. The rule leverages machine learning to detect clusters of processes that may be indicative of defense evasion tactics, such as masquerading or the use of LOLbins (Living Off The Land Binaries). Specifically, a supervised ML model (ProblemChild) predicts whether a process is malicious, and an unsupervised ML model assesses the aggregate score of process clusters on a single host. The rule focuses on identifying unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat. It was last updated on 2026/04/01 and requires Elastic Stack version 9.4.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows host through various methods, such as exploiting vulnerabilities or using compromised credentials (not detailed in source).</li>
<li>Execution: The attacker executes a LOLBin (e.g., PowerShell, cmd.exe, mshta.exe) on the compromised host.</li>
<li>Masquerading: The attacker attempts to masquerade the malicious activity by naming or placing the LOLBin within a legitimate system folder.</li>
<li>Defense Evasion: The attacker utilizes the LOLBin with specific command-line arguments designed to evade detection by traditional signature-based security solutions.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to escalate privileges using further LOLBINS or other techniques.</li>
<li>Lateral Movement (Optional): The attacker may use the compromised host to move laterally to other systems within the network.</li>
<li>Command and Control (Optional): The attacker may establish command and control (C2) communication with an external server to receive further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to various negative impacts, including data breaches, financial loss, and reputational damage. The rule is assigned a low severity, due to it likely being a supplemental detection to other rules. Lateral movement and exfiltration can also be accomplished. There is no information available on the number of victims and specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, to collect Windows process events as outlined in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Review the host name associated with the suspicious process cluster to determine if it is a critical asset or has a history of similar alerts as suggested in the investigation guide.</li>
<li>Examine the specific processes flagged by the ProblemChild supervised ML model to identify any known LOLbins or unusual command-line arguments that may indicate masquerading, per the investigation guide.</li>
<li>Implement application whitelisting to prevent unauthorized or suspicious processes from executing in the future, as advised in the remediation steps.</li>
<li>Tune the anomaly threshold of the machine learning job (<code>problem_child_high_sum_by_host_ea</code>) to reduce false positives based on your environment&rsquo;s specific characteristics and activity patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>LOLbins</category><category>windows</category></item><item><title>Windows Account Discovery of Administrator Accounts</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</link><pubDate>Wed, 03 Jan 2024 17:14:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</guid><description>Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance activities within a compromised environment to understand the available resources and potential targets. This reconnaissance helps them plan subsequent actions, such as privilege escalation and lateral movement. This activity involves using built-in Windows utilities like <code>net.exe</code> and <code>wmic.exe</code> to enumerate administrator-related user accounts and groups. This information can reveal potential targets for credential compromise or other post-exploitation activities. Lower privileged accounts commonly perform this enumeration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>net.exe</code> with arguments to list users and groups.</li>
<li>The attacker filters the output for administrator-related keywords like &ldquo;admin&rdquo;, &ldquo;Domain Admins&rdquo;, &ldquo;Enterprise Admins&rdquo;, &ldquo;Remote Desktop Users&rdquo;, or &ldquo;Organization Management&rdquo;.</li>
<li>Alternatively, the attacker executes <code>wmic.exe</code> to query user accounts.</li>
<li>The attacker parses the output from <code>wmic.exe</code> to identify administrator accounts.</li>
<li>The attacker identifies privileged accounts to target for credential theft or privilege escalation.</li>
<li>The attacker uses the identified accounts to perform lateral movement or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of administrator accounts allows an attacker to identify high-value targets within the environment. This can lead to credential theft, privilege escalation, lateral movement, and ultimately, unauthorized access to sensitive data or systems. While the risk score is low, this activity serves as a precursor to more serious compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>net.exe</code> and <code>wmic.exe</code> commands with arguments related to user and group enumeration using the Sigma rules provided.</li>
<li>Investigate any instances of lower-privileged accounts executing these commands and filter out authorized administrative accounts performing the same actions.</li>
<li>Enable Windows process creation logging to capture the necessary events.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>account-discovery</category><category>windows</category></item><item><title>Spike in Bytes Sent to an External Device via Airdrop</title><link>https://feed.craftedsignal.io/briefs/2024-01-airdrop-exfiltration/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-airdrop-exfiltration/</guid><description>A machine learning job has detected a spike in bytes of data written to an external device via Airdrop, potentially indicating illicit data copying or transfer activities.</description><content:encoded><![CDATA[<p>This detection identifies potential data exfiltration attempts via Apple&rsquo;s Airdrop feature. A machine learning job monitors the volume of data transferred to external devices and flags unusual spikes. While Airdrop facilitates legitimate file sharing between Apple devices, it can be abused by malicious actors to exfiltrate sensitive data. This rule leverages the &ldquo;ded_high_bytes_written_to_external_device_airdrop_ea&rdquo; machine learning job and requires the Data Exfiltration Detection integration to be installed, along with network and file events collected by Elastic Defend and Network Packet Capture (for network events only). The rule is designed to detect anomalies in data transfer patterns, providing early warning of potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a macOS system within the target network.</li>
<li>Attacker identifies sensitive data stored on the compromised system.</li>
<li>Attacker uses Airdrop to initiate a transfer of the identified data to a nearby device.</li>
<li>The receiving device is controlled by the attacker and configured to accept Airdrop transfers.</li>
<li>A large volume of data is transferred via Airdrop, triggering the machine learning detection.</li>
<li>The data is received by the attacker, completing the exfiltration process.</li>
<li>The attacker may attempt to cover their tracks by deleting files or logs related to the Airdrop transfer.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the unauthorized disclosure of sensitive data. The impact depends on the nature of the exfiltrated data, potentially leading to financial loss, reputational damage, or legal repercussions. The severity is relatively low as it depends on the data being transferred.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Data Exfiltration Detection integration in Elastic, including the preconfigured anomaly detection jobs, as required by the rule setup instructions to enable the machine learning detection (Data Exfiltration Detection integration).</li>
<li>Investigate alerts generated by the &ldquo;Spike in Bytes Sent to an External Device via Airdrop&rdquo; rule, focusing on identifying the involved device, user, and the nature of the transferred data (Spike in Bytes Sent to an External Device via Airdrop).</li>
<li>Implement additional monitoring on the affected device and similar devices to detect any further anomalous Airdrop activities, as mentioned in the response and remediation steps (Spike in Bytes Sent to an External Device via Airdrop).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>macos</category><category>airdrop</category></item><item><title>High Command Line Entropy Detected for Privileged Commands on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</guid><description>A machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.</description><content:encoded><![CDATA[<p>This alert originates from a machine learning job designed to detect anomalous command-line activity on Linux systems. Specifically, it focuses on identifying instances where privileged commands are executed with unusually high entropy. High entropy in command lines often signifies obfuscation, which threat actors use to mask their activities and evade detection. This rule leverages the Privileged Access Detection (PAD) integration from Elastic to identify these anomalies. The PAD integration requires Linux logs collected by Elastic Defend or Sysmon Linux. The detection logic analyzes command lines associated with privileged commands, flagging those with a high degree of randomness or complexity. This can indicate unauthorized use of valid accounts (T1078) or attempts at privilege escalation, especially if combined with defense evasion techniques (T1027) such as obfuscating commands. The rule and associated ML job have been in production since Feb 2025 and require Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through a compromised account or vulnerability exploitation.</li>
<li>The attacker identifies privileged commands they need to execute to achieve their objectives, such as gaining root access or modifying sensitive files.</li>
<li>To evade detection, the attacker obfuscates their commands using techniques like encoding, compression, or complex string manipulation.</li>
<li>The attacker executes the obfuscated privileged commands via the command line.</li>
<li>Elastic Defend or Sysmon Linux captures the command-line activity and logs it to Elasticsearch.</li>
<li>The Privileged Access Detection ML job analyzes the command lines and calculates their entropy.</li>
<li>If the entropy exceeds a predefined threshold, the ML job flags the activity as anomalous and generates an alert.</li>
<li>Security analysts investigate the alert to determine the nature of the suspicious activity and take appropriate action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation can grant an attacker complete control over a Linux system, allowing them to steal sensitive data, install malware, or disrupt critical services. While this rule itself triggers on unusual command line activity, the underlying behavior could lead to a full system compromise. The number of potential victims is directly related to the scope of the Linux environment being monitored. Sectors commonly targeted by privilege escalation attacks include technology, finance, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Privileged Access Detection integration and ensure that Linux logs from Elastic Defend or Sysmon Linux are being ingested (Setup section).</li>
<li>Review and tune the machine learning job <code>pad_linux_high_median_process_command_line_entropy_by_user_ea</code> to minimize false positives based on your environment (False positive analysis section in rule).</li>
<li>Create a case management workflow triggered by the &ldquo;High Command Line Entropy Detected for Privileged Commands&rdquo; rule to ensure alerts are promptly investigated.</li>
<li>Implement the remediation steps outlined in the investigation guide to contain and eradicate any confirmed malicious activity (Response and remediation section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>machine-learning</category><category>linux</category></item><item><title>Unusual Remote File Extension Detected via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</guid><description>An Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.</description><content:encoded><![CDATA[<p>This brief focuses on a detection rule from Elastic&rsquo;s Lateral Movement Detection (LMD) integration that utilizes machine learning to identify unusual remote file transfers. The rule, &ldquo;Unusual Remote File Extension,&rdquo; is designed to detect anomalies in file transfers, specifically those involving rare file extensions, which could be indicative of lateral movement within a network. This rule leverages the <code>lmd_rare_file_extension_remote_transfer_ea</code> machine learning job ID. The rule requires the Lateral Movement Detection integration assets to be installed, as well as file and Windows RDP process events collected by the Elastic Defend integration. The rule operates by analyzing <code>host.ip</code> and detecting anomalies in file transfers, where host IP collection needs to be enabled on Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems using remote services like RDP or SMB.</li>
<li>As part of the lateral movement, the attacker transfers tools or files to the remote system.</li>
<li>The attacker uses a rare or uncommon file extension for the transferred files, potentially to evade detection based on known file types.</li>
<li>The file transfer occurs over the network, triggering file event logs on the source and destination systems.</li>
<li>Elastic Defend, with host IP collection enabled, monitors these file events and forwards the data to the Elastic Security platform.</li>
<li>The &ldquo;Unusual Remote File Extension&rdquo; machine learning job identifies the transfer of a file with a rare extension, comparing it against historical data.</li>
<li>If the file extension is deemed anomalous based on its rarity, the rule triggers, indicating potential lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an adversary to gain access to sensitive data, critical systems, or privileged accounts. By using uncommon file extensions, attackers attempt to bypass security measures that rely on identifying known file types. This can lead to undetected malware deployment, data exfiltration, or further compromise of the network. Though this rule is of low severity, it can provide an early warning signal to stop an attack before greater damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the <code>host.ip</code> field within Elastic Defend configurations (versions 8.18 and above) to ensure proper data collection for the machine learning job.</li>
<li>Install the Lateral Movement Detection integration assets within Kibana as per the provided setup instructions to activate the &ldquo;Unusual Remote File Extension&rdquo; rule.</li>
<li>Tune the anomaly threshold of the machine learning job to reduce false positives, considering your organization&rsquo;s typical file transfer patterns.</li>
<li>Deploy the &ldquo;Detect Remote File Extension Transfer&rdquo; Sigma rule to identify file transfers with rare extensions using process creation logs.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s documentation to effectively investigate and respond to triggered alerts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>Spike in Special Privilege Use Events</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-privilege-use/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-privilege-use/</guid><description>A machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.</description><content:encoded><![CDATA[<p>This detection identifies unusual spikes in special privilege use events on Windows systems, leveraging machine learning to detect anomalies. The rule, designed for the Elastic platform, uses the &ldquo;pad_windows_high_count_special_privilege_use_events_ea&rdquo; machine learning job to identify deviations from established baselines of user behavior related to privileged operations. The rule focuses on events collected via the Elastic Defend and Windows integrations. A sudden increase in these events may signify an attempt to escalate privileges, execute unauthorized tasks, or maintain persistence within a system. By monitoring these anomalies, defenders can identify potential misuse of privileges and investigate suspicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through valid accounts (T1078).</li>
<li>The attacker attempts to escalate privileges to gain higher-level access within the system (TA0004).</li>
<li>This privilege escalation involves performing privileged operations or service calls.</li>
<li>The attacker may use access token manipulation (T1134) to impersonate legitimate users or processes with elevated privileges.</li>
<li>The system records these privileged operations as special privilege use events.</li>
<li>The machine learning model detects a significant spike in these events compared to the user&rsquo;s baseline behavior.</li>
<li>The detection triggers an alert, indicating a potential security incident.</li>
<li>The attacker leverages elevated privileges to execute unauthorized tasks or maintain persistence (TA0005).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over a compromised system. The attacker can then access sensitive data, install malware, or move laterally to other systems within the network. While this specific detection has a low severity, a successful attack could lead to significant data breaches, system downtime, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Privileged Access Detection integration assets, including the preconfigured anomaly detection jobs, as outlined in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup guide</a>.</li>
<li>Enable Windows event collection using Elastic Defend or the Windows integration to provide the necessary data for the machine learning job.</li>
<li>Review user accounts associated with spikes in special privilege use events, investigating whether the activity aligns with their normal behavior, as described in the investigation guide.</li>
<li>Escalate incidents with potential privilege escalation techniques to the security operations team for deeper investigation, referencing MITRE ATT&amp;CK technique T1068.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>privilege-escalation</category><category>windows</category></item><item><title>Machine Learning Detects High Bytes Written to External Device</title><link>https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</guid><description>A machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.</description><content:encoded><![CDATA[<p>This brief addresses a machine learning detection identifying anomalous data transfer volumes to external devices. The Elastic Data Exfiltration Detection integration includes a prebuilt machine learning job, <code>ded_high_bytes_written_to_external_device_ea</code>, designed to detect spikes in data written to external devices. This behavior is considered anomalous because typical operational settings usually exhibit predictable patterns or ranges of data transfer to external storage. The detection is triggered when the amount of data written significantly deviates from the established baseline, potentially signaling unauthorized data copying or exfiltration attempts. This detection focuses on identifying abnormalities, providing an alert for investigation of possible illicit data transfer activities. The integration requires the Elastic Defend integration to collect file events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses their access to locate and stage sensitive data for exfiltration.</li>
<li>The attacker connects an external storage device, such as a USB drive, to the compromised system.</li>
<li>The attacker initiates a large data transfer operation, copying the staged data to the external device.</li>
<li>Elastic Defend monitors file events and detects a significant increase in bytes written to the external device.</li>
<li>The <code>ded_high_bytes_written_to_external_device_ea</code> machine learning job identifies the unusual data transfer volume.</li>
<li>An alert is triggered based on the anomaly threshold defined in the Data Exfiltration Detection rule.</li>
<li>The attacker removes the external device, completing the exfiltration of the sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of data to external devices can lead to significant data breaches. The impact varies depending on the sensitivity and volume of the data stolen. This activity can result in financial losses, reputational damage, legal repercussions, and compromise of intellectual property. While the specific number of affected organizations is unknown, any organization that allows the use of external storage devices is potentially vulnerable. This issue poses a risk across various sectors, particularly those handling sensitive data, such as finance, healthcare, and technology.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Data Exfiltration Detection integration and configure the preconfigured anomaly detection jobs as described in the rule&rsquo;s setup instructions.</li>
<li>Review and tune the <code>anomaly_threshold</code> (currently set to 75) based on your environment&rsquo;s baseline data transfer patterns to reduce false positives.</li>
<li>Deploy endpoint detection and response (EDR) solutions to enhance visibility and control over data movements to external devices as mentioned in the &ldquo;Response and remediation&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Create exceptions for known backup operations, software updates, and data archiving processes that may trigger false positives, referencing the &ldquo;False positive analysis&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Implement additional monitoring on similar devices and network segments to detect any further anomalous data transfer activities, based on the rule&rsquo;s description and &ldquo;Response and remediation&rdquo; section of the <code>note</code>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>endpoint</category></item><item><title>Detection of Command and Control Activity via Common Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</guid><description>This rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.</description><content:encoded><![CDATA[<p>This detection rule, sourced from Elastic, identifies potential command and control (C2) activity by detecting connections to commonly abused web services. Adversaries often leverage popular web services like pastebin, GitHub, Dropbox, and Discord to mask malicious communications within legitimate network traffic. This technique makes it challenging for defenders to distinguish between normal user activity and malicious C2 traffic. The rule focuses on Windows systems and monitors DNS queries to identify processes communicating with a predefined list of services known to be abused by attackers. The rule was last updated on 2026-05-04 and is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. The goal is to identify anomalous network connections originating from unusual processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user on a Windows host unknowingly executes a malicious file (e.g., via phishing or drive-by download).</li>
<li>The malicious file executes a process outside of typical program directories (e.g., <code>C:\Windows\Temp</code>).</li>
<li>This process initiates a DNS query to a domain associated with a commonly abused web service (e.g., <code>pastebin.com</code>, <code>githubusercontent.com</code>).</li>
<li>The DNS query resolves to an IP address, and a network connection is established to the web service.</li>
<li>The malicious process uploads or downloads data from the web service, potentially containing commands for the compromised host or exfiltrated data.</li>
<li>The web service acts as an intermediary, relaying commands from the attacker to the compromised host or exfiltrated data from the compromised host to the attacker.</li>
<li>The attacker uses the C2 channel to perform further actions on the compromised host, such as lateral movement or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using common web services for C2 can lead to data exfiltration, system compromise, and further propagation within the network. The low severity suggests a focus on detecting early-stage C2 activity, which if left unchecked, could escalate into a significant incident. The usage of popular web services makes detection difficult, requiring careful analysis and tuning to avoid false positives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Connection to Commonly Abused Web Services&rdquo; to your SIEM and tune it for your environment to minimize false positives.</li>
<li>Enable Sysmon DNS query logging to accurately capture DNS requests for improved detection capabilities, activating the &ldquo;DNS Query to Commonly Abused Web Services&rdquo; rule.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain and network connections to determine the legitimacy of the activity, referencing the investigation steps described in the rule documentation.</li>
<li>Review and update the list of excluded processes in the Sigma rule to reflect your organization&rsquo;s approved software and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-and-control</category><category>webservice</category><category>windows</category></item><item><title>GitHub Self-Hosted Runner Configuration Changes Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</guid><description>Detection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting changes to self-hosted runner configurations within GitHub environments. Self-hosted runners are systems deployed and managed by users to execute jobs from GitHub Actions, providing flexibility and control over the execution environment. Monitoring these runners is crucial because unauthorized modifications can lead to various malicious activities, including data collection, persistence, privilege escalation, or even initial access. The rule provided detects such changes based on audit logs, requiring administrators to validate the changes through the GitHub UI for complete context. Detecting these modifications early can help prevent or mitigate potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub organization or repository with permissions to manage self-hosted runners. This could be achieved through compromised credentials (T1078.004) or exploiting a vulnerability.</li>
<li>The attacker modifies the configuration of an existing self-hosted runner group or creates a new runner group (org.runner_group_created).</li>
<li>The attacker adds or removes runners from a runner group (org.runner_group_runners_added, org.runner_group_runner_removed, org.runner_group_updated).</li>
<li>Alternatively, the attacker registers a new self-hosted runner within the environment (repo.register_self_hosted_runner).</li>
<li>The attacker removes an existing self-hosted runner from the environment (repo.remove_self_hosted_runner, org.remove_self_hosted_runner).</li>
<li>The attacker uses the compromised runner or runner group to execute malicious code within the GitHub Actions workflow, potentially collecting sensitive data or escalating privileges.</li>
<li>The attacker leverages the compromised runner to establish persistence within the GitHub environment, ensuring continued access.</li>
<li>The attacker exploits the compromised runner to gain initial access to other systems or networks connected to the GitHub environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised self-hosted runners can lead to a range of impacts, including data exfiltration, code injection, and privilege escalation within the targeted GitHub environment. Successful attacks could result in unauthorized access to sensitive repositories, modification of code, or deployment of malicious software. The impact can vary depending on the scope of the compromised runner and the permissions associated with it. The effects could extend beyond the GitHub environment if the compromised runner has access to other systems or networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the audit log streaming feature in GitHub to capture events related to self-hosted runner modifications, as required by the logsource definition.</li>
<li>Deploy the Sigma rule &ldquo;Github Self Hosted Runner Changes Detected&rdquo; to your SIEM and tune for your specific environment to detect suspicious configuration changes.</li>
<li>Regularly review the audit logs in the GitHub UI to validate any detected changes to self-hosted runners and runner groups to ensure legitimate modifications.</li>
<li>Implement strict access control policies for managing self-hosted runners, limiting permissions to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>self-hosted-runner</category><category>audit-log</category><category>devops</category><category>supply-chain</category></item><item><title>Windows User Account Creation via Net.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</guid><description>This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.</description><content:encoded><![CDATA[<p>Attackers may create new accounts (both local and domain) to maintain access to victim systems. This rule identifies the usage of <code>net.exe</code> to create new accounts on Windows systems. The detection logic focuses on process execution events where <code>net.exe</code> or <code>net1.exe</code> are executed with arguments indicative of user creation, specifically the &lsquo;user&rsquo; argument in conjunction with either the &lsquo;/ad&rsquo; or &lsquo;/add&rsquo; flags. While account creation is a common administrative task, suspicious executions, especially those initiated by unusual parent processes or accounts, warrant further investigation. This rule is designed for data generated by Elastic Defend but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, enhancing its applicability across various security environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker opens a command prompt or PowerShell session.</li>
<li>The attacker uses <code>net.exe</code> or <code>net1.exe</code> to create a new user account. The command includes the <code>user</code> argument along with <code>/add</code> or <code>/ad</code> flags. For example: <code>net user &lt;username&gt; &lt;password&gt; /add</code>.</li>
<li>The attacker may add the newly created user to privileged groups, such as <code>Administrators</code> or <code>Domain Admins</code>, to elevate privileges.</li>
<li>The attacker uses the new account to move laterally within the network, accessing sensitive data or systems.</li>
<li>The attacker establishes persistence by configuring the new account to be a service account or adding it to local administrator groups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and long-term persistence on compromised systems. The impact is often determined by the privileges assigned to the newly created account. If the attacker adds the account to the <code>Administrators</code> group, they can effectively take full control of the affected system. In a domain environment, creating a domain account can lead to wider compromise across the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to capture the necessary events for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>net.exe</code> or <code>net1.exe</code> creating user accounts, especially when initiated by unusual parent processes.</li>
<li>Monitor for newly created accounts being added to privileged groups.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s original documentation for guidance on investigating and responding to potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>user-account-creation</category><category>windows</category></item><item><title>MSBuild Process Injection Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-process-injection/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-process-injection/</guid><description>The Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a platform for building applications, commonly used in software development environments. Adversaries are exploiting MSBuild to perform process injection, a technique to execute malicious code within the address space of another process. This allows attackers to evade detection and potentially escalate privileges. The detection focuses on monitoring for thread creation in other processes by instances of MSBuild.exe. This activity is considered unusual outside of legitimate software development or build environments. The exploitation of MSBuild for process injection is a known technique (T1127.001) to proxy execution through trusted developer utilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., compromised credentials, software vulnerability).</li>
<li>The attacker executes MSBuild.exe, either directly or through another process.</li>
<li>MSBuild.exe is used to load and execute a malicious project file or inline code.</li>
<li>The malicious code within the MSBuild project file leverages Windows API calls to create a thread in a target process.</li>
<li>The created thread injects malicious code or a payload into the target process&rsquo;s memory space.</li>
<li>The injected code executes within the context of the target process, potentially performing malicious activities.</li>
<li>These activities could include lateral movement, data exfiltration, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful process injection can lead to a variety of malicious outcomes, including privilege escalation, data theft, and system compromise. While the specific number of victims is not available, any Windows system running MSBuild is potentially vulnerable. The use of a trusted Microsoft utility like MSBuild makes detection more difficult, as it can blend in with legitimate developer activity. This can lead to prolonged compromise and significant damage before the malicious activity is detected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and CreateRemoteThread logging (event IDs 1 and 8) to detect the malicious activity described in the attack chain.</li>
<li>Deploy the Sigma rule &ldquo;Process Injection by the Microsoft Build Engine&rdquo; to your SIEM and tune for your environment to reduce false positives.</li>
<li>Implement application whitelisting to prevent unauthorized execution of MSBuild.exe in non-development environments.</li>
<li>Monitor the parent processes of MSBuild.exe for unusual or suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>process-injection</category></item><item><title>Windows USN Journal Deletion via Fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</guid><description>Adversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.</description><content:encoded><![CDATA[<p>Attackers can use the <code>fsutil.exe</code> utility to delete the volume USN Journal in Windows. The USN Journal tracks changes made to files and directories on a disk volume, including metadata for file creation, deletion, modification, and permission changes. Deleting this journal can hinder forensic analysis by removing evidence of file operations. This technique is used to cover tracks and evade detection after an initial compromise. This activity is often observed during the post-exploitation phase of an attack, where adversaries attempt to remove traces of their presence and actions on the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>fsutil.exe</code> via command line.</li>
<li>The command <code>fsutil usn deletejournal /D [volume]</code> is used to delete the USN Journal on the specified volume.</li>
<li>The operating system processes the command, removing the USN Journal.</li>
<li>Subsequent file system activity is no longer recorded in the USN Journal.</li>
<li>The attacker performs further actions on the system, such as lateral movement or data exfiltration.</li>
<li>Forensic analysis is hampered due to the missing USN Journal entries.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of the USN Journal impairs forensic investigations and incident response efforts. Without the USN Journal, analysts may struggle to determine the full scope of an intrusion, including files created, modified, or deleted by the attacker. This can lead to incomplete remediation and a higher risk of reinfection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect USN Journal Deletion via Fsutil&rdquo; to your SIEM to identify this specific behavior.</li>
<li>Monitor process execution events for <code>fsutil.exe</code> with arguments related to &ldquo;deletejournal&rdquo; and &ldquo;usn&rdquo; to detect potential attempts to delete the USN Journal.</li>
<li>Enable Sysmon process creation logging to capture the execution of <code>fsutil.exe</code> with the relevant arguments.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>fsutil</category><category>usn journal</category></item><item><title>Werfault ReflectDebugger Persistence via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</guid><description>Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Error Reporting (Werfault) service to establish persistence on a compromised system. This is achieved by modifying the ReflectDebugger registry key. When Werfault is executed with the <code>-pr</code> parameter, it will execute the debugger specified in the ReflectDebugger registry key. This allows attackers to execute arbitrary code every time the Windows Error Reporting utility is triggered. The technique involves modifying specific registry paths associated with the ReflectDebugger. This behavior has been documented as a persistence mechanism in malware analysis reports.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means.</li>
<li>The attacker attempts to modify the Windows Error Reporting ReflectDebugger registry key.</li>
<li>The attacker modifies the ReflectDebugger value within one of the following registry paths: <code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, <code>\REGISTRY\MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, or <code>MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>.</li>
<li>The attacker sets the ReflectDebugger value to a malicious executable or script.</li>
<li>The attacker triggers Werfault.exe with the <code>-pr</code> parameter, either manually or through a system event.</li>
<li>Werfault.exe executes the attacker-controlled code specified in the ReflectDebugger registry value.</li>
<li>The attacker achieves persistence, as the malicious code is executed each time Werfault is triggered with the <code>-pr</code> parameter.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the targeted system. This can lead to the execution of arbitrary code, potentially resulting in data theft, further malware installation, or complete system compromise. The impact is limited by the permissions of the Werfault process. While no specific victim counts are available, this technique can affect any Windows system where the attacker can modify the registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Werfault ReflectDebugger Registry Modification</code> to detect unauthorized modifications to the ReflectDebugger registry key (logsource: <code>registry_set</code>, rule title).</li>
<li>Enable Sysmon process creation logging to detect the execution of Werfault with the <code>-pr</code> parameter.</li>
<li>Monitor registry events for changes to the specific ReflectDebugger paths mentioned in the overview section (<code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry_modification</category><category>werfault</category></item><item><title>Unusual Windows Processes Connecting to Domains Using Free SSL Certificates</title><link>https://feed.craftedsignal.io/briefs/2024-01-freesslcert-c2/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-freesslcert-c2/</guid><description>This rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows processes communicating with domains using free SSL certificates from providers like Let&rsquo;s Encrypt, SSLforFree, ZeroSSL, and FreeSSL. Attackers can leverage these certificates to encrypt command and control (C2) communications, blending malicious traffic with legitimate encrypted web traffic. The rule focuses on detecting unusual processes, specifically those originating from standard Windows system paths that would not typically establish connections to services using free SSL certificates. This excludes known benign processes to reduce false positives and highlight potentially malicious C2 activity. This rule was published on 2020/11/04 and last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host.</li>
<li>The attacker installs a malicious agent on the compromised host.</li>
<li>The agent is configured to use a domain that utilizes a free SSL certificate for C2 communication.</li>
<li>The malicious agent establishes a DNS connection to a domain ending in *.letsencrypt.org, *.sslforfree.com, *.zerossl.com, or *.freessl.org.</li>
<li>The infected host bypasses host-based firewalls, as the traffic is encrypted.</li>
<li>The agent receives commands from the C2 server over the encrypted channel.</li>
<li>The attacker executes commands to perform lateral movement or data exfiltration.</li>
<li>The attacker exfiltrates sensitive data from the compromised host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to undetected command and control activity within the network. Attackers could use this encrypted channel to exfiltrate sensitive data, deploy ransomware, or move laterally to other systems. Due to the use of free SSL certificates, the traffic appears legitimate and can bypass basic network security controls. While the rule severity is low, a successful C2 channel can lead to critical impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious processes using free SSL certificates for communication, tuning the false positives for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes not typically associated with network activity originating from the defined Windows system paths.</li>
<li>Monitor DNS query logs for connections to domains using free SSL certificates from unusual or untrusted processes.</li>
<li>Update the Sigma rule with new free SSL certificate providers and adjust the excluded processes based on observed false positives in your environment.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging for better visibility into DNS requests.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-and-control</category><category>encrypted-channel</category><category>freessl</category></item><item><title>Unusual System Utilities Initiating Network Connections</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</guid><description>Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.</description><content:encoded><![CDATA[<p>Attackers frequently exploit built-in system utilities to bypass security measures and execute malicious code. This technique, known as &ldquo;Living off the Land,&rdquo; allows them to blend in with legitimate system activity, making detection more challenging. This threat brief focuses on identifying unusual network connections originating from Windows system utilities that are not typically associated with network communication. This behavior is often indicative of an attacker leveraging these tools for purposes such as downloading payloads, establishing command and control, or exfiltrating data. The utilities of concern include: Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe. Defenders should monitor for network activity from these processes to identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker leverages a system utility such as <code>cmstp.exe</code> to execute malicious code.</li>
<li><code>cmstp.exe</code> is invoked with a malicious INF file, leading to the execution of arbitrary commands.</li>
<li>The executed code initiates a network connection to an external server.</li>
<li>The connection is used to download a secondary payload, such as a reverse shell or malware.</li>
<li>The attacker uses the downloaded payload to establish a persistent presence on the system.</li>
<li>The attacker performs lateral movement to other systems on the network.</li>
<li>The attacker exfiltrates sensitive data from compromised systems to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a compromised system with unauthorized code execution, data exfiltration, and potential lateral movement within the network. Due to the low severity and the high probability of false positives, this rule should be tuned for specific environments and paired with other detection mechanisms. This may lead to data breaches, financial loss, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rules provided in this brief to detect unusual network connections from system utilities within your environment.</li>
<li>Monitor process execution events for the utilities listed in the rule query to identify potential abuse of these tools.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into process execution and network activity.</li>
<li>Correlate detections from this rule with other security alerts and logs to gain a more complete understanding of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Unusual Scheduled Task Update</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</guid><description>This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.</description><content:encoded><![CDATA[<p>This detection identifies first-time modifications to scheduled tasks by non-system users on Windows systems. Adversaries frequently abuse scheduled tasks to achieve persistence by modifying existing tasks or creating new ones that execute malicious code at recurring intervals. This rule focuses on detecting unauthorized changes to existing tasks by filtering out known system accounts (SYSTEM, Local Service, Network Service) and machine accounts, thereby highlighting potentially suspicious user activity. The rule leverages Windows Security Event Logs (event code 4702) to monitor task modifications. The goal is to aid in the early detection of threats where attackers are attempting to establish persistence on a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker enumerates existing scheduled tasks on the system using tools like <code>schtasks.exe</code> or PowerShell cmdlets.</li>
<li>The attacker identifies a suitable scheduled task to modify for persistence.</li>
<li>The attacker modifies the task&rsquo;s settings, such as the trigger time, the executable to run, or the arguments passed to the executable. This modification is logged as event ID 4702.</li>
<li>The scheduled task is updated using <code>schtasks.exe /change</code> or PowerShell&rsquo;s <code>Set-ScheduledTask</code> cmdlet.</li>
<li>The modified scheduled task executes at the specified time, launching the attacker&rsquo;s malicious payload.</li>
<li>The malicious payload establishes a reverse shell to the attacker&rsquo;s command and control (C2) server.</li>
<li>The attacker uses the reverse shell to perform further actions on the compromised system, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the modification of scheduled tasks can lead to persistent access to a compromised system. The attacker can use this access to steal sensitive data, install malware, or perform other malicious activities. While this rule is low severity, it can uncover attackers attempting to persist in a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the required Windows Security Event Logs (event ID 4702) as described in the setup instructions.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect unusual scheduled task updates.</li>
<li>Investigate any alerts generated by this rule to determine if the scheduled task modification is legitimate or malicious.</li>
<li>Review the references provided to understand the underlying event IDs and attacker techniques related to scheduled tasks.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Unusual Persistence via Services Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</guid><description>Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.</description><content:encoded><![CDATA[<p>This detection identifies processes that modify the Windows services registry key directly, bypassing the standard Windows APIs. This behavior can signify an adversary&rsquo;s attempt to establish persistence stealthily by creating new services or altering existing ones in an unexpected manner. The detection logic focuses on changes to the <code>ServiceDLL</code> and <code>ImagePath</code> values within specific registry paths associated with service configurations. This rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon Registry Events. The rule helps security analysts identify potentially malicious activity related to service manipulation, which can lead to persistent access and control over compromised systems. The rule excludes known legitimate processes and paths to minimize false positives, focusing on anomalous registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative access, allowing them to modify the registry.</li>
<li>The attacker directly modifies the <code>HKLM\SYSTEM\ControlSet*\Services\*\ServiceDLL</code> or <code>HKLM\SYSTEM\ControlSet*\Services\*\ImagePath</code> registry keys to point to a malicious DLL or executable.</li>
<li>The attacker&rsquo;s malicious DLL or executable is configured to run as a service, ensuring persistence across system reboots.</li>
<li>The compromised service starts automatically during system startup or manually when triggered by the attacker.</li>
<li>The malicious service executes arbitrary code, providing the attacker with persistent control over the system.</li>
<li>The attacker may use the compromised service to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the compromised system, maintaining access even after reboots or user logoffs. This can lead to long-term control over the system, enabling attackers to perform various malicious activities, including data theft, deployment of ransomware, or use of the system as a foothold for further attacks within the network. The severity is further amplified if critical services are targeted, potentially leading to system instability or denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture the necessary data for this detection (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect unusual service registry modifications (Sigma rules).</li>
<li>Tune the Sigma rules by adding exceptions for legitimate software installations or updates that modify service registry keys directly (Sigma rules).</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on processes modifying the <code>ServiceDLL</code> or <code>ImagePath</code> registry values (Sigma rules).</li>
<li>Review endpoint protection policies to ensure that similar unauthorized registry modifications are detected and blocked in the future (Response and remediation).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>registry modification</category></item><item><title>Suspicious Whoami Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</guid><description>This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.</description><content:encoded><![CDATA[<p>The <code>whoami</code> utility is commonly used by attackers post-compromise to gather information about the current user and their privileges on a compromised system. This information helps attackers assess their level of access and plan further actions within the environment, such as privilege escalation or lateral movement. This activity is most concerning when executed by SYSTEM accounts or from unusual parent processes. This detection identifies unusual or suspicious executions of <code>whoami.exe</code>, especially when associated with system privileges or specific parent processes known to be abused by attackers. The rule is designed to function across various Windows environments and considers potential false positives from legitimate administrative tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows system through an exploit or compromised credentials.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to elevate privileges to a higher level, potentially SYSTEM.</li>
<li>Discovery: The attacker executes <code>whoami.exe</code> to determine the current user and their privileges.</li>
<li>Information Gathering: The attacker analyzes the output of <code>whoami.exe</code> to understand the context of the compromised system.</li>
<li>Lateral Movement (Conditional): Based on the information gathered, the attacker may attempt to move laterally to other systems.</li>
<li>Further Exploitation: The attacker leverages the gathered information to further exploit the compromised system or network.</li>
<li>Persistence (Optional): The attacker may establish persistence to maintain access to the compromised system.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and reconnaissance can allow attackers to gain a deeper understanding of a compromised system. This may lead to further exploitation, lateral movement, and ultimately, the exfiltration of sensitive data or the disruption of critical services. While the <code>whoami</code> command itself is not inherently malicious, its suspicious usage often indicates malicious activity within a compromised environment. The severity is low because the execution of whoami by itself is not enough to confirm malicious activity, and further investigation is needed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>whoami.exe</code> executions (reference: logs-endpoint.events.process-*, logs-system.security*, logs-windows.forwarded*, logs-windows.sysmon_operational-*).</li>
<li>Deploy the Sigma rule &ldquo;Whoami Process Activity&rdquo; to your SIEM and tune for your environment (reference: rule).</li>
<li>Investigate parent processes of <code>whoami.exe</code> for any suspicious or unusual activity (reference: Attack Chain).</li>
<li>Monitor for other discovery commands executed around the same time as <code>whoami.exe</code> (reference: Related rules).</li>
<li>Review and tune the false positives outlined in the rule to minimize noise (reference: false_positives).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>threat-detection</category></item><item><title>Suspicious Use of sc.exe for Remote Service Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-cmd-service-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cmd-service-lateral-movement/</guid><description>The rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.</description><content:encoded><![CDATA[<p>This detection rule identifies the suspicious use of <code>sc.exe</code> (Service Control Manager) to create, modify, or start services on remote Windows hosts. While system administrators may legitimately use this tool, its use for lateral movement is a known technique used by attackers. This activity is often part of a larger attack campaign, where adversaries attempt to gain access to sensitive data or critical systems. The rule aims to detect unauthorized attempts to manipulate services on remote systems, differentiating between legitimate administrative tasks and malicious activities. The rule is designed for data generated by Elastic Defend, but also supports Sysmon data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>create</code> command to create a new service on a remote host, specifying a malicious executable as the <code>binPath</code>.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>config</code> command to modify an existing service on a remote host, changing its <code>binPath</code> to point to a malicious executable.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>failure</code> command to configure service failure options to execute a malicious command.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>start</code> command to start a service on a remote host, triggering the execution of the malicious executable.</li>
<li>The malicious executable executes on the remote host, providing the attacker with a foothold for further actions.</li>
<li>The attacker leverages the newly established foothold to move laterally to other systems within the network, potentially escalating privileges and accessing sensitive data.</li>
<li>The attacker establishes persistence through the created or modified service, allowing continued access even after system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to move laterally within a network, gain unauthorized access to sensitive data, and establish persistence on compromised systems. While the source material doesn&rsquo;t provide specific victim counts or sectors targeted, the impact of successful lateral movement can be significant, potentially leading to data breaches, system disruption, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Service Command Lateral Movement&rdquo; to your SIEM and tune for your environment based on observed false positives from administrative activity.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging to enhance visibility into <code>sc.exe</code> activity.</li>
<li>Review and whitelist legitimate administrative scripts or tools that use <code>sc.exe</code> by their process names or paths to reduce false positives, as described in the rule&rsquo;s documentation.</li>
<li>Implement network segmentation to limit the ability of adversaries to move laterally across the network, mitigating the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>windows</category><category>sc.exe</category></item><item><title>Suspicious SMTP Activity on Port 26/TCP</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</guid><description>This rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious SMTP activity occurring over TCP port 26. While standard SMTP traffic typically uses port 25, port 26 is sometimes used as an alternative to avoid conflicts or restrictions. The BadPatch malware family has been known to leverage port 26 for command and control (C2) communications with compromised Windows systems. This activity is considered suspicious because legitimate uses of SMTP on port 26 are less common and can indicate malicious activity, such as covert C2 channels used by malware like BadPatch. The rule analyzes network traffic to detect SMTP communication occurring on this non-standard port, helping to identify potential infections or unauthorized network activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial infection occurs via an unspecified method (e.g., phishing, exploit).</li>
<li>Malware establishes a foothold on the compromised system.</li>
<li>Malware configures itself to use SMTP on port 26 for C2 communications.</li>
<li>The infected host initiates a TCP connection to a remote server on port 26.</li>
<li>The malware sends commands to the infected host over the SMTP connection on port 26.</li>
<li>The infected host executes the received commands.</li>
<li>The malware may exfiltrate data to the remote server over the SMTP connection on port 26.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems may be remotely controlled by attackers, leading to data theft, malware propagation, or further malicious activities. The use of non-standard ports like 26 can help attackers evade detection. If successful, an attacker can maintain persistence and control over the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SMTP Traffic on TCP Port 26</code> to your SIEM and tune for your environment to detect potential command and control activity.</li>
<li>Investigate any network connections on TCP port 26 to identify potentially malicious SMTP traffic.</li>
<li>Review network traffic logs focusing on <code>network_traffic.flow</code> or <code>zeek.smtp</code> events to detect unusual patterns associated with TCP port 26.</li>
<li>Implement firewall rules to block unauthorized SMTP traffic on port 26.</li>
<li>Examine source and destination IP addresses of traffic on port 26, and correlate with threat intelligence sources to identify known malicious actors as per the references.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>command-and-control</category><category>exfiltration</category><category>network-traffic</category></item><item><title>Suspicious Image Load (taskschd.dll) from MS Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</guid><description>Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious image load (<code>taskschd.dll</code>) originating from Microsoft Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE). The behavior suggests potential adversarial activity involving the creation of scheduled tasks through the Windows Component Object Model (COM). Attackers may exploit this technique to establish persistence, circumventing traditional monitoring focused on the <code>schtasks.exe</code> utility. The use of COM for scheduled task management allows for stealthier operation and evasion of standard security controls, making it a valuable persistence mechanism for malicious actors. The rule is designed for data generated by Elastic Defend, Sysmon, and other endpoint detection platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User opens a malicious Microsoft Office document (e.g., Word, Excel).</li>
<li>The document executes embedded macro code or exploits a vulnerability.</li>
<li>The macro or exploit leverages the Component Object Model (COM).</li>
<li>The Office application (e.g., WINWORD.EXE) loads the <code>taskschd.dll</code> library, providing access to the Task Scheduler service.</li>
<li>The COM interface is used to programmatically create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a later time or on a recurring basis.</li>
<li>The malicious payload could be a script, executable, or command-line instruction.</li>
<li>Upon execution, the payload achieves the attacker&rsquo;s objective, such as establishing persistence, downloading additional malware, or compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging this technique can allow adversaries to maintain persistent access to a compromised system. This can lead to long-term data exfiltration, lateral movement within the network, and deployment of ransomware. The low severity score assigned to the original rule may underestimate the potential impact, as persistence is a critical component of many advanced attacks. Affected systems may require extensive remediation to remove all traces of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Office Application Loading Task Scheduler DLL&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging on Windows endpoints to provide visibility into DLL loading events, which is a prerequisite for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific scheduled tasks that are created and the payloads they execute.</li>
<li>Monitor for scheduled task creation events (Event ID 4698) and deletion events (Event ID 4699) in the Windows Event Logs, as referenced in the rule&rsquo;s investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>image_load</category><category>scheduled_task</category></item><item><title>Suspicious Execution via Windows Subsystem for Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-bash-exec/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-bash-exec/</guid><description>Adversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.</description><content:encoded><![CDATA[<p>The Windows Subsystem for Linux (WSL) enables users to run Linux binaries natively on Windows, creating an opportunity for adversaries to evade detection by executing malicious Linux commands without triggering traditional Windows security alerts. This technique involves leveraging WSL&rsquo;s bash shell to perform actions that might otherwise be flagged if executed directly within the Windows environment. This alert focuses on detecting suspicious behaviors indicative of malicious use of WSL, such as unauthorized access to sensitive files, use of network tools, or unusual command-line arguments. This can be used to facilitate lateral movement, data exfiltration, or other malicious activities. The Qualys blog post &ldquo;Implications of Windows Subsystem for Linux for Adversaries &amp; Defenders&rdquo; (2022-03-22) describes this attack vector in detail.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker enables WSL if it is not already enabled.</li>
<li>The attacker executes <code>wsl.exe</code> to start a Linux environment.</li>
<li>Inside the WSL environment, the attacker uses <code>bash</code> to execute malicious commands.</li>
<li>The attacker attempts to access sensitive files such as <code>/etc/shadow</code> or <code>/etc/passwd</code> to gather credentials.</li>
<li>The attacker uses network tools like <code>curl</code> to download or upload malicious payloads.</li>
<li>The attacker executes scripts to establish persistence within the WSL environment.</li>
<li>The attacker uses the compromised WSL environment to move laterally to other systems or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via WSL can lead to a variety of negative outcomes, including unauthorized access to sensitive information, credential compromise, and lateral movement within the network. While specific victim counts are unavailable, this technique can significantly increase the attack surface and reduce the effectiveness of traditional Windows-based security measures, affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture <code>wsl.exe</code> and <code>bash.exe</code> executions (reference: Sysmon Event ID 1 setup in rule setup section).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WSL Activity&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor process command lines for suspicious arguments used with <code>wsl.exe</code>, such as access to <code>/etc/shadow</code> or <code>/etc/passwd</code> (reference: Sigma rule selection criteria).</li>
<li>Investigate and whitelist legitimate uses of WSL within your environment to reduce false positives (reference: False positive analysis in the rule description).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>credential-access</category><category>windows</category></item><item><title>Startup or Run Key Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-run-key-registry-modification/</guid><description>Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.</description><content:encoded><![CDATA[<p>Attackers often modify registry run keys to achieve persistence on a system. By adding entries to these keys, they ensure that a malicious program executes automatically whenever a user logs in. This technique allows the attacker to maintain access to the compromised system even after reboots or other interruptions. The programs added to these run keys execute under the context of the user account, inheriting its permissions. This activity is often difficult to distinguish from legitimate software installations or updates, requiring careful analysis to identify malicious intent. Elastic has observed this activity and created a detection rule to identify this behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system.</li>
<li>The attacker identifies registry run key locations for persistence.</li>
<li>The attacker modifies a registry run key (e.g., <code>HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run</code>) using tools such as <code>reg.exe</code>.</li>
<li>The attacker adds a malicious executable path to the registry key.</li>
<li>The system is restarted, or a user logs in.</li>
<li>The malicious executable is launched automatically as part of the logon process.</li>
<li>The malicious executable establishes a connection to a command-and-control server.</li>
<li>The attacker gains remote access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, enabling them to perform unauthorized activities such as data theft, lateral movement, and deployment of ransomware. While each instance may not cause immediate critical damage, the cumulative effect of multiple persistent infections across an environment can lead to significant data breaches and operational disruption. The Elastic rule attempts to minimize false positives with built-in filters for common legitimate applications and processes like <code>ctfmon.exe</code>, but tuning is required.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect suspicious modifications to registry run keys and tune it to filter out legitimate application updates.</li>
<li>Enable registry event logging to capture modifications made to the registry, ensuring that the Sigma rule can function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, examining the parent process of the process modifying the registry for suspicious activity.</li>
<li>Block known malicious executables and domains identified during triage to prevent further infection.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend to gain enhanced visibility into endpoint activity and detect malicious behavior associated with persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>runkey</category></item><item><title>PsExec Lateral Movement via Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</guid><description>The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.</description><content:encoded><![CDATA[<p>This detection identifies the execution of PsExec, a dual-use tool commonly employed for both legitimate administration and malicious lateral movement. PsExec, part of the Sysinternals Suite, allows for remote command execution with elevated privileges, often abused by attackers to disable security controls and move laterally within a network. This rule specifically detects the creation of <code>PsExec.exe</code> followed by a network connection initiated by the process, which is a strong indicator of potential malicious activity. While PsExec has legitimate uses, its prevalence in attack scenarios necessitates careful monitoring. The rule is designed to work with data from Elastic Defend, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uploads or transfers the PsExec tool (<code>PsExec.exe</code>) to the compromised host, potentially using SMB shares or other file transfer methods.</li>
<li>The attacker executes PsExec with the <code>-accepteula</code> flag, which suppresses the license dialog, potentially indicating a first-time execution on the machine.</li>
<li>PsExec establishes a network connection to a remote target system, leveraging SMB/Windows Admin Shares (T1021.002) to facilitate remote command execution.</li>
<li>The attacker uses PsExec to execute commands on the remote system, potentially with SYSTEM privileges, to install malware, gather credentials, or perform reconnaissance.</li>
<li>The attacker leverages the newly compromised system as a pivot point to move laterally to other systems within the network, repeating the process.</li>
<li>The attacker escalates privileges on multiple systems.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread compromise across the network. Attackers can leverage PsExec to gain control over critical systems, disable security controls, and exfiltrate sensitive data. Lateral movement facilitated by PsExec can enable attackers to rapidly expand their footprint within an organization, impacting numerous systems and services. While the rule&rsquo;s severity is low due to the dual-use nature of PsExec, the potential impact of unchecked lateral movement is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PsExec Network Connection</code> to your SIEM and tune the <code>process.executable</code> and <code>process.parent.executable</code> filters for your environment to reduce false positives.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into PsExec activity.</li>
<li>Review and enforce the principle of least privilege to limit the accounts that can run PsExec and access sensitive systems.</li>
<li>Investigate any alerts generated by the <code>PsExec Network Connection</code> rule promptly to determine if the activity is legitimate or malicious.</li>
<li>Monitor network connections originating from systems where PsExec is executed using the <code>PsExec Outbound Network Connection</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>windows</category></item><item><title>Okta Policy Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-policy-change/</guid><description>An Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.</description><content:encoded><![CDATA[<p>This alert identifies modifications or deletions of Okta policies, which govern authentication, authorization, and access control within the Okta Identity Cloud platform. While legitimate administrators routinely update policies, unauthorized changes can weaken security postures and grant malicious actors elevated privileges or bypass security controls. The source event indicates a potential compromise or insider threat activity within the Okta environment. Because Okta serves as a critical identity provider for many organizations, any unauthorized change to its policies can have far-reaching consequences. Detecting policy changes is crucial for maintaining the integrity and security of the Okta environment and preventing potential breaches. The targeted scope includes all Okta-managed applications and resources protected by the modified or deleted policy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to an Okta administrator account, either through compromised credentials (e.g., phishing, credential stuffing) or insider access.</li>
<li><strong>Authentication:</strong> The attacker authenticates to the Okta admin console using the compromised or legitimate administrator account.</li>
<li><strong>Policy Enumeration:</strong> The attacker identifies target Okta policies to modify or delete using the Okta admin console or API.</li>
<li><strong>Policy Modification/Deletion:</strong> The attacker modifies or deletes the targeted Okta policy through the Okta admin console or API. This generates an <code>policy.lifecycle.update</code> or <code>policy.lifecycle.delete</code> event.</li>
<li><strong>Privilege Escalation (Potential):</strong> By modifying policies, the attacker may escalate privileges, granting themselves or other unauthorized users access to sensitive applications and resources.</li>
<li><strong>Lateral Movement (Potential):</strong> With escalated privileges, the attacker moves laterally within the Okta environment, accessing other applications and resources.</li>
<li><strong>Data Exfiltration/Damage (Potential):</strong> The attacker leverages the compromised Okta environment to exfiltrate sensitive data or cause damage to connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Okta policy modification or deletion can have significant consequences. Unauthorized policy changes can weaken security controls, allowing attackers to bypass authentication mechanisms, escalate privileges, and gain unauthorized access to sensitive applications and data. This could lead to data breaches, financial loss, and reputational damage. The impact depends on the scope of the affected policy and the applications it protects. The number of victims could range from a few individuals to the entire organization, depending on the scope of the compromised policy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Okta policy modifications or deletions (<code>policy.lifecycle.update</code>, <code>policy.lifecycle.delete</code> event types).</li>
<li>Investigate any detected policy changes to verify their legitimacy and identify the user responsible.</li>
<li>Review Okta administrator account activity for any signs of compromise or unauthorized access.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Regularly review and audit Okta policies to ensure they are configured securely and in accordance with security best practices.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>policy</category><category>attack.impact</category></item><item><title>Okta Group Application Assignment Spike Indicates Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-group-app-assignment-spike/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-group-app-assignment-spike/</guid><description>A machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.</description><content:encoded><![CDATA[<p>A machine learning job, <code>pad_okta_spike_in_group_application_assignment_changes_ea</code>, has detected an unusual spike in Okta group application assignment change events. This activity, monitored by the Privileged Access Detection integration, suggests potential malicious activity where threat actors may be assigning applications to groups to escalate access, maintain persistence, or facilitate lateral movement. This is particularly relevant for organizations using Okta for identity and access management, as attackers targeting this platform could gain significant control over user access and sensitive resources. The detection is based on identifying anomalies in Okta events and requires the Privileged Access Detection integration to be installed and configured properly, along with the Okta integration. This detection has been in production since February 2025, and updated in April 2026, requiring Elastic Stack version 9.4.0 or later to function correctly due to its reliance on Entity Analytics fields.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker compromises a user account with some level of administrative privileges within the Okta environment (T1078).</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages the compromised account to modify group application assignments, granting unauthorized access to sensitive applications (T1098).</li>
<li><strong>Group Modification:</strong> The attacker assigns applications to groups that the compromised user has access to modify. This allows the attacker to extend their reach within the organization.</li>
<li><strong>Application Assignment:</strong> The attacker assigns applications to a group, potentially giving all members of that group access to the applications without proper authorization.</li>
<li><strong>Lateral Movement:</strong> With access to new applications, the attacker uses the newly gained privileges to access other systems and resources within the network (T1078).</li>
<li><strong>Persistence:</strong> The attacker may create or modify additional group application assignments to ensure continued access, even if the initial compromised account is detected and remediated (T1098).</li>
<li><strong>Data Access/Exfiltration:</strong> The attacker leverages the escalated privileges to access and potentially exfiltrate sensitive data from the applications they now have access to.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to widespread unauthorized access to critical applications and data within the organization. The number of affected users and the extent of data breaches depend on the sensitivity of the applications accessed and the scope of the group membership changes. Consequences range from compliance violations and financial losses to reputational damage and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration is installed and properly configured in your Elastic Stack environment as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup guide</a>.</li>
<li>Investigate any alerts generated by the <code>pad_okta_spike_in_group_application_assignment_changes_ea</code> machine learning job, prioritizing those involving sensitive applications or high-privilege groups.</li>
<li>Review and update access controls and group assignment policies within Okta, as the advisory recommends to prevent similar unauthorized changes in the future.</li>
<li>Implement the following Sigma rule to detect suspicious Okta group application assignment changes and tune it for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>privilege-escalation</category><category>okta</category></item><item><title>LOLBIN Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</guid><description>Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may leverage LOLBINs, signed binaries that are part of the operating system, to perform malicious actions while blending in with legitimate system activity. This technique allows them to evade detection by application allowlists and signature validation. This brief focuses on the abuse of expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to initiate outbound network connections. The LOLBINs are used to execute malicious code, download additional payloads, or establish command and control channels. This activity can be indicative of malware installation, data exfiltration, or other malicious post-exploitation activities. Detection is crucial to identify potentially compromised systems and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a signed LOLBIN, such as <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, or <code>makecab.exe</code>.</li>
<li>The LOLBIN is used to download or execute a malicious payload from a remote server.</li>
<li>The executed binary establishes a network connection to an external IP address.</li>
<li>Data exfiltration may occur over the established network connection.</li>
<li>The attacker maintains persistence on the system by scheduling tasks or modifying registry keys.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLBINs can result in the installation of malware, data theft, or full system compromise. The use of signed binaries makes it more difficult to detect malicious activity, potentially allowing attackers to operate undetected for extended periods. The financial and reputational damage caused by such attacks can be significant. While the risk score is low, the potential for defense evasion justifies monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule <code>Network Connection via Signed Binary</code> to detect suspicious network connections initiated by LOLBINs.</li>
<li>Monitor process execution logs for instances of <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, and <code>makecab.exe</code> using process creation logging.</li>
<li>Review network connection logs for outbound connections initiated by these processes, excluding connections to internal networks based on the provided list of private IP ranges.</li>
<li>Investigate any detected instances of LOLBINs making external network connections, correlating with other suspicious activities on the affected host, as detailed in the &ldquo;Triage and analysis&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lolbin</category><category>defense-evasion</category><category>windows</category></item><item><title>Ingress Transfer via Windows BITS</title><link>https://feed.craftedsignal.io/briefs/2024-01-bits-ingress-transfer/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bits-ingress-transfer/</guid><description>Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.</description><content:encoded><![CDATA[<p>The Windows Background Intelligent Transfer Service (BITS) is a legitimate Windows service that allows for prioritized, asynchronous, and throttled transfer of files between a client and a server. Adversaries abuse BITS to download malicious payloads while evading typical security protections, as file transfers occur in the context of the <code>svchost.exe</code> process. This activity can obscure the origin of the download and bypass application whitelisting rules. This detection focuses on identifying file rename events where <code>svchost.exe</code> renames temporary BITS files (BIT*.tmp) to executable or archive file types, indicating a potential malicious download via BITS. This technique is commonly employed to deliver malware, exfiltrate data, or download additional tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a script or command-line interface (e.g., PowerShell) to create a BITS job.</li>
<li>The BITS job is configured to download a malicious executable or archive from a remote server using the <code>bitsadmin.exe</code> utility.</li>
<li>BITS downloads the file to a temporary location on the system with a <code>BIT*.tmp</code> extension.</li>
<li>The <code>svchost.exe</code> process renames the temporary file to its final name and extension (e.g., .exe, .zip).</li>
<li>The attacker executes the downloaded file, initiating further malicious activities.</li>
<li>The malware establishes persistence through registry keys or scheduled tasks.</li>
<li>The malware communicates with a command and control (C2) server to receive instructions and exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to download and execute arbitrary code on compromised systems. The use of BITS can bypass traditional security measures, leading to malware infections, data theft, and potentially full system compromise. This technique can be used in conjunction with other attack vectors to establish a persistent foothold within the network. While the rule itself triggers at low severity, the identified activity can be an early warning of more severe attack stages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Ingress Transfer via Windows BITS&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation and process creation logging to enhance visibility into BITS-related activities.</li>
<li>Monitor network connections initiated by <code>svchost.exe</code> to identify potentially malicious downloads.</li>
<li>Investigate any instances of <code>bitsadmin.exe</code> being executed, especially with command-line arguments indicative of suspicious downloads.</li>
<li>Review <code>Microsoft-Windows-Bits-Client/Operational</code> Windows logs (event ID 59) for unusual BITS events.</li>
<li>Block known malicious domains or IP addresses associated with BITS-related attacks at the firewall or DNS resolver.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>bits</category><category>ingress-transfer</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Execution from Removable Media with Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-removable-media-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-removable-media-execution/</guid><description>Detects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.</description><content:encoded><![CDATA[<p>This detection identifies potential initial access attempts where adversaries use removable media, such as USB drives, to introduce malware into systems, potentially those on disconnected or air-gapped networks. The attack relies on copying malware to the removable media and taking advantage of Autorun or user execution to initiate the malicious process. The rule focuses on identifying suspicious process executions from USB devices lacking valid code signatures, followed by network connection attempts, indicating a potential attempt to establish command and control or exfiltrate data. This activity is significant as it can bypass traditional network security measures and establish a foothold within an organization&rsquo;s environment. The detection logic is based on Elastic Defend telemetry.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker copies malware onto a USB drive from an infected system.</li>
<li>The attacker physically inserts the USB drive into a target Windows system.</li>
<li>The user, either unknowingly or through social engineering, executes the malicious binary from the USB drive. This could be achieved through Autorun features (if enabled) or by manually clicking on an executable file.</li>
<li>The executed process, now running on the target system, lacks a valid code signature, raising suspicion.</li>
<li>The malicious process attempts to establish a network connection, potentially to a command and control server or to exfiltrate data.</li>
<li>The network connection attempt is logged, capturing details about the destination IP address and port.</li>
<li>The attacker gains initial access to the system and can potentially perform reconnaissance, privilege escalation, or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, system compromise, and potential lateral movement within the network. Although the risk score is low, such attacks on air-gapped systems are high impact. The number of victims is unknown; however, organizations across all sectors are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation and network connection logging to detect this type of activity (logs-endpoint.events.process-* and logs-endpoint.events.network-*).</li>
<li>Deploy the Sigma rule &ldquo;Execution from a Removable Media with Network Connection&rdquo; to your SIEM and tune for your environment.</li>
<li>Disable Autorun features on all systems to prevent automatic execution of programs from removable media.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>removable-media</category><category>windows</category></item><item><title>DNS-over-HTTPS Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dns-over-https-enabled/</guid><description>Detection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.</description><content:encoded><![CDATA[<p>The use of DNS-over-HTTPS (DoH) can obscure network activity, potentially allowing malicious actors to bypass traditional DNS monitoring and conceal data exfiltration. When DoH is enabled, visibility into DNS query types, responses, and originating IPs is lost, hindering the detection of malicious activity. This behavior is detected by monitoring registry modifications associated with enabling DoH in popular browsers such as Microsoft Edge, Google Chrome, and Mozilla Firefox. The registry keys targeted are associated with settings that force the browsers to use secure DNS resolution, potentially circumventing organizational security policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system through various means, such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation (if necessary):</strong> The attacker may need to escalate privileges to modify registry settings.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the Windows registry to enable DNS-over-HTTPS (DoH) in web browsers like Edge, Chrome, or Firefox. This is achieved by modifying specific registry keys such as <code>HKLM\SOFTWARE\Policies\Microsoft\Edge\BuiltInDnsClientEnabled</code>, <code>HKLM\SOFTWARE\Google\Chrome\DnsOverHttpsMode</code>, or <code>HKLM\SOFTWARE\Policies\Mozilla\Firefox\DNSOverHTTPS</code>.</li>
<li><strong>Obfuscation:</strong> By enabling DoH, the attacker encrypts DNS queries, making it difficult for network monitoring tools to inspect DNS traffic.</li>
<li><strong>Command and Control:</strong> The attacker establishes command and control (C2) communication with a remote server over encrypted DNS traffic, evading traditional network-based detection methods.</li>
<li><strong>Data Exfiltration:</strong> The attacker uses the encrypted DNS channel to exfiltrate sensitive data, bypassing network security controls that rely on DNS inspection.</li>
<li><strong>Persistence (Optional):</strong> The attacker might establish persistence by ensuring the DoH settings remain enabled across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to a loss of visibility into DNS traffic, hindering incident response and threat hunting efforts. Attackers can effectively hide command-and-control communications and data exfiltration activities. Although this activity by itself isn&rsquo;t inherently malicious, it removes a layer of defense, increasing the risk that malicious activities will go undetected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect the enabling of DNS-over-HTTPS via registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the provided Sigma rules to function effectively.</li>
<li>Review and update security policies to ensure DNS-over-HTTPS is only enabled through approved channels and for legitimate purposes, reducing the risk of misuse, and create exceptions in the detection rule for systems where this is a known requirement.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the user account, process, and associated network activity (reference the investigation guide in the source URL).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>dns-over-https</category><category>registry-modification</category></item><item><title>Component Object Model (COM) Hijacking via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-com-hijacking/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-com-hijacking/</guid><description>Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.</description><content:encoded><![CDATA[<p>Component Object Model (COM) hijacking is a persistence and privilege escalation technique used by adversaries to execute malicious code by hijacking references to COM objects. This involves modifying specific registry keys to redirect COM object instantiation to attacker-controlled DLLs or executables. The technique is difficult to detect due to the legitimate use of COM objects by various applications and the operating system itself. This brief focuses on identifying suspicious registry modifications indicative of COM hijacking, while excluding known legitimate processes to minimize false positives. The original Elastic detection rule was published in November 2020 and last updated in May 2026, showcasing its continued relevance. This activity matters to defenders because successful COM hijacking allows attackers to execute arbitrary code with the privileges of the user or service that instantiates the hijacked COM object.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a target COM object to hijack by enumerating COM object entries in the registry.</li>
<li>The attacker modifies the <code>InprocServer32</code> or <code>LocalServer32</code> registry keys associated with the target COM object to point to a malicious DLL or executable.</li>
<li>The attacker may also modify the <code>DelegateExecute</code> registry key to control how the COM object is executed.</li>
<li>A legitimate application or service attempts to instantiate the original COM object.</li>
<li>Due to the registry modifications, the malicious DLL or executable is loaded and executed instead.</li>
<li>The malicious code performs its intended actions, such as establishing persistence, escalating privileges, or executing arbitrary commands.</li>
<li>The attacker maintains persistent access to the system and potentially gains elevated privileges through the hijacked COM object.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful COM hijacking enables attackers to establish persistent access to compromised systems and potentially escalate privileges. The impact can range from executing arbitrary code with user privileges to gaining system-level access, depending on the context in which the hijacked COM object is used. The Elastic detection rule aims to identify and prevent such attacks by detecting suspicious registry modifications, but the overall number of affected systems or specific sectors targeted by this technique are not specified in the original source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture registry modification events and activate the Sigma rule <code>Suspicious COM Hijack Registry Modification</code> to detect potential COM hijacking attempts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying COM-related registry keys and their associated executables.</li>
<li>Implement code signing validation and monitor for unsigned or unexpected DLLs being loaded by legitimate processes, as indicated in the rule&rsquo;s description.</li>
<li>Regularly review and update the list of excluded processes and trusted code signers in the Sigma rule to minimize false positives.</li>
<li>Deploy the EQL rule provided by Elastic, adjusting the <code>from</code> and <code>index</code> fields to match your environment, and tune the process and signature exclusions for your environment.</li>
<li>Monitor for registry changes in <code>HKEY_USERS</code> hive related to COM objects, as these are considered less common and potentially malicious.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>com-hijacking</category><category>windows</category><category>registry</category><category>defense-evasion</category><category>privilege-escalation</category></item><item><title>Active Directory Discovery via ADExplorer Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</guid><description>Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.</description><content:encoded><![CDATA[<p>ADExplorer is an advanced Active Directory (AD) viewer and editor, it includes the ability to save snapshots of an AD database for offline viewing and comparisons. Adversaries may abuse this utility to perform domain reconnaissance, gather sensitive information about the AD structure, user accounts, and group memberships. The execution of ADExplorer is a potential indicator of malicious activity, especially when observed in environments where its use is not typical or when executed by unauthorized users. This activity can lead to further exploitation, such as privilege escalation and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker downloads the ADExplorer utility (ADExplorer.exe) to the compromised host.</li>
<li>The attacker executes ADExplorer.exe to begin enumeration of the Active Directory environment.</li>
<li>ADExplorer interacts with the Active Directory domain controllers, querying information about users, groups, computers, and organizational units.</li>
<li>The attacker may use ADExplorer to save snapshots of the AD database for offline analysis.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts, critical assets, and potential vulnerabilities within the AD environment.</li>
<li>The attacker uses the discovered information to plan further attacks, such as lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of ADExplorer by malicious actors can lead to the discovery of sensitive information about the Active Directory environment. This information can be leveraged to facilitate lateral movement, privilege escalation, and data exfiltration. While the initial risk score is low, the reconnaissance activity enables follow-on attacks that can have severe consequences, potentially leading to full domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Process Name</code> to detect the execution of ADExplorer based on process name.</li>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Original File Name</code> to detect the execution of ADExplorer based on the process&rsquo;s original file name.</li>
<li>Monitor process creation events on Windows endpoints for the execution of ADExplorer.exe or processes with an original file name of &ldquo;AdExp&rdquo; to detect potential reconnaissance activities.</li>
<li>Investigate and validate any execution of ADExplorer by non-administrator accounts.</li>
<li>Review ADExplorer use and restrict its usage to authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active-directory</category><category>discovery</category><category>reconnaissance</category><category>windows</category></item><item><title>Unusual Process Spawned by a User Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</guid><description>A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.</description><content:encoded><![CDATA[<p>A machine learning (ML) rule has identified unusual process execution on a Windows endpoint. This detection leverages two ML models from the Elastic ProblemChild integration: a supervised model that predicts malicious processes and an unsupervised model that identifies processes anomalous to the user&rsquo;s typical behavior. The rule focuses on detecting defense evasion tactics, specifically the potential use of Living-off-the-Land Binaries (LOLbins) or masquerading techniques, which can be difficult to detect with traditional signature-based methods. This detection uses data from the Elastic Endpoint or Winlogbeat and requires the Living off the Land (LotL) Attack Detection integration assets to be installed. This rule was last updated April 1, 2026 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through an existing user account.</li>
<li>Execution: The attacker executes a standard Windows process (e.g., cmd.exe, powershell.exe).</li>
<li>Defense Evasion: The attacker leverages LOLbins to perform malicious actions, blending in with legitimate system activity.</li>
<li>Masquerading: The attacker renames or moves malicious tools to mimic legitimate system files.</li>
<li>Privilege Escalation (Optional): The attacker attempts to escalate privileges using the compromised process.</li>
<li>Lateral Movement (Optional): The attacker uses the compromised process to move laterally to other systems.</li>
<li>Command and Control (Optional): The process establishes a connection to a command and control server for further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, system compromise, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using these techniques can lead to a full system compromise, data theft, or the installation of persistent backdoors. The use of LOLbins makes detection difficult, potentially allowing attackers to operate undetected for extended periods. The impact is amplified by the potential for lateral movement to other systems within the network. While the severity is rated &ldquo;low&rdquo;, successful exploitation allows attackers to move laterally and establish persistence in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as detailed in the rule setup (Elastic Defend or Winlogbeat).</li>
<li>Investigate alerts generated by the &ldquo;Unusual Process Spawned by a User&rdquo; rule (rule_id: 40155ee4-1e6a-4e4d-a63b-e8ba16980cfb) to determine the legitimacy of the flagged process.</li>
<li>Tune the anomaly threshold (anomaly_threshold: 75) based on your environment to reduce false positives, as mentioned in the rule parameters.</li>
<li>Review the &ldquo;False positive analysis&rdquo; section in the rule&rsquo;s note for guidance on identifying and excluding legitimate processes.</li>
<li>Implement the provided Sigma rule to detect unusual command line arguments associated with LOLBins.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>endpoint</category><category>windows</category><category>defense evasion</category><category>machine learning</category><category>lolbins</category></item><item><title>ProblemChild ML Model Detects Unusual Process on Windows Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</guid><description>The ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.</description><content:encoded><![CDATA[<p>This detection leverages the ProblemChild supervised machine learning model to identify unusual Windows processes that may be indicative of defense evasion tactics. The model flags processes that are both statistically unusual for a given host and predicted to be suspicious based on their characteristics. This approach aims to detect Living off the Land (LotL) attacks, where adversaries use legitimate system binaries (LOLbins) to evade traditional signature-based detection methods. The rule specifically targets processes observed on hosts that do not commonly exhibit malicious behavior. The alert requires the Elastic&rsquo;s Living off the Land (LotL) Attack Detection integration assets to be installed, processing Windows process events collected by Elastic Defend or Winlogbeat. This detection rule was last updated on 2026-04-01 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to a Windows system.</li>
<li>The attacker leverages a LOLbin (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>, <code>mshta.exe</code>) to execute malicious commands.</li>
<li>The LOLbin spawns a child process to perform a specific task, such as downloading a file or modifying system settings.</li>
<li>The spawned process exhibits characteristics flagged as suspicious by the ProblemChild ML model.</li>
<li>The suspicious process attempts to evade detection by masquerading as a legitimate system process or by obfuscating its activity.</li>
<li>The attacker uses the process to establish persistence, escalate privileges, or move laterally within the network.</li>
<li>The ultimate objective is to exfiltrate sensitive data, deploy ransomware, or disrupt business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful defense evasion attack can allow adversaries to operate undetected within a network, leading to data breaches, financial losses, and reputational damage. The use of LOLbins makes it difficult to distinguish malicious activity from legitimate system operations. This detection rule aims to reduce the dwell time of attackers by identifying suspicious processes early in the attack chain, even if they are using legitimate tools. False positives may occur due to routine administrative tasks, software updates, or custom scripts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as described in the &ldquo;Setup&rdquo; section of this brief.</li>
<li>Verify that Windows process events are being collected by Elastic Defend or Winlogbeat, as required by the detection rule.</li>
<li>Deploy the following Sigma rule to detect unusual process spawns and tune the <code>Image|endswith</code> and <code>CommandLine|contains</code> conditions for your specific environment.</li>
<li>Review the investigation guide provided in the rule description to triage and analyze potential false positives.</li>
<li>Adjust the <code>anomaly_threshold</code> (currently 75) in the Elastic detection rule based on your environment&rsquo;s baseline to reduce noise.</li>
<li>Monitor for MITRE ATT&amp;CK Technique T1218 (System Binary Proxy Execution) to identify potential LOLbin abuse.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category><category>machine-learning</category></item><item><title>Adding Hidden File Attribute via Attrib.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</guid><description>Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.</description><content:encoded><![CDATA[<p>Attackers can add the &lsquo;hidden&rsquo; attribute to files to hide them from the user in an attempt to evade detection. This technique involves using the <code>attrib.exe</code> utility to modify file attributes. By setting the hidden attribute, adversaries can conceal tooling and malware to prevent administrators and users from finding it, even if they are looking specifically for it. This tactic is often employed post-compromise to maintain a stealthy presence within the target environment. Detection focuses on monitoring process executions that involve <code>attrib.exe</code> with command-line arguments indicating the modification of the hidden attribute. The rule is designed for data generated by Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as exploiting a vulnerability or using stolen credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain the necessary permissions to execute system utilities.</li>
<li>Defense Evasion: The attacker uses <code>attrib.exe</code> to modify the hidden attribute of a malicious file or directory. For example, <code>attrib.exe +h C:\path\to\malicious\file.exe</code>.</li>
<li>Concealment: The malicious file or directory is now hidden from normal directory listings, making it harder for users and administrators to detect.</li>
<li>Persistence: The attacker establishes persistence by hiding malicious scripts or executables in startup directories or scheduled tasks.</li>
<li>Lateral Movement: The attacker uses the hidden files to move laterally within the network, potentially using them as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this attack includes prolonged attacker presence, increased difficulty in detecting malicious activity, and potential data exfiltration or system compromise. While the risk score is relatively low, the technique contributes to a broader attack chain and can significantly hinder incident response efforts. A successful hiding of artifacts might lead to further compromise, data breaches, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Adding Hidden File Attribute via Attrib&rdquo; to your SIEM to detect suspicious usage of <code>attrib.exe</code>.</li>
<li>Enable process creation logging with command line monitoring in Windows environments to ensure the Sigma rule can capture relevant events.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and target files to determine if the activity is legitimate.</li>
<li>Correlate detections of <code>attrib.exe</code> with other suspicious activities or alerts on the same host.</li>
<li>Implement file integrity monitoring to detect unauthorized changes to file attributes, including the hidden attribute.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>attrib.exe</category></item><item><title>Unusual Source IP for Windows Privileged Operations Detected via ML</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-source-ip-privileged-ops/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-source-ip-privileged-ops/</guid><description>A machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.</description><content:encoded><![CDATA[<p>This alert leverages Elastic&rsquo;s machine learning capabilities to identify anomalous network activity related to privileged operations in Windows. Specifically, it flags instances where a user performs privileged actions from a source IP address that is not typically associated with their account. The detection rule, <code>Unusual Source IP for Windows Privileged Operations Detected</code>, is triggered by the <code>pad_windows_rare_source_ip_by_user_ea</code> machine learning job. The underlying machine learning model analyzes network patterns and user behavior to detect deviations from established baselines. Such deviations can indicate account compromise, insider threat activity, or attackers leveraging new network locations for privilege escalation within a Windows environment. This detection is enabled through the Privileged Access Detection integration assets within Elastic Security, supporting deployments of Elastic Defend and the Windows integration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (TA0001):</strong> An attacker gains initial access to a user account through credential compromise or other means.</li>
<li><strong>Privilege Escalation (TA0004):</strong> The attacker attempts to escalate privileges using the compromised account.</li>
<li><strong>Unusual Network Location:</strong> The attacker leverages a VPN, proxy, or compromised host in a different network segment to conduct privileged operations.</li>
<li><strong>Windows Privileged Operation:</strong> The attacker performs a privileged action on a Windows system, such as modifying system files, creating new accounts, or accessing sensitive data.</li>
<li><strong>ML Anomaly Detection:</strong> Elastic&rsquo;s machine learning job <code>pad_windows_rare_source_ip_by_user_ea</code> detects the unusual source IP for the privileged operation.</li>
<li><strong>Alert Triggered:</strong> The &ldquo;Unusual Source IP for Windows Privileged Operations Detected&rdquo; rule triggers an alert in Elastic Security.</li>
<li><strong>Potential Lateral Movement:</strong> If successful, the attacker can use the elevated privileges to move laterally within the network and compromise other systems.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker achieves their final objective, such as data exfiltration, system disruption, or ransomware deployment, leveraging the escalated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and privilege escalation can allow an attacker to move laterally through the network, access sensitive data, and disrupt critical systems. While the alert itself is low severity, the underlying activity can lead to significant damage if not addressed promptly. The risk score associated with the rule is 21, indicating a moderate level of risk. Affected organizations may experience data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and tune the machine learning job <code>pad_windows_rare_source_ip_by_user_ea</code> to reduce false positives and ensure accurate detection of anomalous activity.</li>
<li>Investigate any alerts triggered by the &ldquo;Unusual Source IP for Windows Privileged Operations Detected&rdquo; rule, focusing on identifying the root cause of the unusual source IP and the nature of the privileged operations performed.</li>
<li>Implement the setup steps outlined in the rule documentation to ensure proper collection and ingestion of Windows events required for the machine learning job to function correctly.</li>
<li>Correlate the alerts with other security events or logs, such as firewall logs, VPN logs, or endpoint security alerts, to gather additional context about the source IP and user activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>machine-learning</category><category>windows</category></item><item><title>Unusual Privilege Type Assigned to User via Machine Learning Anomaly</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-privilege-type/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-privilege-type/</guid><description>A machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.</description><content:encoded><![CDATA[<p>This detection leverages a machine learning job within the Elastic stack to identify anomalous privilege usage on Windows systems. Specifically, it flags instances where a user is observed utilizing a privilege type that deviates significantly from their established baseline behavior. The underlying machine learning model, <code>pad_windows_rare_privilege_assigned_to_user_ea</code>, analyzes Windows event logs collected via integrations like Elastic Defend and the Windows integration. This detection aims to identify potential privilege escalation attempts (T1068) or account manipulation (T1098), where adversaries attempt to gain unauthorized access or elevate their privileges by exploiting uncommon privilege assignments. The detection rule has been available since Elastic Stack version 9.4.0. It is crucial to investigate these anomalies as they might indicate malicious actors attempting to bypass standard security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (T1078) using valid credentials, possibly through compromised accounts or insider threats.</li>
<li>The attacker attempts to perform privileged operations, such as accessing sensitive files, modifying system configurations, or installing unauthorized software.</li>
<li>To bypass access controls, the attacker leverages a privilege type that is not commonly associated with the compromised user account.</li>
<li>Windows event logs record the privilege usage, capturing details about the user, the privilege type, and the associated operation.</li>
<li>The Elastic Privileged Access Detection (PAD) integration ingests and processes these logs, feeding them into the machine learning model.</li>
<li>The machine learning model identifies the anomalous privilege usage, comparing it against the user&rsquo;s baseline behavior.</li>
<li>If the anomaly score exceeds the configured threshold (e.g., 75), a detection alert is triggered, indicating potential malicious activity.</li>
<li>Security analysts investigate the alert to determine the legitimacy of the privilege usage and take appropriate remediation actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over the compromised system, allowing them to steal sensitive data, install malware, or disrupt critical services. Account manipulation can lead to unauthorized access to resources and systems, potentially impacting confidentiality, integrity, and availability. While the provided rule is low severity due to the anomaly-based nature, the potential impact of successful privilege escalation is critical and warrants immediate investigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration assets are installed and configured correctly within your Elastic environment as outlined in the &ldquo;Setup&rdquo; section of the rule description.</li>
<li>Verify Windows event logs are being collected by integrations such as Elastic Defend and the Windows integration to provide data for the ML job.</li>
<li>Tune the <code>anomaly_threshold</code> within the machine learning job configuration based on your environment&rsquo;s baseline activity to reduce false positives while maintaining detection sensitivity.</li>
<li>Review the investigation guide provided in the rule description to effectively triage and analyze alerts generated by the machine learning job.</li>
<li>Implement and enforce role-based access controls to minimize the number of users with elevated privileges, reducing the attack surface.</li>
<li>Utilize the MITRE ATT&amp;CK framework references (T1068, T1078, T1098) to understand the potential tactics and techniques associated with privilege escalation and account manipulation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>privilege-escalation</category><category>windows</category></item><item><title>Unusual Host Name for Windows Privileged Operations Detected via ML</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-unusual-windows-privileged-access/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-unusual-windows-privileged-access/</guid><description>A machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.</description><content:encoded><![CDATA[<p>This threat brief describes the detection of unusual privileged access activity in Windows environments. The detection leverages a machine learning model (&ldquo;pad_windows_rare_device_by_user_ea&rdquo;) designed to identify deviations from typical host usage patterns. Specifically, it flags instances where a user performs privileged operations from a device not commonly associated with that user. This activity can indicate a compromised account where an attacker is using stolen credentials or an insider threat attempting to escalate privileges from an unauthorized device. The detection is part of the Elastic Privileged Access Detection (PAD) integration and focuses on Windows events collected by Elastic Defend and Windows integrations. The PAD integration requires Fleet and properly configured agents. The anomaly_threshold is set to 75.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a valid user account, potentially through phishing, credential stuffing, or other means.</li>
<li>The attacker logs into a Windows system using the compromised account from a device that is not typically used by that user.</li>
<li>The attacker attempts to execute privileged operations on the system, such as installing software, modifying system settings, or accessing sensitive data.</li>
<li>Windows logs capture the privileged operations being performed by the user account from the unusual device.</li>
<li>The Elastic Privileged Access Detection (PAD) integration analyzes the logs using its machine learning model (&ldquo;pad_windows_rare_device_by_user_ea&rdquo;).</li>
<li>The ML model identifies the activity as anomalous based on the rarity of the device being used by the user for privileged operations.</li>
<li>A detection rule triggers, flagging the unusual activity as a potential privileged access attempt.</li>
<li>The security team investigates to determine whether the activity is malicious or a legitimate use case (e.g., user working from a new device).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to privilege escalation, allowing the attacker to gain control of the system and potentially the entire network. This can result in data breaches, system compromise, and disruption of services. The severity is rated as low because the detection relies on anomalies and requires further investigation to confirm malicious intent. Identifying unusual access patterns early can prevent more severe incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration is installed and properly configured, including the preconfigured anomaly detection jobs, as outlined in the <a href="#setup">setup instructions</a>.</li>
<li>Investigate alerts generated by the &ldquo;Unusual Host Name for Windows Privileged Operations Detected&rdquo; rule, focusing on the specific user and host involved, per the <a href="#triage-and-analysis">investigation guide</a>.</li>
<li>Implement multi-factor authentication (MFA) for privileged accounts to mitigate the risk of unauthorized access even if credentials are compromised, as mentioned in the <a href="#response-and-remediation">response and remediation</a> section.</li>
<li>Review and update access controls and permissions to ensure that only authorized devices and users can perform privileged operations.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>anomaly-detection</category><category>windows</category></item><item><title>Windows Delayed Execution via Ping Followed by Malicious Utilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-delayed-execution-via-ping/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-delayed-execution-via-ping/</guid><description>Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.</description><content:encoded><![CDATA[<p>Attackers may use ping to introduce pauses, allowing them to execute harmful scripts or binaries stealthily. This delayed execution is often observed during malware installation and is consistent with an attacker attempting to evade detection. The adversary uses <code>ping.exe</code> with the <code>-n</code> argument from within a <code>cmd.exe</code> shell, and the parent process is running under a user context other than SYSTEM. The subsequent process is <code>cmd.exe</code> invoking a known malicious utility, such as <code>powershell.exe</code>, <code>mshta.exe</code>, <code>rundll32.exe</code>, or an executable from the user&rsquo;s AppData directory without a valid code signature. This behavior is often observed during malware installation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an initial access vector (not specified in source).</li>
<li>The adversary executes <code>cmd.exe</code>.</li>
<li><code>cmd.exe</code> spawns <code>ping.exe</code> with the <code>-n</code> argument to introduce a delay, typically to evade detection (<code>ping.exe -n [number] 127.0.0.1</code>).</li>
<li>After the delay introduced by <code>ping.exe</code>, the same <code>cmd.exe</code> process executes a potentially malicious utility such as <code>powershell.exe</code>, <code>mshta.exe</code>, <code>rundll32.exe</code>, <code>certutil.exe</code>, or <code>regsvr32.exe</code>.</li>
<li>Alternatively, <code>cmd.exe</code> might execute a binary located within the user&rsquo;s AppData directory that lacks a valid code signature.</li>
<li>The malicious utility executes arbitrary commands or scripts, potentially downloading further payloads or modifying system configurations.</li>
<li>The attacker gains a foothold on the system, enabling further malicious activities such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to malware installation, system compromise, and data theft. While the source does not quantify the number of victims or specific sectors targeted, a successful compromise can lead to significant operational disruption and data breaches. The use of delayed execution makes it more difficult for traditional security solutions to detect malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Delayed Execution via Ping&rdquo; to your SIEM to detect the execution of commonly abused Windows utilities via a delayed Ping execution.</li>
<li>Enable process monitoring with command-line argument logging to capture the execution of <code>ping.exe</code> and subsequent processes for analysis.</li>
<li>Implement application whitelisting to prevent unauthorized execution of scripts and binaries, focusing on the utilities identified in the rule.</li>
<li>Review and tune the provided Sigma rule, including the listed exclusions, to reduce false positives in your specific environment.</li>
<li>Monitor process execution from unusual locations like the AppData directory, especially for unsigned executables, as indicated in the rule&rsquo;s detection logic.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>windows</category><category>ping</category><category>lolbas</category></item><item><title>First Time Seen Removable Device Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</guid><description>Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.</description><content:encoded><![CDATA[<p>This detection identifies the first-time appearance of removable devices on a Windows system by monitoring registry modifications. While not inherently malicious, the activity can indicate potential data exfiltration over removable media or initial access attempts using malware delivered via USB. The rule specifically looks for registry events with the &ldquo;FriendlyName&rdquo; value associated with USB storage devices (&ldquo;USBSTOR&rdquo;). This helps in identifying potentially unauthorized devices connected to the system. The detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user connects a removable device (e.g., USB drive) to a Windows system.</li>
<li>The operating system detects the new device and attempts to enumerate its properties.</li>
<li>The system queries the registry for device-specific settings, including the &ldquo;FriendlyName,&rdquo; under the <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR</code> key.</li>
<li>If the device is new to the system, the registry is modified to record the device&rsquo;s information, including its friendly name.</li>
<li>The event generates a registry modification event, which is logged by Sysmon, Elastic Defend, Microsoft Defender XDR, or SentinelOne.</li>
<li>An attacker may use the USB device to deploy malware or exfiltrate sensitive data.</li>
<li>The attacker copies files to the USB device.</li>
<li>The attacker removes the USB device, completing the exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and data exfiltration via USB can lead to the loss of sensitive information, intellectual property theft, or the introduction of malware into the network. Although this alert is low severity, multiple alerts across the environment may indicate an active campaign. The detection focuses on registry modifications, which are early indicators of device connection, allowing for proactive monitoring and response.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect registry modifications related to USB devices and activate the Sigma rules below.</li>
<li>Deploy the Sigma rules provided to your SIEM to detect and monitor first-time seen USB devices.</li>
<li>Investigate any alerts generated by the Sigma rules, correlating with user activity and file access events.</li>
<li>Maintain a list of approved USB devices and create exceptions for them in the monitoring system to reduce false positives as described in the rule documentation.</li>
<li>Monitor for subsequent file access or transfer events involving the new device as described in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>windows</category><category>registry</category><category>usb</category></item><item><title>Windows Scheduled Task Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</guid><description>Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.</description><content:encoded><![CDATA[<p>Adversaries frequently leverage scheduled tasks in Windows to maintain persistence, elevate privileges, or facilitate lateral movement within a compromised network. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. The detection rule focuses on identifying the creation of new scheduled tasks logged in Windows event logs, filtering out tasks created by system accounts and those associated with legitimate software to minimize false positives. This detection is crucial because successful exploitation allows attackers to execute arbitrary commands or programs on a recurring basis, maintaining a foothold even after system reboots or user logoffs. Defenders need to monitor for anomalous task creation events to identify potential malicious activity. The rule references Microsoft Event ID 4698 as a key data source for detecting scheduled task creation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li><strong>Privilege Escalation (if needed):</strong> The attacker escalates privileges using exploits or by abusing misconfigurations to gain the necessary permissions to create scheduled tasks.</li>
<li><strong>Task Creation:</strong> The attacker creates a new scheduled task using tools like <code>schtasks.exe</code> or PowerShell.</li>
<li><strong>Configuration:</strong> The attacker configures the task to execute a malicious script or program at a specific time or event trigger.</li>
<li><strong>Persistence:</strong> The scheduled task is configured to run at regular intervals or upon system startup, ensuring persistent access to the compromised system.</li>
<li><strong>Execution:</strong> When the scheduled task triggers, the malicious payload executes, performing actions such as installing malware, stealing data, or establishing a command and control connection.</li>
<li><strong>Lateral Movement (optional):</strong> The attacker uses the compromised system and scheduled task to move laterally to other systems on the network, repeating the task creation process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via scheduled task creation can lead to persistent access within the compromised environment. The attacker can maintain a foothold even after system restarts, enabling them to perform data exfiltration, deploy ransomware, or cause other disruptive activities. While the risk score is relatively low, the potential for persistence makes this a critical area to monitor, especially in environments where lateral movement is a significant concern. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the necessary Windows Security Event Logs for detecting scheduled task creation (reference: setup instructions in the original rule).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious scheduled task creation events, and tune the rules by adding exclusions for known benign tasks in your environment.</li>
<li>Review the investigation steps outlined in the rule&rsquo;s notes to triage alerts related to scheduled task creation, focusing on unfamiliar task names, unusual user accounts, and suspicious scheduled actions.</li>
<li>Use the <code>references</code> URL to understand the specific details of Windows Event ID 4698, which is generated when a scheduled task is created.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Windows Peripheral Device Discovery via fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</guid><description>Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.</description><content:encoded><![CDATA[<p>Attackers may leverage native operating system tools like <code>fsutil.exe</code> to perform reconnaissance activities within a compromised environment. The <code>fsutil fsinfo drives</code> command provides information about connected drives, including removable media, mapped network drives, and backup locations. Discovery of these devices can help adversaries identify valuable data stores for exfiltration or encryption as part of a broader attack campaign. This command can be run interactively or via automated scripts, making it a versatile tool for post-exploitation activities. Defenders should monitor for unusual execution of <code>fsutil</code> with the <code>fsinfo drives</code> arguments, particularly when executed by non-administrative users or from unusual locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes <code>fsutil.exe</code> via command line or script.</li>
<li>The <code>fsutil</code> command uses the <code>fsinfo</code> subcommand.</li>
<li>The <code>fsinfo</code> subcommand uses the <code>drives</code> argument to list connected drives.</li>
<li>The system returns a list of attached drives and their types (e.g., local, network, removable).</li>
<li>The attacker analyzes the output to identify potentially valuable targets.</li>
<li>The attacker moves laterally to access identified drives.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware on the identified drives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful discovery of peripheral devices can lead to the identification of backup locations, mapped network drives, and removable media containing sensitive information. This information enables attackers to expand their reach within the compromised environment and increase the potential for data theft, encryption, or destruction. The low severity reflects the fact that this activity on its own is simply reconnaissance; the actual damage comes from subsequent actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious execution of <code>fsutil.exe</code> (see below).</li>
<li>Enable process creation logging with command line arguments to capture <code>fsutil</code> executions (see setup instructions in the Overview).</li>
<li>Investigate any process executions of <code>fsutil.exe</code> where the parent process is unexpected or the user context is unusual (see Triage and Analysis).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>fsutil</category></item><item><title>Windows Event Logs Cleared</title><link>https://feed.craftedsignal.io/briefs/2024-01-clearing-windows-event-logs/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-clearing-windows-event-logs/</guid><description>Attackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.</description><content:encoded><![CDATA[<p>Attackers often clear Windows event logs to cover their tracks and hinder forensic investigations. This technique is employed post-compromise to remove evidence of malicious activities, making it difficult for defenders to detect and respond to intrusions. This behavior is typically observed after an attacker has achieved their objectives and seeks to maintain persistence or further compromise the system. By clearing logs, attackers can evade detection and prolong their access to the compromised environment. This can occur through various means, but the end result is the deletion of Security or System event logs, which are critical for security monitoring. This activity aims to disrupt incident response and evade SIEM detections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the system via phishing, exploitation, or credential theft.</li>
<li>Privilege escalation to gain administrative access to the system.</li>
<li>Discovery of event log locations and tools for clearing logs.</li>
<li>Execution of commands or tools to clear the Security or System event logs.</li>
<li>Verification of event log clearance to confirm the action&rsquo;s success.</li>
<li>Continued malicious activity without leaving obvious traces in the logs.</li>
<li>Attempts to disable or tamper with security monitoring tools to prevent future detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful clearing of Windows event logs can severely impair an organization&rsquo;s ability to detect and respond to security incidents. The absence of log data hinders forensic investigations and prevents the identification of malicious activities. This can lead to prolonged intrusions, data breaches, and significant financial losses. The low severity reflects the fact that while impactful, this behavior often occurs post-compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Windows Event Logs Cleared&rdquo; to your SIEM to detect attempts to clear event logs (rule.name).</li>
<li>Investigate any alerts generated by the &ldquo;Windows Event Logs Cleared&rdquo; Sigma rule, focusing on the process execution chain and user accounts involved (rule.note).</li>
<li>Enable Sysmon process creation logging to provide more detailed information about processes involved in clearing event logs (logsource.category).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category></item><item><title>Unusual Process Writing Data to an External Device via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-exfiltration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-exfiltration/</guid><description>A machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes writing data to external devices, a tactic often used by malicious actors to exfiltrate data while masking their activities with seemingly benign processes. The detection leverages machine learning to identify deviations from typical behavior patterns, specifically focusing on processes that have no legitimate reason to write data to external devices. The rule relies on the &ldquo;ded_rare_process_writing_to_external_device_ea&rdquo; machine learning job from the Elastic Data Exfiltration Detection integration, version 9.4.0 or later. The rule analyzes file events collected by integrations such as Elastic Defend and Network Packet Capture. This detection is important because it can uncover exfiltration attempts that might otherwise go unnoticed due to the use of legitimate-looking processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, software vulnerability).</li>
<li>The attacker establishes persistence on the system, potentially using scheduled tasks or autorun keys.</li>
<li>The attacker identifies sensitive data on the system or network.</li>
<li>The attacker copies the sensitive data to a staging directory.</li>
<li>The attacker uses a renamed or masqueraded legitimate process (e.g., <code>svchost.exe</code>, <code>powershell.exe</code>) to write the staged data to an external device connected to the system.</li>
<li>The system&rsquo;s file events are monitored by Elastic Defend, capturing the process writing data to the external device.</li>
<li>The Elastic Data Exfiltration Detection integration analyzes the file events and identifies the process as rare or unusual for writing to external devices.</li>
<li>The &ldquo;Unusual Process Writing Data to an External Device&rdquo; rule is triggered, alerting security analysts to the potential exfiltration attempt.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could result in the exfiltration of sensitive data, leading to financial loss, reputational damage, and legal repercussions. While the severity is &ldquo;low,&rdquo; a successful exfiltration can have significant consequences. The number of victims and the specific sectors targeted depend on the attacker&rsquo;s objectives and the compromised system&rsquo;s access to sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install and configure the Data Exfiltration Detection integration in Elastic, ensuring the machine learning job <code>ded_rare_process_writing_to_external_device_ea</code> is enabled, as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup documentation</a>.</li>
<li>Enable file event collection using Elastic Defend to provide the necessary data for the machine learning job, as detailed in the <a href="https://www.elastic.co/guide/en/security/current/install-endpoint.html">Elastic Defend documentation</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the <code>anomaly_threshold</code> based on your environment&rsquo;s baseline behavior to reduce false positives.</li>
<li>Investigate any alerts generated by this rule, following the <a href="https://www.elastic.co/blog/detect-data-exfiltration-activity-with-kibanas-new-integration">triage and analysis guidance</a> to determine the legitimacy of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>elastic-defend</category></item><item><title>Suspicious Local Scheduled Task Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-local-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-local-scheduled-task-creation/</guid><description>This rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.</description><content:encoded><![CDATA[<p>Adversaries frequently abuse scheduled tasks in Windows to maintain persistence, move laterally within a network, or escalate privileges. This involves creating or modifying scheduled tasks to execute malicious commands or scripts at specific times or intervals. This detection rule focuses on identifying the creation of scheduled tasks by non-system accounts, which is often indicative of malicious activity. The rule specifically monitors for the execution of <code>schtasks.exe</code> with specific arguments related to task creation. It is designed to trigger when scheduled tasks are created by non-system level users, helping to filter out legitimate administrative activities. This is crucial for defenders because scheduled tasks provide a reliable and stealthy mechanism for attackers to maintain control over compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker executes a command shell (e.g., cmd.exe, PowerShell) or script interpreter (e.g., wscript.exe) on the compromised system.</li>
<li>The attacker uses <code>schtasks.exe</code> with the <code>/create</code> parameter to create a new scheduled task.</li>
<li>The <code>/TN</code> parameter is used to specify the name of the task, and the <code>/TR</code> parameter defines the program or script to execute.</li>
<li>The <code>/SC</code> parameter sets the schedule for the task (e.g., daily, hourly, onlogon), and <code>/RU</code> specifies the user account under which the task will run.</li>
<li>The attacker configures the task to run with elevated privileges or under a non-system account to bypass security controls.</li>
<li>The scheduled task executes the attacker&rsquo;s payload at the specified time or event, achieving persistence.</li>
<li>The payload may perform various malicious actions, such as installing malware, exfiltrating data, or establishing a command and control channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access to the compromised system, allowing attackers to maintain control even after reboots or user logoffs. Attackers can leverage scheduled tasks to escalate privileges, potentially gaining access to sensitive data or critical system resources. The creation of unauthorized scheduled tasks can also be used to move laterally within the network, compromising additional systems and expanding the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging with Event ID 1 to capture command-line arguments and process details (reference: Sysmon setup in rule setup).</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Task Creation by Non-System Account&rdquo; to your SIEM to detect suspicious schtasks.exe activity.</li>
<li>Review and whitelist legitimate scheduled task creation activities in your environment to reduce false positives (reference: False positive analysis).</li>
<li>Monitor process activity for processes such as cmd.exe, powershell.exe, wscript.exe creating scheduled tasks (reference: query).</li>
<li>Investigate any scheduled tasks created by non-system accounts that do not have a clear business justification (reference: Investigation Guide).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>scheduled_task</category><category>attack.persistence</category></item><item><title>Suspicious Command Prompt Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-cmd-network/</guid><description>This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.</description><content:encoded><![CDATA[<p>This detection identifies suspicious network connections initiated by the command prompt (cmd.exe) on Windows systems. The rule focuses on cmd.exe processes executed with specific arguments, such as those indicating script execution (e.g., *.bat, *.cmd), access to remote resources (e.g., URLs), or those spawned by Microsoft Office applications (Excel, Word, etc.). Attackers frequently abuse cmd.exe to download malicious payloads, execute commands, or establish command and control channels. This detection aims to identify such potentially malicious activity by correlating process creation events with subsequent network connections. The rule excludes common private and reserved IP address ranges to reduce false positives. The targeted systems are Windows endpoints where adversaries attempt to leverage cmd.exe for malicious purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious document (e.g., Word, Excel) or executes a seemingly benign application.</li>
<li>The document or application contains a macro or script that initiates a cmd.exe process.</li>
<li>The cmd.exe process is launched with arguments indicating script execution (<code>/c</code>, <code>/k</code>) and referencing a remote resource (e.g., a URL) or a local batch file.</li>
<li>The cmd.exe process attempts to download a payload from a remote server using protocols like HTTP, HTTPS, or FTP.</li>
<li>The downloaded payload is saved to disk, often with a disguised filename.</li>
<li>The cmd.exe process executes the downloaded payload, initiating further malicious actions.</li>
<li>The malicious payload establishes a command and control (C2) channel with a remote server.</li>
<li>The attacker uses the C2 channel to send commands to the compromised system, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of Windows endpoints, potentially enabling attackers to download and execute malicious payloads, establish command and control channels, and perform further malicious activities such as data theft, lateral movement, or ransomware deployment. While this detection has a low severity, it serves as an early warning sign of potential compromise and should be investigated promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the full context of cmd.exe executions.</li>
<li>Monitor network connections from cmd.exe processes, focusing on connections to external IP addresses, using a network monitoring solution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious cmd.exe network connections.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on cmd.exe processes spawned by Office applications or those executing scripts from remote URLs.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-prompt</category><category>network-connection</category><category>windows</category><category>execution</category><category>command-and-control</category></item><item><title>Suspicious Access to LDAP Attributes</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</guid><description>The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.</description><content:encoded><![CDATA[<p>This rule identifies read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information. The rule focuses on event code 4662, filtering for &lsquo;Read Property&rsquo; access where the number of properties accessed is greater than or equal to 2000. The rule is designed to detect potential reconnaissance activities within an Active Directory environment, providing security teams with insights into unusual access patterns that may indicate malicious intent. This detection logic helps security teams proactively identify and respond to potential threats targeting Active Directory environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the target network, possibly through compromised credentials or a phishing attack (not directly covered in the provided source).</li>
<li>The attacker uses the compromised account to query Active Directory via LDAP.</li>
<li>The attacker issues a series of LDAP queries, requesting a large number of attributes for various Active Directory objects, triggering event ID 4662.</li>
<li>The event logs record the excessive number of read property accesses (winlog.event_data.Properties), exceeding the threshold of 2000.</li>
<li>The attacker analyzes the gathered information to identify potential targets, such as privileged accounts, sensitive data stores, or vulnerable systems.</li>
<li>The attacker attempts to elevate privileges by exploiting identified vulnerabilities or misconfigurations within Active Directory.</li>
<li>The attacker uses the elevated privileges to access sensitive information or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gather sensitive information about the Active Directory environment, identify potential vulnerabilities, elevate privileges, and move laterally within the network. This can lead to data breaches, system compromise, and significant disruption to business operations. The number of victims and sectors targeted are dependent on the scope and objectives of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Access to generate the necessary events (event code 4662) as mentioned in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Access to LDAP Attributes&rdquo; to your SIEM and tune the threshold (length(winlog.event_data.Properties) &gt;= 2000) for your environment.</li>
<li>Review event logs for event code 4662, focusing on the <code>winlog.event_data.Properties</code> field, to understand which attributes were accessed.</li>
<li>Investigate the source machine from which the LDAP queries originated by examining the <code>winlog.event_data.SubjectUserSid</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active_directory</category><category>ldap</category><category>discovery</category><category>windows</category></item><item><title>Spike in Remote File Transfers via Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</guid><description>A machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.</description><content:encoded><![CDATA[<p>The &ldquo;Spike in Remote File Transfers&rdquo; detection identifies potential lateral movement activity within a network by monitoring for unusual volumes of remote file transfers. Attackers often aim to locate and exfiltrate valuable information after gaining initial access. To evade detection, they may attempt to mimic normal egress activity through numerous small transfers. This detection leverages machine learning to establish a baseline of normal transfer activity and identify deviations that may indicate malicious behavior. The rule requires the Lateral Movement Detection integration assets to be installed. For Elastic Defend events on versions 8.18 and above, <code>host.ip</code> collection must be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a host within the network through an exploit or compromised credentials.</li>
<li>Internal Reconnaissance: The attacker performs internal reconnaissance to identify valuable data and potential target systems.</li>
<li>Lateral Movement: The attacker uses stolen credentials or exploits remote services (T1210) to gain access to other systems on the network.</li>
<li>Tool Transfer: The attacker transfers malicious tools or scripts (T1570) to the compromised systems to facilitate further actions.</li>
<li>Data Collection: The attacker gathers sensitive data from the compromised systems.</li>
<li>Egress Activity: The attacker initiates numerous small remote file transfers, attempting to blend in with normal network traffic.</li>
<li>Data Exfiltration: The attacker exfiltrates the stolen data to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack involving anomalous file transfers can lead to data exfiltration, intellectual property theft, and reputational damage. Even though the severity is low, undetected lateral movement can escalate quickly into high severity incidents like ransomware or data breaches. This detection focuses on the early stages of lateral movement, allowing security teams to respond before significant damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure host IP collection is enabled in Elastic Defend configurations, following the steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the setup instructions in the rule documentation.</li>
<li>Investigate alerts generated by the &ldquo;Spike in Remote File Transfers&rdquo; rule, paying close attention to the source and destination of the file transfers.</li>
<li>Review authentication logs for signs of compromised accounts, such as unusual login times or locations, as described in the rule&rsquo;s triage notes.</li>
<li>Tune the machine learning job&rsquo;s anomaly threshold based on your environment&rsquo;s baseline activity and false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category></item><item><title>Service Control Executed from Script Interpreters</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-service-control-script-spawn/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-service-control-script-spawn/</guid><description>Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Service Control utility (sc.exe) is executed from within a script interpreter, such as cmd.exe, PowerShell, or wscript.exe. Attackers may leverage this behavior to create, modify, or start Windows services, often with the intent to elevate privileges or establish persistence on a compromised system. The sc.exe is a legitimate Windows command-line tool used for managing services. Abusing this tool allows attackers to perform malicious actions under the guise of legitimate system administration. This detection is designed to identify anomalous use of sc.exe that deviates from typical administrative tasks, focusing on instances where it&rsquo;s spawned from scripting environments often used for malicious activities. The rule specifically excludes service creations performed by the SYSTEM user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via an exploit or compromised credentials.</li>
<li>The attacker executes a script interpreter (e.g., cmd.exe, powershell.exe).</li>
<li>Within the script interpreter, the attacker uses sc.exe to manage Windows services.</li>
<li>The sc.exe command is used with arguments such as &ldquo;create&rdquo;, &ldquo;start&rdquo;, &ldquo;stop&rdquo;, &ldquo;delete&rdquo;, or &ldquo;config&rdquo; to manipulate service configurations.</li>
<li>A new service is created or an existing service is modified to execute a malicious payload.</li>
<li>The malicious service is started, allowing the attacker to execute code with elevated privileges (SYSTEM).</li>
<li>The attacker achieves persistence by ensuring the malicious service automatically starts upon system reboot.</li>
<li>The attacker may use the created service to execute additional malicious commands or maintain remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to complete system compromise with the attacker gaining SYSTEM level privileges. This can allow for lateral movement within the network, data exfiltration, or installation of persistent backdoors. While the frequency of this specific technique may be low, the potential impact is high due to the elevated privileges gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service Control Spawning via Script Interpreter</code> to your SIEM to detect this specific behavior and tune it to your environment.</li>
<li>Monitor process creation events for sc.exe being executed by script interpreters like PowerShell or cmd.exe (as covered in the rule description).</li>
<li>Investigate any instances of sc.exe being used with the arguments &ldquo;create&rdquo;, &ldquo;start&rdquo;, &ldquo;stop&rdquo;, &ldquo;delete&rdquo;, or &ldquo;config&rdquo; from scripting environments to identify potentially malicious activity.</li>
<li>Ensure proper access controls are in place to limit the ability of users to create or modify services.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>execution</category><category>windows</category><category>service-creation</category></item></channel></rss>