<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Api — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/api/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 19:16:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/api/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenViking Authentication Bypass Vulnerability (CVE-2026-40525)</title><link>https://feed.craftedsignal.io/briefs/2024-02-openviking-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 19:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-openviking-auth-bypass/</guid><description>OpenViking versions prior to commit c7bb167 are vulnerable to an authentication bypass that allows remote attackers to invoke privileged bot-control functionality without authentication when the api_key configuration is unset or empty, potentially leading to unauthorized access to downstream systems and data.</description><content:encoded><![CDATA[<p>OpenViking, a bot management framework, contains a critical authentication bypass vulnerability (CVE-2026-40525) affecting versions prior to commit c7bb167. Specifically, the VikingBot OpenAPI HTTP route surface fails to enforce authentication when the <code>api_key</code> configuration value is either unset or configured as an empty string. This vulnerability enables remote attackers with network access to the exposed OpenViking service to bypass authentication controls and execute privileged bot-control functionalities. This includes submitting attacker-controlled prompts, creating or manipulating bot sessions, and gaining unauthorized access to downstream tools, integrations, secrets, and sensitive data that the bot has access to. Given the potential for broad impact and ease of exploitation, this vulnerability poses a significant risk to organizations using vulnerable versions of OpenViking.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenViking instance with an exposed VikingBot OpenAPI endpoint.</li>
<li>Attacker checks the <code>api_key</code> configuration on the target, either through misconfiguration or default settings, it&rsquo;s found to be unset or empty.</li>
<li>Attacker crafts a malicious HTTP request to the VikingBot OpenAPI endpoint, omitting the required <code>X-API-Key</code> header.</li>
<li>Due to the authentication bypass, the vulnerable OpenViking instance processes the attacker&rsquo;s request without proper authentication.</li>
<li>Attacker utilizes the exposed bot-control functionalities to submit malicious prompts.</li>
<li>Attacker creates or hijacks bot sessions, leveraging the compromised session to access downstream systems.</li>
<li>Attacker leverages the bot&rsquo;s permissions to access internal tools, integrations, and secrets, potentially escalating privileges.</li>
<li>Attacker exfiltrates sensitive data or compromises downstream systems accessible to the bot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40525 allows attackers to completely bypass authentication controls and gain full access to bot control functionalities within the OpenViking framework. This could lead to unauthorized access to sensitive data, compromise of downstream systems and integrations, and potential financial loss. The CVSS v3.1 base score for this vulnerability is 9.1, highlighting its critical severity and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade OpenViking to a version containing commit c7bb167 or later to patch CVE-2026-40525.</li>
<li>If upgrading is not immediately possible, configure a strong, unique <code>api_key</code> value within the OpenViking configuration to mitigate the authentication bypass.</li>
<li>Deploy the Sigma rule &ldquo;OpenViking Authentication Bypass Attempt&rdquo; to detect unauthorized requests to the VikingBot API endpoint lacking the <code>X-API-Key</code> header.</li>
<li>Monitor web server logs for HTTP requests to the VikingBot OpenAPI endpoint without the <code>X-API-Key</code> header to identify potential exploitation attempts using the &ldquo;OpenViking API requests without API Key&rdquo; Sigma rule.</li>
<li>Review access logs for downstream systems connected to OpenViking for any unauthorized activity originating from the OpenViking server following potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-40525</category><category>authentication-bypass</category><category>openviking</category><category>api</category></item><item><title>Paperclip Cross-Tenant Agent API Key IDOR Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-paperclip-idor/</link><pubDate>Thu, 16 Apr 2026 22:49:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-paperclip-idor/</guid><description>A Paperclip API vulnerability allows a board user from one company to create, list, and revoke agent API keys in another company, leading to full cross-tenant compromise due to insufficient authorization checks on `/agents/:id/keys` routes.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the Paperclip control-plane API, specifically in versions prior to 2026.416.0. The vulnerability allows a board user with membership in one company (e.g., Company A) to manipulate agent API keys for agents belonging to a different company (e.g., Company B). This is due to an Insecure Direct Object Reference (IDOR) in the <code>/agents/:id/keys</code> routes (GET, POST, DELETE) where the API only validates the user&rsquo;s board-type session but fails to verify access to the company owning the target agent. By exploiting this flaw, an attacker can mint a new agent API key for an agent in the victim tenant, granting them full agent-level access within that tenant. This cross-tenant compromise allows the attacker to execute workflows, read data, and call any endpoint authorized for agents in the victim tenant, effectively breaching tenant isolation. The vulnerability was introduced due to missing company access checks in the key-management routes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates as a board user within Company A.</li>
<li>The attacker discovers or obtains the UUID of an agent belonging to Company B.</li>
<li>The attacker sends a POST request to <code>/agents/&lt;VICTIM_COMPANY_B_AGENT_ID&gt;/keys</code> with a name to create a new API key.</li>
<li>The server, lacking proper authorization checks, creates a new API key associated with the victim agent&rsquo;s <code>companyId</code> and returns the cleartext token.</li>
<li>The attacker uses the newly minted agent token in the <code>Authorization</code> header to authenticate subsequent requests.</li>
<li>The server&rsquo;s authentication middleware incorrectly sets the <code>req.actor</code> to an agent type associated with the victim&rsquo;s company.</li>
<li>The attacker successfully accesses resources and executes actions within Company B&rsquo;s tenant, bypassing company access checks.</li>
<li>The attacker can enumerate and revoke existing keys using the <code>/agents/:id/keys</code> and <code>/agents/:id/keys/:keyId</code> endpoints, causing denial of service to legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability leads to a full cross-tenant compromise. An attacker can gain unauthorized access to any tenant within the Paperclip instance, provided they have a minimal valid account (board user in any company) and a victim agent UUID. This allows the attacker to execute workflows, read sensitive data, and call any authorized endpoint within the victim tenant, leading to complete confidentiality, integrity, and availability loss. Furthermore, the attacker can revoke legitimate agent keys, resulting in a denial of service. This represents a scope change, where a vulnerability in Company A&rsquo;s scoping checks results in catastrophic impact within Company B&rsquo;s tenant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement explicit company-access checks on the <code>/agents/:id/keys</code> (GET, POST) and <code>/agents/:id/keys/:keyId</code> (DELETE) routes before interacting with the service layer. This directly addresses the core issue as described in the advisory&rsquo;s &ldquo;Recommended Fix&rdquo; section.</li>
<li>Deploy the Sigma rule <code>Detect Paperclip Cross-Tenant API Key Creation</code> to identify unauthorized API key creation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Paperclip Cross-Tenant API Access</code> to detect unauthorized access using stolen agent tokens.</li>
<li>Upgrade to npm/@paperclipai/server version 2026.416.0 or later to patch the vulnerability as mentioned in the advisory&rsquo;s &ldquo;Affected Packages&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>idor</category><category>cross-tenant</category><category>api</category><category>paperclip</category><category>privilege-escalation</category></item><item><title>Kimsuky Malware Using Dropbox API for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</link><pubDate>Thu, 19 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</guid><description>Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.</description><content:encoded><![CDATA[<p>Kimsuky, a North Korean APT group, has been observed utilizing malware that leverages the Dropbox API for command and control (C2). This allows the malware to blend in with legitimate network traffic, making detection more challenging. The malware uses the Dropbox API to upload stolen data and download commands from the attackers. This method provides a covert channel for exfiltration and control, bypassing traditional network-based security measures. The group has been known to target South Korean entities, but the scope of targeting may extend beyond this region. This technique has been observed starting in early 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unconfirmed vector, such as spear phishing or watering hole attacks, delivering an initial downloader.</li>
<li>The downloader executes and establishes persistence, potentially by creating scheduled tasks or modifying registry keys.</li>
<li>The malware initializes the Dropbox API, authenticating with stolen or embedded API keys.</li>
<li>The malware enumerates files on the compromised system, targeting documents, credentials, and other sensitive data.</li>
<li>Stolen data is compressed and encrypted before being uploaded to a designated Dropbox folder controlled by the attacker, using the Dropbox API.</li>
<li>The malware periodically checks the attacker&rsquo;s Dropbox folder for new commands, also using the Dropbox API.</li>
<li>Downloaded commands are decrypted and executed on the compromised system, enabling actions such as remote code execution or further data exfiltration.</li>
<li>The cycle of data exfiltration and command execution continues, allowing the attacker to maintain persistent access and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to significant data breaches, intellectual property theft, and espionage. Kimsuky&rsquo;s targeting of South Korean entities suggests a focus on political and strategic intelligence gathering. The use of Dropbox as a C2 channel allows the attackers to remain undetected for extended periods, maximizing the impact of the compromise. The number of victims is currently unknown, but the potential for widespread compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual API calls to Dropbox, especially from unknown or suspicious processes (see: &ldquo;Detect Suspicious Dropbox API Usage&rdquo; Sigma rule).</li>
<li>Implement strict access controls and monitoring for Dropbox API usage within the organization.</li>
<li>Investigate and block any suspicious processes attempting to access Dropbox API endpoints.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>kimsuky</category><category>dropbox</category><category>api</category><category>command-and-control</category><category>exfiltration</category></item><item><title>Okta API Token Revoked</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-revoked/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-api-token-revoked/</guid><description>Detection of Okta API token revocation events, indicating potential unauthorized access or compromise.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the revocation of Okta API tokens. Okta API tokens are used to authenticate and authorize applications to access Okta&rsquo;s APIs. When a token is revoked, it means that the token is no longer valid and can no longer be used to access Okta&rsquo;s APIs. This can happen for a number of reasons, including: a user manually revoking the token, an administrator revoking the token, or Okta automatically revoking the token due to inactivity or security concerns. Detecting API token revocations is crucial because it can indicate that a token has been compromised and is being used by an attacker. A revoked token could be a sign of successful lateral movement or data exfiltration attempts within the Okta environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains unauthorized access to an Okta API token through methods like phishing, credential stuffing, or malware.</li>
<li>API Usage: The attacker uses the stolen API token to access Okta&rsquo;s APIs, potentially gathering sensitive information or modifying user accounts.</li>
<li>Anomaly Detection: Okta&rsquo;s security mechanisms or custom alerts identify unusual activity associated with the API token, such as access from unfamiliar locations or excessive API calls.</li>
<li>Investigation Triggered: Security personnel initiate an investigation based on the flagged anomalous activity.</li>
<li>Token Revocation: As part of the incident response process, the compromised API token is manually or automatically revoked to prevent further unauthorized access. This action generates a &ldquo;system.api_token.revoke&rdquo; event in the Okta system log.</li>
<li>Post-Revocation Analysis: Security teams analyze the events leading up to the token revocation to identify the root cause of the compromise and assess the scope of the attacker&rsquo;s activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful compromise of an Okta API token can lead to significant damage, including unauthorized access to sensitive user data, modification of user accounts and permissions, and disruption of critical business operations. If not detected promptly, attackers can leverage compromised tokens to escalate privileges, move laterally within the Okta environment, and potentially gain access to other connected systems. A single compromised API token could affect hundreds or thousands of users, depending on the scope of access granted to the token.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>system.api_token.revoke</code> events in Okta logs.</li>
<li>Investigate any detected <code>system.api_token.revoke</code> events to determine the cause of the revocation and assess the potential impact.</li>
<li>Review Okta system logs for anomalous activity prior to the token revocation to identify the source of the compromise.</li>
<li>Implement multi-factor authentication (MFA) for all Okta users to reduce the risk of credential compromise.</li>
<li>Regularly audit and review Okta API tokens to identify and revoke unused or overly permissive tokens.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>api</category><category>token</category><category>revocation</category><category>identity</category></item></channel></rss>