<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1685 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1685/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 Nov 2024 14:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1685/feed.xml" rel="self" type="application/rss+xml"/><item><title>Bitbucket Secret Scanning Rule Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-11-bitbucket-secret-rule-deletion/</link><pubDate>Sun, 17 Nov 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-bitbucket-secret-rule-deletion/</guid><description>Attackers may delete secret scanning rules in Bitbucket to impair defenses and introduce secrets into the code repository undetected, potentially leading to unauthorized access or data breaches.</description><content:encoded><![CDATA[<p>Attackers with sufficient privileges within a Bitbucket project or repository may delete secret scanning rules. These rules are designed to automatically detect and prevent the committing of sensitive information like API keys, passwords, and tokens directly into the codebase. By removing these rules, adversaries can bypass security controls and introduce secrets into the repository undetected. This could be a precursor to a larger attack, where the leaked secrets are used to gain unauthorized access to systems, data, or other resources. This activity may occur as a part of a broader insider threat campaign or an external attacker who has gained control of a privileged account.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a Bitbucket account with project or repository administrator privileges.</li>
<li>The attacker authenticates to the Bitbucket web interface or uses the Bitbucket API with the compromised account.</li>
<li>The attacker navigates to the project or repository settings where secret scanning rules are configured.</li>
<li>The attacker identifies the secret scanning rules in place.</li>
<li>The attacker initiates the deletion of one or more secret scanning rules through the Bitbucket web interface or API.</li>
<li>Bitbucket processes the request and removes the specified secret scanning rules.</li>
<li>The attacker (or another compromised account) commits code containing secrets, which are no longer detected due to the deleted rules.</li>
<li>The committed secrets are then potentially used for lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of secret scanning rules in Bitbucket can lead to the undetected introduction of sensitive information into the codebase. This can result in unauthorized access to systems, data breaches, and other security incidents. The impact can range from minor data exposure to significant financial losses and reputational damage, depending on the scope and sensitivity of the leaked secrets. Organizations relying on Bitbucket for source code management are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Bitbucket audit logs for events related to secret scanning rule deletions, using the provided Sigma rule to detect suspicious activity (<code>bitbucket_audit_secret_scanning_rule_deleted.yml</code>).</li>
<li>Implement multi-factor authentication (MFA) for all Bitbucket accounts, especially those with administrative privileges, to reduce the risk of account compromise.</li>
<li>Enforce the principle of least privilege, ensuring that users only have the necessary permissions to perform their tasks.</li>
<li>Regularly review and audit Bitbucket user permissions and access controls.</li>
<li>Implement strong password policies and encourage users to use unique, complex passwords.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>GitHub Secret Scanning Feature Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</link><pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</guid><description>Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.</description><content:encoded><![CDATA[<p>The disabling of GitHub&rsquo;s secret scanning feature represents a significant security risk. Secret scanning is a critical control that prevents sensitive information, such as API keys, credentials, and tokens, from being committed to repositories. An attacker who gains administrative access to a GitHub organization or repository could disable this feature to facilitate the undetected introduction of secrets into the codebase. This action undermines the organization&rsquo;s security posture, creating opportunities for unauthorized access and data breaches. The activity is logged via GitHub audit logs, providing an opportunity for detection. This brief focuses on detecting the actions that disable the secret scanning feature within GitHub.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges for either an organization or a specific repository.</li>
<li>The attacker navigates to the security settings within the organization or repository.</li>
<li>The attacker identifies the &ldquo;Secret scanning&rdquo; feature or related settings (e.g., &ldquo;Secret scanning for new repositories&rdquo;).</li>
<li>The attacker disables the secret scanning feature using the GitHub UI or API. This generates an audit log event.</li>
<li>The attacker commits code containing secrets to the repository.</li>
<li>Because secret scanning is disabled, the secrets are not detected or flagged by GitHub.</li>
<li>The attacker leverages the committed secrets to gain unauthorized access to other systems or data.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, lateral movement, or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling secret scanning can lead to the exposure of sensitive credentials within a codebase. If successful, attackers can leverage these exposed secrets to compromise systems, access sensitive data, and potentially cause significant financial and reputational damage. The number of affected repositories and the extent of the damage depend on the scope of the access the attacker gains and the criticality of the exposed secrets. This can affect any organization that uses Github for source code management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Github Secret Scanning Feature Disabled&rdquo; Sigma rule to your SIEM to detect unauthorized disabling of the feature (logsource: github, service: audit).</li>
<li>Investigate any detected instances of secret scanning being disabled to determine if they were authorized administrative actions.</li>
<li>Enable audit log streaming to ensure the required logs are available (see logsource definition).</li>
<li>Review GitHub access controls to ensure that only authorized personnel have the ability to modify secret scanning settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>GitHub Push Protection Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</link><pubDate>Fri, 03 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</guid><description>An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.</description><content:encoded><![CDATA[<p>The GitHub push protection feature is designed to prevent secrets and sensitive information from being committed to repositories. Disabling this feature, whether at the organization, enterprise, or repository level, significantly increases the risk of accidental or intentional exposure of credentials, API keys, and other sensitive data. This can lead to unauthorized access, data breaches, and other security incidents. The actions detected can originate from administrative accounts or potentially compromised accounts with administrative privileges. This brief focuses on detecting the disabling of push protection, allowing security teams to respond and remediate the configuration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges, or a legitimate administrator performs the action.</li>
<li>The attacker navigates to the organization, enterprise, or repository settings in GitHub.</li>
<li>The attacker locates the &ldquo;Secret scanning&rdquo; or &ldquo;Push protection&rdquo; configuration section.</li>
<li>The attacker disables the push protection feature for the organization, enterprise, or specific repositories. This can be done via the GitHub UI or API.</li>
<li>GitHub audit logs record the event with the actions <code>business_secret_scanning_custom_pattern_push_protection.disabled</code>, <code>business_secret_scanning_push_protection.disable</code>, <code>org.secret_scanning_custom_pattern_push_protection_disabled</code>, etc..</li>
<li>Developers unknowingly or intentionally commit code containing secrets or sensitive data to the affected repositories.</li>
<li>The secrets are pushed to the remote repository without being blocked by push protection.</li>
<li>The exposed secrets can be discovered by malicious actors, leading to account compromise, data breaches, or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling push protection can lead to the exposure of sensitive information such as API keys, passwords, and other credentials within GitHub repositories. This exposure can lead to account compromise, unauthorized access to systems and data, and potentially significant financial and reputational damage. The number of affected repositories and the severity of the impact depends on the scope of the push protection disabling and the types of secrets committed to the repositories.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Disabled&rdquo; to your SIEM and tune for your environment to detect when push protection is disabled.</li>
<li>Investigate any detected instances of push protection being disabled in the GitHub audit logs (logsource: github, service: audit) to verify the legitimacy of the action.</li>
<li>Enforce multi-factor authentication (MFA) for all GitHub accounts, especially those with administrative privileges, to prevent unauthorized access.</li>
<li>Regularly review and audit GitHub organization and repository settings to ensure that push protection is enabled and properly configured.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>Bitbucket Global Secret Scanning Rule Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-rule-delete/</link><pubDate>Mon, 29 Apr 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-rule-delete/</guid><description>An adversary with administrative privileges may delete global secret scanning rules in Bitbucket to impair defenses and exfiltrate sensitive data without detection.</description><content:encoded><![CDATA[<p>This threat brief addresses the deletion of global secret scanning rules within Bitbucket environments. Secret scanning is a crucial defense mechanism used to prevent sensitive information, such as API keys and passwords, from being committed to repositories. An attacker with global administration privileges could intentionally delete these rules to bypass security controls. This action could occur post-compromise, as part of an insider threat, or due to accidental misconfiguration. The impact of this activity centers around an increased risk of sensitive data exposure, which can lead to further compromise or data breaches. Defenders should monitor Bitbucket audit logs for such deletions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid credentials with global administrator privileges within the Bitbucket environment, possibly through credential stuffing or phishing.</li>
<li>The attacker authenticates to the Bitbucket web interface or uses the Bitbucket API with their compromised credentials.</li>
<li>The attacker navigates to the global secret scanning rule configuration page.</li>
<li>The attacker identifies and selects one or more global secret scanning rules currently in effect.</li>
<li>The attacker initiates the deletion process for the selected rules, confirming the action when prompted.</li>
<li>Bitbucket processes the deletion request, removing the rules from the global configuration.</li>
<li>The system generates an audit log event indicating the deletion of the global secret scanning rule.</li>
<li>With secret scanning disabled, developers may inadvertently commit secrets into Bitbucket repositories, making them available to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of global secret scanning rules can have significant impact. Without active secret scanning, developers may unintentionally commit sensitive information (API keys, passwords, tokens) into Bitbucket repositories. This could lead to account takeovers, data breaches, or lateral movement within the organization&rsquo;s infrastructure. The number of affected repositories and exposed secrets will vary depending on the scope of the attacker&rsquo;s access and the activity of developers during the period when the rules were disabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect the deletion of global secret scanning rules in Bitbucket audit logs, focusing on <code>auditType.category: 'Global administration'</code> and <code>auditType.action: 'Global secret scanning rule deleted'</code> (Sigma rule).</li>
<li>Investigate any detected instances of global secret scanning rule deletion to determine if the action was authorized and performed by a legitimate user.</li>
<li>Implement multi-factor authentication (MFA) for all Bitbucket accounts, especially those with administrative privileges, to reduce the risk of credential compromise.</li>
<li>Regularly review Bitbucket user permissions and roles to ensure that users have only the necessary level of access.</li>
<li>Enable &ldquo;Basic&rdquo; logging level, as required, to ensure the necessary audit events are generated (logsource definition).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>Bitbucket Repository Exempted from Secret Scanning</title><link>https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-exempt/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-exempt/</guid><description>An attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.</description><content:encoded><![CDATA[<p>Attackers can weaken an organization&rsquo;s security posture by disabling or bypassing security controls within Bitbucket. This allows sensitive information, such as API keys, passwords, and other credentials, to be committed to the repository without detection. By adding a repository to the secret scanning exemption list, attackers can effectively disable a key preventative measure, making it easier to introduce and maintain compromised credentials within the codebase. This can lead to unauthorized access, data breaches, and other serious security incidents. This technique allows attackers to impair defenses, avoiding detection of secrets being committed to the repository.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Bitbucket account with repository administration privileges.</li>
<li>The attacker navigates to the repository settings within Bitbucket.</li>
<li>The attacker accesses the secret scanning configuration for the repository.</li>
<li>The attacker identifies the option to add the repository to the exemption list for secret scanning.</li>
<li>The attacker adds the repository to the exemption list, effectively disabling secret scanning for that repository.</li>
<li>The attacker commits sensitive information (secrets, credentials) to the now-exempt repository.</li>
<li>The secrets are committed without triggering secret scanning alerts.</li>
<li>The attacker uses the committed secrets to gain unauthorized access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising secrets within a Bitbucket repository can lead to a variety of negative consequences, including unauthorized access to sensitive data, compromised infrastructure, and data breaches. While the exact number of affected organizations is unknown, the potential impact is significant for any organization using Bitbucket to store code and manage secrets. Successful exploitation allows attackers to move laterally within the network and escalate privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Bitbucket Secret Scanning Exempt Repository Added&rdquo; to your SIEM to detect when a repository is added to the secret scanning exemption list (logsource: bitbucket).</li>
<li>Investigate any detected instances of repositories being added to the secret scanning exemption list to determine if the change was authorized.</li>
<li>Ensure that appropriate access controls are in place to prevent unauthorized users from modifying repository settings.</li>
<li>Review Bitbucket audit logs regularly to identify suspicious activity related to secret scanning configuration changes (logsource: bitbucket).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category><category>bitbucket</category></item><item><title>Bitbucket Project Secret Scanning Allowlist Added</title><link>https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-allowlist/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-allowlist/</guid><description>An adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.</description><content:encoded><![CDATA[<p>The addition of a secret scanning allowlist rule to a Bitbucket project can be abused by malicious actors to bypass security controls. While not inherently malicious, this action can be exploited to weaken an organization&rsquo;s security posture. Secret scanning tools are designed to prevent the accidental or intentional commit of sensitive information (API keys, passwords, etc.) into version control systems. By adding an allowlist rule, specific patterns or files can be excluded from these scans. This could be leveraged by an attacker who has gained access to a Bitbucket account or project to intentionally introduce secrets while avoiding detection. The activity is logged by Bitbucket&rsquo;s audit logs, providing an opportunity for detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to a Bitbucket account with sufficient privileges to modify project settings.</li>
<li>The attacker navigates to the project settings within Bitbucket.</li>
<li>The attacker accesses the secret scanning configuration for the project.</li>
<li>The attacker adds a new allowlist rule, specifying a pattern or file to be excluded from secret scanning.</li>
<li>The attacker commits code containing secrets that match the allowlist rule, effectively bypassing the secret scanning tool.</li>
<li>The changes are pushed to the Bitbucket repository.</li>
<li>The secrets remain undetected due to the allowlist rule.</li>
<li>The attacker leverages the exposed secrets for further malicious activities, such as gaining access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the exposure of sensitive information such as API keys, passwords, or other credentials. This can result in unauthorized access to internal systems, data breaches, and reputational damage. The number of affected projects depends on the scope of the attacker&rsquo;s access and the configuration of the allowlist rule. The addition of the allowlist rule itself does not directly cause damage but creates a window of opportunity for the introduction and persistence of secrets within the codebase.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the addition of secret scanning allowlist rules (logsource: bitbucket, service: audit).</li>
<li>Investigate any detected instances of allowlist rule additions to verify their legitimacy and business justification.</li>
<li>Review and enforce strict access controls for Bitbucket projects to minimize the risk of unauthorized modifications.</li>
<li>Enable &ldquo;Basic&rdquo; log level in Bitbucket to ensure that the audit events required for detection are captured, as indicated in the rule definition.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item></channel></rss>