<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Browser-Exploitation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/browser-exploitation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:15:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/browser-exploitation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Browser Process Spawned from an Unusual Parent</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</guid><description>Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where a browser process, specifically Google Chrome or Microsoft Edge, is initiated from an unexpected parent process on a Windows system. The rule focuses on scenarios where browsers are launched with arguments indicative of remote debugging, headless automation, or minimal user interaction. Such activity can signal an attempt to manipulate a browser session for malicious purposes, potentially leading to credential theft or unauthorized access to sensitive information. The rule is designed to leverage data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Process Creation Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or command to launch a browser process (chrome.exe or msedge.exe).</li>
<li>The browser is launched with specific command-line arguments, such as <code>--remote-debugging-port</code>, <code>--headless</code>, or <code>--window-position=-x,-y</code>, to enable remote control or hide the browser window.</li>
<li>The parent process of the browser is an unusual executable, not typically associated with launching browsers (e.g., not explorer.exe).</li>
<li>The attacker leverages the remote debugging port to interact with the browser session programmatically.</li>
<li>The attacker attempts to steal credentials or session cookies from the browser.</li>
<li>The attacker uses stolen credentials to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of user credentials, enabling unauthorized access to sensitive data and systems. This could result in financial loss, data breaches, and reputational damage for affected organizations. The targeted use of browser manipulation techniques increases the likelihood of bypassing traditional security controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Browser Process Spawned from Unusual Parent</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the <code>Browser Process Spawned from Unusual Parent</code> Sigma rule.</li>
<li>Review process command lines for arguments like <code>--remote-debugging-port</code> or <code>--headless</code> to identify potential browser manipulation attempts.</li>
<li>Monitor network connections originating from browser processes for unexpected destinations, as described in the investigation guide from the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>browser-exploitation</category></item></channel></rss>