<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Brute-Force — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/brute-force/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 04:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/brute-force/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</link><pubDate>Fri, 24 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</guid><description>D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.</description><content:encoded><![CDATA[<p>The D-Link DWM-222W USB Wi-Fi Adapter is susceptible to a brute-force protection bypass vulnerability (CVE-2026-6947). This flaw allows an attacker on an adjacent network to circumvent the built-in login attempt limits. By repeatedly attempting different credentials without being blocked, an attacker can successfully brute-force the password and gain unauthorized access to the device. This vulnerability poses a significant risk as it enables attackers to potentially reconfigure the device, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Successful exploitation leads to full control over the D-Link Wi-Fi adapter.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker locates a vulnerable D-Link DWM-222W USB Wi-Fi Adapter within adjacent network range.</li>
<li>The attacker initiates network communication with the device, targeting its login interface, likely via HTTP or HTTPS.</li>
<li>The attacker sends a series of login requests with different username and password combinations.</li>
<li>Due to the brute-force protection bypass, the device does not enforce login attempt limits or implement account lockout mechanisms.</li>
<li>The attacker continues sending login requests until the correct credentials are found.</li>
<li>Upon successful authentication, the attacker gains administrative access to the D-Link DWM-222W USB Wi-Fi Adapter&rsquo;s configuration interface.</li>
<li>The attacker reconfigures the device to their specifications potentially enabling remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6947 allows an attacker to gain complete control over the D-Link DWM-222W USB Wi-Fi Adapter. This can lead to unauthorized access to the network it connects to, data interception, or the device being used as a launchpad for further attacks within the network. The impact is significant, as it bypasses standard security measures and grants full administrative privileges to the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for excessive authentication attempts targeting the D-Link DWM-222W USB Wi-Fi Adapter to detect potential brute-force attacks. Deploy the Sigma rule <code>Detect Excessive Authentication Attempts</code> to identify such activity.</li>
<li>Implement network segmentation to limit the impact of a compromised D-Link DWM-222W USB Wi-Fi Adapter.</li>
<li>If possible, disable remote management interfaces on the D-Link DWM-222W USB Wi-Fi Adapter to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>brute-force</category><category>credential-access</category><category>network-device</category></item><item><title>Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.</description><content:encoded><![CDATA[<p>Chamilo LMS, a popular learning management system, contains a vulnerability in versions prior to 1.11.38 and 2.0.0-RC.3 related to the generation of REST API keys (CVE-2026-33710). The API keys are generated using a flawed algorithm: <code>md5(time() + (user_id * 5) - rand(10000, 10000))</code>. Due to <code>rand(10000, 10000)</code> always returning 10000, the formula simplifies to <code>md5(timestamp + user_id*5 - 10000)</code>. An attacker knowing a valid username and a rough estimate of when the API key was generated can brute-force the key due to the limited entropy. This vulnerability allows unauthorized access to the Chamilo LMS REST API. The vulnerability was reported and patched in versions 1.11.38 and 2.0.0-RC.3. This poses a significant threat to educational institutions and organizations using vulnerable versions of Chamilo LMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target Chamilo LMS instance running a vulnerable version (prior to 1.11.38 or 2.0.0-RC.3).</li>
<li>Attacker obtains a valid username on the target Chamilo LMS instance through OSINT or credential stuffing.</li>
<li>Attacker estimates the API key creation time. This might be inferred from user activity or system logs.</li>
<li>Attacker crafts a script to generate potential API keys based on the predictable formula <code>md5(timestamp + user_id*5 - 10000)</code> using the known username and estimated timestamp.</li>
<li>The script iterates through a range of timestamps around the estimated creation time, generating corresponding MD5 hashes.</li>
<li>Attacker sends API requests with the generated API keys to the Chamilo LMS server.</li>
<li>The server validates the API key against the user.</li>
<li>Upon successful validation, the attacker gains unauthorized access to the Chamilo LMS REST API, potentially allowing them to modify course content, access user data, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33710 can lead to unauthorized access to sensitive data within the Chamilo LMS, including user information, course materials, and grades. This could result in data breaches, academic fraud, and reputational damage for affected organizations. The vulnerability affects all organizations running vulnerable versions of Chamilo LMS; the number of victims is correlated to the number of vulnerable deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS installations to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-33710.</li>
<li>Monitor web server logs for unusual API requests originating from unexpected IP addresses, especially those containing potentially valid API keys by deploying the provided Sigma rule.</li>
<li>Implement rate limiting on API endpoints to mitigate brute-force attempts.</li>
<li>If upgrading is not immediately feasible, consider temporarily disabling the REST API.</li>
<li>Review and audit user permissions within Chamilo LMS to minimize the impact of potential unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33710</category><category>chamilo</category><category>api-key</category><category>brute-force</category><category>webserver</category></item><item><title>Spike in Successful Logon Events from a Source IP</title><link>https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</link><pubDate>Thu, 02 Apr 2026 13:25:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</guid><description>A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.</description><content:encoded><![CDATA[<p>This alert triggers when an Elastic machine learning job identifies a significant spike in successful authentication events originating from a specific source IP address. The underlying cause may range from legitimate administrative activity to malicious attempts at credential compromise, such as password spraying, user enumeration, or brute force attacks. The rule requires a minimum Elastic Stack version of 9.4.0 and relies on data ingested via Elastic Defend, Auditd Manager, or the System integration. The machine learning job associated with this rule is named &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo;. While build servers and CI systems can trigger this alert as false positives, its presence should always prompt investigation to rule out credential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a network or system (not explicitly described in source).</li>
<li>Credential Harvesting: The attacker attempts to gather valid credentials through password spraying or brute-force attacks (T1110, T1110.003).</li>
<li>Account Discovery: The attacker enumerates user accounts to identify potential targets, often performed in conjunction with password attacks.</li>
<li>Successful Authentication: Using compromised credentials, the attacker successfully authenticates to a system or service (T1078, T1078.002, T1078.003).</li>
<li>Lateral Movement: After successful authentication, the attacker potentially moves laterally within the network using valid accounts (not explicitly described in source).</li>
<li>Privilege Escalation: The attacker may attempt to escalate privileges to gain higher-level access (not explicitly described in source).</li>
<li>Data Exfiltration/Impact: After gaining sufficient access, the attacker may exfiltrate sensitive data or cause damage to the system or network (not explicitly described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and services. The number of affected users and the extent of the damage depend on the scope of the compromised credentials and the attacker&rsquo;s objectives. This can impact any sector, as credential compromise is a common attack vector across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and configure the Elastic Defend, Auditd Manager, or System integrations to provide the necessary data for the machine learning job (see Setup section).</li>
<li>Install the associated Machine Learning job &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo; to enable the detection (see Setup section).</li>
<li>Tune the anomaly threshold of the machine learning job based on your environment to reduce false positives (anomaly_threshold metadata).</li>
<li>Investigate alerts triggered by this rule, focusing on identifying the involved assets, users, and source IP addresses (see Note section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>brute-force</category><category>password-spraying</category></item><item><title>OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-rate-limit-bypass/</link><pubDate>Tue, 31 Mar 2026 12:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-rate-limit-bypass/</guid><description>OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.</description><content:encoded>&lt;p>OpenClaw versions prior to 2026.3.12 are vulnerable to a rate-limiting bypass (CVE-2026-34505). The vulnerability exists because rate limiting is only applied after successful webhook authentication. This design flaw enables attackers to send numerous authentication requests with incorrect secrets without triggering rate limits. The vulnerability was reported on March 31, 2026. Successful exploitation allows attackers to systematically guess webhook secrets and subsequently submit forged…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rate-limiting</category><category>brute-force</category><category>webhook</category><category>cve-2026-34505</category></item><item><title>Bitbucket User Login Failure Detection</title><link>https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</link><pubDate>Fri, 08 Mar 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</guid><description>Detection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user login failures within Bitbucket environments. Monitoring failed login attempts is crucial as it can indicate various malicious activities, including credential stuffing, brute-force attacks, or attempts to gain unauthorized initial access. The audit logs in Bitbucket record details of these authentication failures, providing valuable data for security monitoring. The rule provided detects these events and can be used for correlation with other security events based on the &ldquo;author.name&rdquo; field for enhanced accuracy and context. Requires &ldquo;Advance&rdquo; log level to receive audit events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access Attempt:</strong> An attacker attempts to gain initial access to a Bitbucket account using a compromised or guessed username.</li>
<li><strong>Credential Guessing:</strong> The attacker attempts to guess the user&rsquo;s password through manual attempts or automated tools.</li>
<li><strong>Authentication Failure:</strong> Bitbucket records a &ldquo;User login failed&rdquo; event due to incorrect credentials. The <code>auditType.category</code> is Authentication, and <code>auditType.action</code> is User login failed.</li>
<li><strong>Multiple Failed Attempts:</strong> The attacker repeats the login attempts with different password variations or using a list of compromised credentials.</li>
<li><strong>Account Lockout (Optional):</strong> Depending on Bitbucket&rsquo;s configuration, repeated failed login attempts may trigger an account lockout.</li>
<li><strong>Successful Login (Potential):</strong> After multiple attempts, the attacker may eventually guess the correct password or use a valid compromised credential.</li>
<li><strong>Privilege Escalation/Persistence (If Successful):</strong> If successful, the attacker could escalate privileges, establish persistence, or perform other malicious actions within the Bitbucket environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive code repositories, intellectual property theft, and potential supply chain compromise. Attackers could inject malicious code, modify existing code, or exfiltrate sensitive data. Detecting these failed login attempts early can prevent significant damage. Although the number of victims cannot be determined with this specific detection, a successful attack can have far-reaching impacts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Bitbucket User Login Failure&rdquo; to your SIEM to detect suspicious authentication failures (logsource: bitbucket, service: audit). Tune for your environment by correlating on the author.name field.</li>
<li>Investigate the source IP addresses associated with the failed login attempts to identify potential malicious actors.</li>
<li>Implement multi-factor authentication (MFA) to significantly reduce the risk of successful credential-based attacks.</li>
<li>Monitor for unusual activity following any successful login after a series of failures.</li>
<li>Enforce strong password policies to reduce the effectiveness of brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bitbucket</category><category>authentication</category><category>brute-force</category><category>credential-access</category><category>initial-access</category></item><item><title>Multiple Logon Failure from the Same Source Address</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</guid><description>Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.</description><content:encoded><![CDATA[<p>This detection rule identifies potential password guessing or brute force activity against Windows systems. It focuses on detecting a high number of failed network logon attempts originating from a single source IP address within a short time frame. The rule analyzes Windows Security Event Logs, specifically looking for event category &ldquo;authentication&rdquo; and event action &ldquo;logon-failed&rdquo;. By aggregating failed authentication counts within a 60-second window and filtering out common authentication misconfiguration errors, the rule aims to pinpoint suspicious activity indicative of credential access attempts. This is important for defenders as it highlights potential breaches or malicious actors attempting to compromise user accounts via brute-force or password spraying attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates a network connection to a Windows system, likely targeting a service such as SMB or RDP.</li>
<li>The attacker attempts to authenticate using a list of usernames and passwords or commonly used passwords, generating failed logon attempts (Event ID 4625).</li>
<li>The Windows system logs the failed authentication attempts in the Security Event Log.</li>
<li>The detection rule monitors the Security Event Log for failed logon events (event.category == &ldquo;authentication&rdquo; and event.action == &ldquo;logon-failed&rdquo;).</li>
<li>The rule aggregates the number of failed logon attempts from the same source IP address within a 60-second time window.</li>
<li>If the number of failed attempts exceeds a threshold (e.g., 100) and involves multiple target usernames (Esql.count_distinct_target_user_name &gt;= 2), the rule triggers a detection.</li>
<li>The attacker may continue attempts after initial failures or pivot to successful credentials for lateral movement.</li>
<li>Successful credential access can lead to privilege escalation, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful brute-force or password spraying attacks can lead to unauthorized access to user accounts and sensitive data. The impact can range from minor inconvenience to significant data breaches and financial losses, depending on the compromised accounts and the data they have access to. The rule aims to reduce the window of opportunity for attackers to gain a foothold in the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs. Follow the setup instructions outlined in the rule documentation.</li>
<li>Deploy the Sigma rule &ldquo;Multiple Logon Failure from the Same Source Address&rdquo; to your SIEM and tune the threshold values (Esql.failed_auth_count and Esql.count_distinct_target_user_name) to minimize false positives in your environment.</li>
<li>Investigate any triggered alerts by examining the logon failure reason codes and the targeted user names as described in the rule&rsquo;s investigation guide.</li>
<li>Monitor network connections from the source IP address for any suspicious outbound traffic or lateral movement activity.</li>
<li>Review and enforce strong password policies to mitigate the risk of successful brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>password-spraying</category><category>windows</category></item><item><title>Multiple Logon Failure Followed by Logon Success</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-multiple-logon-failure-success/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-multiple-logon-failure-success/</guid><description>This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying brute-force or password guessing attacks against Windows systems. It detects multiple failed logon attempts originating from the same source IP address, followed by a successful logon. This pattern suggests an attacker attempting to guess credentials to gain unauthorized access to an account. The rule leverages Windows Security Event Logs to monitor authentication events. This activity is important for defenders because successful brute-force attacks can lead to account compromise, data breaches, and further malicious activities within the network. The rule uses EQL and analyzes <code>logs-system.security*</code>, <code>logs-windows.forwarded*</code>, and <code>winlogbeat-*</code> indices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates multiple failed logon attempts to a Windows system using various username and password combinations. These attempts originate from a single source IP address and target network logon types.</li>
<li>The system records each failed logon attempt as a Windows Security Event Log event (Event ID 4625). The event includes information about the source IP address, target username, and failure reason.</li>
<li>After several failed attempts, the attacker guesses the correct password for a valid user account.</li>
<li>The system records a successful logon event (Event ID 4624) for the compromised account, originating from the same source IP address as the previous failed attempts, also via a network logon type.</li>
<li>The attacker gains initial access to the target system using the compromised account.</li>
<li>The attacker may then attempt to escalate privileges or move laterally within the network, using the compromised account to access additional resources or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful brute-force attack can lead to unauthorized access to sensitive data, system compromise, and further malicious activities within the network. Compromised accounts can be used to escalate privileges, move laterally, and deploy ransomware. The severity depends on the privileges of the compromised account and the sensitivity of the data it can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary events (4624, 4625) in the Windows Security Event Logs for the detection rule to function. Reference: <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect multiple logon failures followed by a successful logon. Tune the rule based on your environment and baseline activity.</li>
<li>Investigate any triggered alerts to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Consider implementing multi-factor authentication (MFA) to mitigate the risk of brute-force attacks.</li>
<li>Monitor network traffic for suspicious activity originating from the source IP address associated with the brute-force attempts.</li>
<li>Review and enforce strong password policies to reduce the likelihood of successful password guessing.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>windows</category></item><item><title>Signal K Server WebSocket Login Brute-Force Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-signalk-brute-force/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-signalk-brute-force/</guid><description>The Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.</description><content:encoded><![CDATA[<p>Signal K server versions 2.24.0 and earlier are vulnerable to credential brute-forcing via the WebSocket protocol. The vulnerability stems from the lack of rate limiting on the WebSocket login endpoint (<code>/signalk/v1/stream</code>), which allows attackers to bypass the existing HTTP rate limiting mechanism. By establishing a WebSocket connection, an attacker can send an unlimited number of login attempts, effectively bypassing the intended rate limiting defense of 100 attempts per 10 minutes on the HTTP login endpoints. This makes it feasible to conduct dictionary attacks and potentially gain unauthorized access to Signal K servers. Signal K servers are commonly deployed on boat networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Signal K server.</li>
<li>Attacker establishes a WebSocket connection to <code>ws://server:3000/signalk/v1/stream?subscribe=none</code>.</li>
<li>The server sends a hello message, confirming the connection.</li>
<li>Attacker sends a series of login attempts via WebSocket messages using the following JSON format: <code>{&quot;requestId&quot;: &quot;1&quot;, &quot;login&quot;: {&quot;username&quot;: &quot;admin&quot;, &quot;password&quot;: &quot;guess1&quot;}}</code>.</li>
<li>The server processes each login attempt without rate limiting.</li>
<li>Attacker continues sending login attempts using different password guesses.</li>
<li>If successful, the attacker gains unauthorized access to the Signal K server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass HTTP rate limiting and brute-force credentials to gain unauthorized access to Signal K servers. An attacker can achieve a brute-forcing speed of approximately 20 attempts per second, limited by the bcrypt hashing algorithm. A dictionary attack with 10,000 words can be completed in approximately 8 minutes over a single connection. Since Signal K servers are commonly deployed on boat networks, successful exploitation can lead to unauthorized access to sensitive maritime data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections to Signal K servers for unusually high rates of WebSocket login attempts. Create a detection rule that triggers when a single IP address sends more than 5 login attempts per second via the WebSocket protocol.</li>
<li>Deploy the Sigma rule <code>Detect High Volume SignalK WebSocket Login Attempts</code> to identify potential brute-force attacks against Signal K servers.</li>
<li>Upgrade Signal K servers to a patched version that includes rate limiting on the WebSocket login endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>websocket</category></item><item><title>Azure AD Failed Authentication Increase</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azure-ad-failed-auth-increase/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azure-ad-failed-auth-increase/</guid><description>Detects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting abnormal increases in failed authentication attempts within Azure Active Directory (Azure AD). An adversary attempting to gain unauthorized access to user accounts or systems often performs brute-force or credential stuffing attacks. These attacks result in a higher-than-normal number of failed sign-in attempts. Monitoring and detecting such increases can provide early warning of potential breaches or compromised accounts. Defenders should investigate any significant spikes in failed authentications as they might indicate malicious activity targeting user accounts or application access. The detection is based on analysis of Azure AD sign-in logs to identify when the number of failed sign-ins increases by 10% or greater, warranting further investigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker attempts to gain initial access through various methods, such as phishing, compromised credentials, or exploiting vulnerabilities.</li>
<li><strong>Credential Stuffing/Brute-Force:</strong> The attacker uses lists of known usernames and passwords (credential stuffing) or systematically tries different password combinations (brute-force) against Azure AD accounts.</li>
<li><strong>Authentication Attempts:</strong> Each failed authentication attempt is logged within Azure AD sign-in logs, recording details such as username, IP address, and failure reason.</li>
<li><strong>Threshold Exceeded:</strong> The number of failed sign-in attempts reaches a threshold, triggering the detection rule based on a 10% or greater increase.</li>
<li><strong>Account Lockout (Potential):</strong> Multiple failed authentication attempts may lead to account lockouts, disrupting legitimate user access.</li>
<li><strong>Successful Authentication (Potential):</strong> If the attacker guesses the correct credentials, they gain unauthorized access to the target account.</li>
<li><strong>Privilege Escalation/Lateral Movement:</strong> After gaining access, the attacker attempts to escalate privileges or move laterally within the network to access sensitive data or systems.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker exfiltrates sensitive data or causes disruption to services depending on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful brute-force or credential stuffing attack can lead to unauthorized access to user accounts, data breaches, and service disruptions. Depending on the compromised account&rsquo;s privileges, the attacker may gain access to sensitive information, escalate privileges, or move laterally within the organization&rsquo;s network. The impact could range from minor data leaks to significant financial losses and reputational damage. Early detection and mitigation are crucial to minimize the impact of such attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect increases in failed Azure AD sign-in attempts and tune the threshold (10%) based on your environment (<code>Count: &quot;&lt;10%&quot;</code>).</li>
<li>Investigate alerts generated by the Sigma rule to determine the source and scope of the increased failed authentications.</li>
<li>Enforce multi-factor authentication (MFA) for all users to mitigate the risk of credential-based attacks.</li>
<li>Implement account lockout policies to prevent attackers from repeatedly attempting to guess passwords.</li>
<li>Monitor sign-in logs for unusual patterns, such as sign-ins from unfamiliar locations or devices, to identify potential compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>brute-force</category><category>credential-stuffing</category><category>authentication</category></item><item><title>Windows Admin Account Brute Force Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-account-bruteforce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-account-bruteforce/</guid><description>This rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.</description><content:encoded><![CDATA[<p>This detection rule, originally created on 2020-08-29 and last updated on 2026-05-04, identifies potential brute-force attempts against Windows systems. It focuses on scenarios where an attacker attempts to guess passwords for multiple accounts containing the term &ldquo;admin&rdquo; in their usernames, suggesting an attempt to compromise privileged accounts. The rule aggregates failed logon events to detect this activity. This is important for defenders as successful brute-force attacks can lead to unauthorized access, data breaches, and other malicious activities. The rule leverages Windows Security Event Logs and requires Audit Logon to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker attempts to gain initial access to the target network.</li>
<li>The attacker identifies potential target accounts with &ldquo;admin&rdquo; in their username.</li>
<li>The attacker initiates a series of network logon attempts using various password combinations (T1110.001, T1110.003).</li>
<li>The Windows system records failed logon events (Event ID 4625) in the Security Event Logs.</li>
<li>The detection rule aggregates these failed logon events, filtering out known noisy failure codes.</li>
<li>If the number of failed attempts against distinct &ldquo;admin&rdquo; accounts from the same source IP within a 60-second window exceeds a threshold (50 attempts against 2 distinct usernames), the rule triggers an alert.</li>
<li>The attacker, if successful, gains unauthorized access to the targeted admin account.</li>
<li>With access to an admin account, the attacker can perform a wide range of malicious activities, including privilege escalation, data exfiltration, and system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful brute-force attacks on administrator accounts can lead to significant damage. Attackers gaining access can escalate privileges, install malware, access sensitive data, or disrupt critical systems. This can result in data breaches, financial losses, and reputational damage. While specific victim counts are not provided, the rule&rsquo;s focus on privileged accounts indicates a high potential for severe impact on organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs. Refer to the setup instructions at <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Windows Admin Account Brute Force&rdquo; to your SIEM and tune the threshold parameters (failed_auth_count, count_distinct_user_name) for your environment.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on the source IP address, targeted usernames, and logon failure reason codes.</li>
<li>Review and strengthen password policies to prevent password guessing attacks (T1110).</li>
<li>Monitor network traffic for suspicious logon attempts from external IP addresses to internal systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>windows</category></item></channel></rss>