<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bun — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/bun/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 12:42:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/bun/feed.xml" rel="self" type="application/rss+xml"/><item><title>Uncommon DNS Requests via Bun or Node.js</title><link>https://feed.craftedsignal.io/briefs/2026-05-uncommon-dns-nodejs/</link><pubDate>Thu, 21 May 2026 12:42:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-uncommon-dns-nodejs/</guid><description>Detection of uncommon DNS requests originating from Bun or Node.js processes, potentially indicating malicious code execution following a supply chain attack.</description><content:encoded><![CDATA[<p>This detection identifies unusual DNS requests originating from Node.js or Bun, which may indicate supply chain compromise. Node.js and Bun are JavaScript runtimes popular for web application development. Adversaries could compromise developer packages and inject malicious code, leading to the execution of unauthorized network activities. This rule is designed to detect such anomalous DNS requests, helping to identify potential data exfiltration or command and control activities resulting from compromised dependencies. Elastic recommends using Endpoint 9.3.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer&rsquo;s machine is compromised through a supply chain attack on a Node.js or Bun package.</li>
<li>Malicious code is injected into the application&rsquo;s dependencies.</li>
<li>The application executes the malicious code when a user runs or builds the application.</li>
<li>The malicious code uses Node.js or Bun&rsquo;s networking capabilities to initiate a DNS request to an external domain.</li>
<li>The DNS request targets a domain not typically accessed by the application.</li>
<li>The DNS request is used to beacon to a command-and-control server or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Node.js or Bun applications can lead to data theft, remote code execution, and unauthorized access to sensitive resources. Supply chain attacks targeting developer tools are a growing concern. This can affect any organization relying on potentially vulnerable packages within their applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor network connections from Node.js and Bun processes, especially DNS requests to uncommon domains.</li>
<li>Implement software composition analysis (SCA) to identify and manage open-source dependencies and known vulnerabilities.</li>
<li>Enforce strict code review processes for changes to application dependencies.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>supply-chain</category><category>command-and-control</category><category>dns</category><category>nodejs</category><category>bun</category></item></channel></rss>