<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Collection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/collection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 22:46:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/collection/feed.xml" rel="self" type="application/rss+xml"/><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>Detection of Sensitive LDAP Attribute Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</link><pubDate>Fri, 19 Jan 2024 16:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</guid><description>This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.</description><content:encoded><![CDATA[<p>This detection rule identifies attempts to access sensitive attributes within Active Directory via the Lightweight Directory Access Protocol (LDAP). These attributes, including <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, and <code>msPKI-CredentialRoamingTokens</code>, are valuable targets for adversaries aiming to steal credentials or escalate privileges. The rule focuses on Windows Security Event Logs, specifically monitoring event code 4662 which indicates an attempt to access an object. By filtering out common benign access patterns, such as those originating from the SYSTEM account or using specific access masks, the rule aims to highlight potentially malicious activity that warrants further investigation. The original rule was created in November 2022 and updated in May 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target domain (e.g., through phishing or exploiting a public-facing application).</li>
<li>The attacker uses valid credentials or exploits a vulnerability to authenticate to the domain.</li>
<li>The attacker uses LDAP queries to enumerate Active Directory objects.</li>
<li>The attacker crafts specific LDAP queries to target sensitive attributes like <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, or <code>msPKI-CredentialRoamingTokens</code>.</li>
<li>Windows Security Event 4662 is generated, logging the access attempt with details about the user, accessed object, and properties.</li>
<li>The attacker exfiltrates the accessed attribute data, potentially containing password hashes, certificates, or other sensitive information.</li>
<li>The attacker uses the stolen credentials or certificates to impersonate other users or gain elevated privileges within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain accounts, including privileged accounts. Attackers can use stolen credentials to move laterally within the network, access sensitive data, and disrupt business operations. Depending on the attributes accessed, this could also expose private keys and authentication certificates leading to further attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Access to Sensitive LDAP Attributes&rdquo; to your SIEM to detect access attempts to critical AD attributes (rule.name).</li>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to ensure that necessary Windows Security Event Logs (event code 4662) are generated for the Sigma rule to function (setup).</li>
<li>Review and tune the &ldquo;Access to Sensitive LDAP Attributes&rdquo; Sigma rule, creating exceptions for legitimate administrative accounts and scheduled system processes to minimize false positives (rule.note).</li>
<li>Implement stricter access controls and permissions for sensitive LDAP attributes within Active Directory to restrict access to only necessary personnel (rule.note).</li>
<li>Investigate any triggered alerts from the Sigma rule, focusing on identifying the user/process attempting access (winlog.event_data.SubjectUserSid) and the specific sensitive attribute accessed (winlog.event_data.Properties) (rule.note).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>collection</category><category>windows</category></item><item><title>Exchange Mailbox Export via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-exchange-mailbox-export/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-exchange-mailbox-export/</guid><description>Adversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.</description><content:encoded><![CDATA[<p>Attackers may target user email to collect sensitive information. The <code>New-MailBoxExportRequest</code> cmdlet is used to export the contents of a primary mailbox or archive to a .pst file. Note that this is done on a per-mailbox basis and this cmdlet is available only in on-premises Exchange. Attackers can abuse this functionality in preparation for exfiltrating contents, which is likely to contain sensitive and strategic data. This activity is typically performed using PowerShell or similar scripting tools and can be difficult to detect without specific monitoring in place. The activity may be part of a larger attack campaign targeting sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system with sufficient privileges to access Exchange PowerShell.</li>
<li>The attacker authenticates to the Exchange server using PowerShell.</li>
<li>The attacker uses the <code>New-MailboxExportRequest</code> cmdlet to initiate the export of a target mailbox to a .pst file. The command may include parameters to filter specific content.</li>
<li>The Exchange server processes the export request, creating a .pst file containing the mailbox data.</li>
<li>The attacker retrieves the exported .pst file from the designated file path.</li>
<li>The attacker may compress and archive the .pst file to reduce its size for exfiltration.</li>
<li>The attacker exfiltrates the .pst file to an external location controlled by the attacker.</li>
<li>The attacker analyzes the .pst file to extract sensitive information such as credentials, financial data, or intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to gain access to sensitive information contained within the exported mailboxes. This could lead to financial loss, reputational damage, or compromise of intellectual property. Depending on the scope of the export requests, multiple mailboxes may be compromised, impacting a large number of users. The impact is significant because email often contains highly sensitive business communications and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to monitor PowerShell execution with command-line arguments (Data Source: Sysmon).</li>
<li>Implement the provided Sigma rule to detect the use of <code>New-MailboxExportRequest</code> cmdlet in PowerShell commands.</li>
<li>Review the privileges of users with the &ldquo;Mailbox Import Export&rdquo; privilege to ensure that the least privilege principle is being followed.</li>
<li>Monitor Windows Security Event Logs for PowerShell activity related to mailbox export requests (Data Source: Windows Security Event Logs).</li>
<li>Investigate any alerts generated by the Sigma rules to identify potential malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>execution</category><category>powershell</category><category>exchange</category><category>mailbox</category></item><item><title>Detection of Encrypted Archive Creation with WinRAR or 7-Zip</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</guid><description>Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.</description><content:encoded><![CDATA[<p>Attackers frequently compress and encrypt data before exfiltration to reduce the amount of data being sent over the network and to obfuscate the contents. This behavior often indicates a later stage of intrusion where the attacker has already collected sensitive data and is preparing to move it out of the environment. The use of archiving tools like WinRAR and 7-Zip with encryption flags can help attackers to hide their activities, making it more difficult for defenders to identify and respond to data theft. This technique has been observed in multiple threat actors including Turla as documented by WeLiveSecurity. This brief focuses on detecting command-line activity indicative of archive creation with encryption using WinRAR or 7-Zip on Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Credential Access:</strong> The attacker attempts to obtain credentials using techniques such as Mimikatz or credential dumping.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify sensitive data and systems of interest.</li>
<li><strong>Data Collection:</strong> The attacker gathers sensitive data from various locations on the compromised system or network.</li>
<li><strong>Archive Creation:</strong> The attacker uses WinRAR or 7-Zip to create an encrypted archive of the collected data using command-line arguments like <code>-hp</code>, <code>-p</code>, <code>/hp</code>, or <code>/p</code> with <code>rar.exe</code> or <code>WinRAR.exe</code> or <code>-p*</code> with <code>7z.exe</code> or <code>7za.exe</code>.</li>
<li><strong>Data Staging:</strong> The encrypted archive is moved to a staging location, such as a temporary directory or removable media.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the encrypted archive from the network using various methods, such as FTP, SCP, or cloud storage services.</li>
<li><strong>Covering Tracks:</strong> The attacker deletes the archive from the staging location to remove evidence of the activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including personally identifiable information (PII), financial records, intellectual property, and other confidential information. This can result in significant financial losses, reputational damage, legal liabilities, and regulatory fines for the victim organization. The number of victims and specific sectors targeted will vary depending on the attacker&rsquo;s objectives and the nature of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Encrypting Files with WinRar or 7z - CommandLine&rdquo; to your SIEM to detect the execution of WinRAR or 7-Zip with encryption parameters (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Enable process creation logging with command line arguments in Sysmon to ensure the necessary data is available for detection (Data Source: Sysmon).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the scope and impact of the potential data exfiltration attempt (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Monitor network traffic for unusual outbound connections, particularly to cloud storage services or other external destinations, that may indicate data exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>archive</category><category>exfiltration</category><category>windows</category></item></channel></rss>