<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Credential Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/credential-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:42:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/credential-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kubernetes Pod Exec Sensitive File or Credential Path Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-pod-exec-sensitive-file-access/</link><pubDate>Mon, 04 May 2026 21:42:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-pod-exec-sensitive-file-access/</guid><description>This rule detects Kubernetes pod exec sessions where the decoded command line references sensitive files or paths such as mounted service account tokens, kubelet and control-plane configuration, host identity stores, private keys, and process environment dumps, aiming to identify potential lateral movement, privilege escalation, or credential theft.</description><content:encoded><![CDATA[<p>This detection identifies Kubernetes pod exec sessions accessing sensitive files or credential paths. The goal is to detect attackers attempting to steal credentials or configuration information from within Kubernetes pods. This often occurs after initial access and may precede lateral movement, privilege escalation, or data exfiltration. The detection focuses on command lines that reference paths related to service account tokens, kubelet configuration, host identity stores, common private keys, keystore extensions, process environment dumps, and configuration files with embedded secrets. The rule is designed to catch both interactive and scripted access, and includes exclusions for benign reads of resolv.conf.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Kubernetes cluster, potentially through a compromised application or misconfigured service.</li>
<li>Attacker uses <code>kubectl exec</code> or similar tools to execute commands within a pod.</li>
<li>The executed command attempts to read sensitive files or directories within the pod&rsquo;s filesystem, such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> to obtain the pod&rsquo;s service account token.</li>
<li>The command may also target host-level files if the pod has hostPath mounts or runs in a privileged context, like <code>/etc/shadow</code> or <code>/etc/passwd</code> for credential access.</li>
<li>The attacker may attempt to dump process environments via <code>/proc/&lt;pid&gt;/environ</code> to extract sensitive information stored as environment variables.</li>
<li>The attacker leverages obtained credentials or configuration to move laterally to other pods or nodes within the cluster.</li>
<li>The attacker escalates privileges within the cluster by abusing stolen service account tokens or node credentials.</li>
<li>The final objective is to exfiltrate sensitive data, deploy malicious workloads, or disrupt services within the Kubernetes environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, including credentials, configuration files, and application secrets. This can enable attackers to move laterally within the Kubernetes cluster, escalate privileges, and potentially gain control over the entire environment. The severity of the impact depends on the sensitivity of the data exposed and the level of access achieved by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect sensitive file access within Kubernetes pod exec sessions.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the <code>Esql.access_type</code> field to prioritize incidents.</li>
<li>Review and tighten RBAC permissions for pod exec to limit access to authorized users and service accounts.</li>
<li>Implement admission controls to prevent pods from running in privileged mode or using hostPath mounts unless absolutely necessary.</li>
<li>Monitor Kubernetes audit logs for suspicious <code>kubectl exec</code> activity, including unusual command lines or access patterns.</li>
<li>Regularly rotate Kubernetes service account tokens and other sensitive credentials to minimize the impact of potential breaches.</li>
<li>Use the provided Kubernetes audit log query to proactively search for historical instances of sensitive file access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>execution</category></item><item><title>Argo Workflows Credentials Exposed in Pod Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</link><pubDate>Mon, 04 May 2026 20:12:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</guid><description>Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, is vulnerable to credential exposure. Specifically, versions 4.0.0 through 4.0.4 inadvertently log artifact repository credentials in plaintext during artifact operations. This includes sensitive data like S3 Access Keys, Secret Keys, Session Tokens, Server-Side Customer Keys, OSS Access Keys, Secret Keys, Security Tokens, and GCS Service Account Keys. The vulnerability stems from the logging driver passing the entire ArtifactDriver struct to the structured logger. Any user with read access to workflow pod logs can extract these credentials, creating a significant security risk. This is an incomplete fix of CVE-2025-62157.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains read access to Kubernetes pod logs within the Argo Workflows namespace. This could be achieved through compromised credentials, misconfigured RBAC policies, or other Kubernetes vulnerabilities.</li>
<li>The attacker identifies a workflow that utilizes artifact storage, such as S3 or GCS.</li>
<li>The workflow executes an artifact operation (upload or download).</li>
<li>Argo Workflows logs the entire ArtifactDriver struct, including the plaintext credentials, into the pod logs.</li>
<li>The attacker queries the pod logs using <code>kubectl</code> or other Kubernetes tooling. For example: <code>kubectl -n argo logs &quot;cred-leak-test&quot; -c wait</code>.</li>
<li>The attacker extracts the plaintext credentials (e.g., S3 Access Key and Secret Key) from the log output.</li>
<li>The attacker uses the extracted credentials to access the artifact repository (e.g., S3 bucket) and potentially steal data or perform other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to artifact repositories used by Argo Workflows. This can lead to data breaches, as sensitive data stored in S3 buckets, GCS buckets, or other storage solutions can be exposed. The impact is especially severe if the compromised credentials have broad permissions or if the artifact repository contains highly sensitive data. This affects Argo Workflows versions 4.0.0, 4.0.1, 4.0.2, 4.0.3, and 4.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Argo Workflows to version 4.0.5 or later to remediate the vulnerability (CVE-2026-42295).</li>
<li>Review and restrict Kubernetes RBAC permissions to limit access to pod logs, following the principle of least privilege.</li>
<li>Implement log monitoring and alerting for unusual access patterns to Kubernetes pod logs.</li>
<li>Rotate any potentially exposed artifact repository credentials (S3 access keys, GCS service account keys, etc.) if Argo Workflows versions 4.0.0-4.0.4 were in use.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>credential-access</category><category>kubernetes</category></item><item><title>Potential WPAD Spoofing via DNS Record Creation</title><link>https://feed.craftedsignal.io/briefs/2024-06-wpad-spoofing/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-wpad-spoofing/</guid><description>Detection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>Web Proxy Auto-Discovery (WPAD) is a protocol that allows devices to automatically discover proxy settings, but it can be exploited by attackers to redirect traffic through malicious proxies. This detection identifies the creation of a &ldquo;wpad&rdquo; DNS record, which is a common technique used in WPAD spoofing attacks. Attackers can disable the Global Query Block List (GQBL) and create a rogue &ldquo;wpad&rdquo; record. The event code 5137 is logged when directory service changes are made, and this rule focuses on changes related to the creation of wpad records. This is important for defenders because successful WPAD spoofing can lead to credential access and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system with sufficient privileges to modify DNS records, often an Active Directory account.</li>
<li>The attacker disables the Global Query Block List (GQBL) to allow the creation of unauthorized DNS records.</li>
<li>The attacker creates a new DNS record for &ldquo;wpad&rdquo; in Active Directory DNS, using event code 5137.</li>
<li>The &lsquo;ObjectDN&rsquo; attribute of the DNS record contains &ldquo;DC=wpad,*&rdquo;.</li>
<li>Clients on the network query the DNS server for the &ldquo;wpad&rdquo; record.</li>
<li>The DNS server responds with the attacker-controlled IP address.</li>
<li>Clients automatically configure their proxy settings to use the attacker&rsquo;s proxy server.</li>
<li>The attacker intercepts network traffic, potentially capturing credentials and sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful WPAD spoofing can allow attackers to intercept sensitive information, including credentials, as users browse the web. This can lead to further compromise of systems and data within the network. While the number of victims is difficult to quantify, the impact can be significant within an organization if the attack is successful. This attack targets organizations using default WPAD settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate Windows Security Event Logs (event code 5137) as described in the setup instructions to ensure the rule functions correctly.</li>
<li>Deploy the Sigma rule &ldquo;Potential WPAD Spoofing via DNS Record Creation&rdquo; to your SIEM to detect suspicious &ldquo;wpad&rdquo; record creations.</li>
<li>Review Active Directory change history when the Sigma rule triggers to determine who made the changes to the DNS records and whether these changes were authorized, as outlined in the investigation guide.</li>
<li>Regularly verify the configuration of the Global Query Block List (GQBL) to ensure it has not been disabled or altered, as described in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>wpad-spoofing</category><category>windows</category></item><item><title>Potential Computer Account NTLM Relay Activity</title><link>https://feed.craftedsignal.io/briefs/2024-07-computer-account-relay/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-computer-account-relay/</guid><description>Detection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.</description><content:encoded><![CDATA[<p>This detection rule identifies potential NTLM relay attacks targeting Windows computer accounts. The rule focuses on authentication events where a computer account (identified by a name ending in &lsquo;$&rsquo;) is used for network logon from an IP address that does not match the IP address of the host owning the account. Such activity can indicate that an attacker has captured the computer account&rsquo;s NTLM hash through forced authentication techniques and is relaying it from a different machine to gain unauthorized access to resources. The rule is designed to detect activity within the last 9 months and relies on Windows Security Event Logs for analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the network through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker initiates a forced authentication attack (T1187) to coerce a target machine to authenticate to a system under the attacker&rsquo;s control.</li>
<li>The attacker captures the NTLM hash of a computer account, which is automatically generated for every machine joined to the domain.</li>
<li>The attacker uses the captured NTLM hash to relay authentication requests to other systems on the network. This leverages the &ldquo;Adversary-in-the-Middle&rdquo; technique (T1557), specifically &ldquo;LLMNR/NBT-NS Poisoning and SMB Relay&rdquo; (T1557.001).</li>
<li>The relay attack manifests as a network logon event (event code 4624 or 4625) where the source IP address does not match the IP address of the host that owns the computer account. The AuthenticationPackageName is NTLM.</li>
<li>The attacker gains unauthorized access to resources or performs actions on behalf of the compromised computer account.</li>
<li>The attacker may then attempt lateral movement, privilege escalation, or data exfiltration depending on the targeted resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful NTLM relay attacks against computer accounts can grant attackers unauthorized access to critical systems and data within the Windows domain. This could lead to privilege escalation, lateral movement, and ultimately, compromise of the entire domain. While the exact number of affected organizations is unknown, any organization relying on NTLM authentication and Active Directory is potentially vulnerable. The impact includes data breaches, system compromise, and significant disruption to business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon in Windows to generate the necessary security events for this rule to function, as described in the provided setup instructions.</li>
<li>Deploy the Sigma rule below to your SIEM to detect potential computer account relay activity and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by comparing the source.ip to the target server host.ip addresses to confirm it&rsquo;s indeed a remote use of the machine account.</li>
<li>Strengthen network segmentation to limit the attack surface for credential relay attacks, as recommended in the remediation steps.</li>
<li>Monitor for anomalous authentication patterns and NTLM-related activity to identify and respond to potential relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>threat-detection</category><category>windows</category></item><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>Potential Account Takeover - Logon from New Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-account-takeover-new-source-ip/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-account-takeover-new-source-ip/</guid><description>The rule identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP, potentially indicating account takeover or use of stolen credentials from a new location.</description><content:encoded><![CDATA[<p>This detection rule identifies potential account takeover activity by analyzing Windows Security Event Logs for unusual login patterns. Specifically, it looks for user accounts that typically log in with high frequency from a single source IP address but then exhibit successful logins from a different source IP address with significantly lower frequency. This pattern may indicate that an attacker has compromised the account credentials and is accessing the network from a new, potentially malicious, location. This activity is detected by analyzing Windows Security Event ID 4624 events related to successful logins. The rule is designed to trigger when a user account logs in from a new IP address after establishing a pattern of high-volume logins from a primary IP address.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to valid user credentials through methods such as phishing, credential stuffing, or malware. (T1078)</li>
<li><strong>Successful Logon:</strong> The attacker uses the compromised credentials to successfully log in to a Windows system from a new IP address (Event ID 4624, Logon Type Network/RemoteInteractive).</li>
<li><strong>Lateral Movement (Possible):</strong> Once authenticated, the attacker may attempt to move laterally within the network to access additional resources or systems.</li>
<li><strong>Privilege Escalation (Possible):</strong> The attacker may attempt to escalate their privileges to gain administrative access to the system or domain (TA0004).</li>
<li><strong>Data Exfiltration (Possible):</strong> The attacker may attempt to exfiltrate sensitive data from the compromised system or network.</li>
<li><strong>Persistence (Possible):</strong> The attacker may attempt to establish persistence mechanisms to maintain access to the system or network over time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful account takeover can have significant consequences, including unauthorized access to sensitive data, lateral movement within the network, privilege escalation, and data exfiltration. The rule specifically looks for logon patterns indicative of account takeover. If an account is taken over, attackers could potentially gain access to systems and data the user has rights to access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM and tune for your environment, paying close attention to the <code>max_logon</code> threshold.</li>
<li>Enable Audit Logon within Windows to ensure the events needed for detection are available as mentioned in the setup instructions.</li>
<li>Investigate any alerts generated by the Sigma rule by confirming with the account owner if they logged in from the new source IP.</li>
<li>Check the new source IP for reputation, geography, and whether it is expected as described in the rule&rsquo;s triage steps.</li>
<li>Correlate any generated alerts with other alerts for the same user or source IP such as logon failures, password changes, or MFA changes as part of your investigation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>account-takeover</category><category>credential-access</category><category>windows</category></item><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>Potential Kerberos SPN Spoofing via Suspicious DNS Query</title><link>https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</link><pubDate>Fri, 01 May 2026 17:31:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</guid><description>Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern in DNS queries indicative of Kerberos SPN spoofing, a technique used to coerce systems into authenticating to attacker-controlled hosts. The pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo; represents a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers exploit this by crafting malicious DNS names to trick victim systems into requesting Kerberos tickets for legitimate services, often their own identity, but directed towards an attacker-controlled endpoint. This can lead to Kerberos relay or NTLM reflection/relay attacks, bypassing normal NTLM fallback mechanisms. The technique is associated with tools like RemoteKrbRelay and wspcoerce. This activity has been observed in various attacks targeting Windows environments where Kerberos authentication is prevalent. Defenders need to detect and mitigate this early stage of credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target Windows system within the network.</li>
<li>The attacker sets up a malicious server to receive coerced authentication requests.</li>
<li>The attacker crafts a malicious DNS query containing a base64-encoded blob &ldquo;UWhRCA&hellip;BAAAA&rdquo; representing a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The victim system, triggered by an external factor (e.g., RPC call, scheduled task, or web request), attempts to resolve the crafted DNS name.</li>
<li>The malicious DNS query is sent to the DNS server, which resolves to the attacker&rsquo;s server.</li>
<li>The victim system initiates a Kerberos authentication request to the attacker&rsquo;s server, believing it to be a legitimate service.</li>
<li>The attacker&rsquo;s server relays the Kerberos ticket or uses NTLM reflection/relay techniques to gain unauthorized access.</li>
<li>The attacker compromises the victim system or pivots to other systems within the network using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential compromise, lateral movement, and domain takeover. Victims in Active Directory environments are particularly vulnerable. The impact includes unauthorized access to sensitive data, disruption of services, and potential ransomware deployment. If the coerced service has high privileges, the attacker can gain complete control over the compromised system or even the entire domain. Organizations using Kerberos authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Kerberos SPN Spoofing via Suspicious DNS Query&rdquo; rule to your SIEM and tune for your environment to detect malicious DNS queries.</li>
<li>Enable Sysmon Event ID 22 - DNS Query logging to provide the necessary data for detection.</li>
<li>Investigate and block any DNS queries resolving to external IPs that contain the &ldquo;UWhRCA&hellip;BAAAA&rdquo; pattern.</li>
<li>Monitor process creation events for processes initiating DNS queries containing the suspicious pattern, specifically looking for known coercion tools.</li>
<li>Implement network segmentation to limit the impact of lateral movement if a system is compromised.</li>
<li>Review and harden Kerberos configurations to prevent SPN spoofing and relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>spn-spoofing</category><category>dns</category><category>windows</category></item><item><title>IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</guid><description>IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.</description><content:encoded><![CDATA[<p>CVE-2026-6389 affects IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6. The vulnerability stems from the agent granting excessive cluster-wide permissions within IBM Turbonomic Application Resource Management. A successful exploit allows an attacker who has compromised the operator or its associated service account to gain unrestricted read access to all secrets within the cluster. This vulnerability was reported on April 30, 2026, and poses a significant risk to organizations using the affected versions, potentially leading to complete cluster compromise. Defenders should prioritize patching and monitoring for unauthorized access to sensitive resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the Kubernetes cluster, potentially through exploiting a vulnerability in a separate application or service running within the cluster, or via compromised credentials.</li>
<li>The attacker identifies the IBM Turbonomic prometurbo agent and its associated service account within the compromised cluster.</li>
<li>The attacker leverages the compromised service account or operator to interact with the Kubernetes API, exploiting the excessive cluster-wide permissions granted to the prometurbo agent.</li>
<li>The attacker utilizes the unrestricted read access to enumerate and exfiltrate sensitive credentials stored as secrets within the cluster, including database passwords, API keys, and other sensitive information.</li>
<li>Using the stolen credentials, the attacker escalates privileges by accessing other services and resources within the cluster, such as deploying malicious pods or modifying existing deployments.</li>
<li>The attacker achieves persistence by creating or modifying service accounts, roles, and role bindings to maintain access to the cluster even if the initial point of compromise is remediated.</li>
<li>The attacker moves laterally within the cluster, compromising additional nodes and workloads to expand their control and access to sensitive data.</li>
<li>The attacker achieves full cluster compromise, gaining complete control over all resources and data within the Kubernetes environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-6389 can lead to a full compromise of the Kubernetes cluster. This includes unrestricted access to sensitive data and the ability to control all workloads and resources within the environment. The impact includes potential data breaches, service disruptions, and significant financial and reputational damage. Organizations in any sector using the affected versions of IBM Turbonomic are at risk, and the severity is heightened in environments handling sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Turbonomic prometurbo agent to a version beyond 8.17.6 to patch CVE-2026-6389.</li>
<li>Review and restrict the permissions granted to the prometurbo agent service account, adhering to the principle of least privilege (reference: CVE-2026-6389).</li>
<li>Implement Kubernetes audit logging to monitor for unauthorized access to secrets and other sensitive resources (reference: Kubernetes documentation).</li>
<li>Deploy the Sigma rule &ldquo;Detect Kubernetes Secret Access via Turbonomic Agent&rdquo; to identify potential exploitation attempts (reference: Sigma rule below).</li>
<li>Monitor for unusual activity originating from the prometurbo agent service account, such as attempts to access or exfiltrate large amounts of data (reference: network_connection log source).</li>
<li>Implement network segmentation to limit the potential impact of a compromised cluster, preventing lateral movement to other environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>credential-access</category><category>kubernetes</category><category>vulnerability</category></item><item><title>Cilium `cilium-bugtool` WireGuard Private Key Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-04-cilium-wg-key-disclosure/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cilium-wg-key-disclosure/</guid><description>The `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.</description><content:encoded><![CDATA[<p>A vulnerability exists in the <code>cilium-bugtool</code> utility within Cilium, an open-source networking and security platform for cloud-native environments. When used with WireGuard Transparent Encryption enabled, the tool can inadvertently include the WireGuard private key (<code>cilium_wg0.key</code>) in its output. This affects Cilium versions v1.19 between v1.19.0 and v1.19.2, v1.18 between v1.18.0 and v1.18.8, and all versions prior to v1.17.15. The exposure occurs because the tool, used for debugging and generating system dumps, collects sensitive configuration files. The vulnerability was reported and addressed by the Cilium community, with patches released in versions v1.19.3, v1.18.9, and v1.17.15. Failure to patch could lead to unauthorized decryption of network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a system running a vulnerable Cilium version with WireGuard enabled, or obtains a <code>cilium-bugtool</code> archive.</li>
<li>The <code>cilium-bugtool</code> or <code>cilium sysdump</code> command is executed, either manually by a user or an automated process (initiated by the attacker if they have access).</li>
<li>The tool collects various debugging information, including the <code>cilium_wg0.key</code> file containing the WireGuard private key.</li>
<li>The resulting archive is stored locally, potentially accessible to the attacker.</li>
<li>Attacker exfiltrates the <code>cilium-bugtool</code> archive containing the WireGuard private key.</li>
<li>The attacker uses the extracted private key to decrypt WireGuard-encrypted traffic between Cilium nodes.</li>
<li>The attacker monitors and intercepts sensitive network communications.</li>
<li>Attacker pivots within the cluster using the decrypted traffic to discover additional services or escalate privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to decrypt network traffic between Cilium nodes that are using WireGuard encryption. This could lead to the exposure of sensitive data, such as credentials, API keys, or proprietary information. The number of affected deployments is currently unknown, but any Cilium environment using WireGuard encryption and running a vulnerable version is at risk. The impact is significant because it compromises the confidentiality of network communications, potentially enabling further attacks and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Cilium to versions v1.19.3, v1.18.9, or v1.17.15 or later to remediate CVE-2026-41520.</li>
<li>Rotate WireGuard keys on affected nodes if <code>cilium-bugtool</code> archives have been shared externally, as suggested in the advisory. Delete the <code>cilium_wg0.key</code> file and restart the Cilium agent.</li>
<li>Implement strict access control policies to limit who can execute <code>cilium-bugtool</code> or <code>cilium sysdump</code> commands, preventing unauthorized key disclosure.</li>
<li>Monitor for unusual execution of <code>cilium-bugtool</code> or <code>cilium sysdump</code> using process monitoring tools. Deploy a Sigma rule that detects unexpected execution paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cilium</category><category>wireguard</category><category>key-disclosure</category><category>credential-access</category></item><item><title>D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</link><pubDate>Fri, 24 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</guid><description>D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.</description><content:encoded><![CDATA[<p>The D-Link DWM-222W USB Wi-Fi Adapter is susceptible to a brute-force protection bypass vulnerability (CVE-2026-6947). This flaw allows an attacker on an adjacent network to circumvent the built-in login attempt limits. By repeatedly attempting different credentials without being blocked, an attacker can successfully brute-force the password and gain unauthorized access to the device. This vulnerability poses a significant risk as it enables attackers to potentially reconfigure the device, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Successful exploitation leads to full control over the D-Link Wi-Fi adapter.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker locates a vulnerable D-Link DWM-222W USB Wi-Fi Adapter within adjacent network range.</li>
<li>The attacker initiates network communication with the device, targeting its login interface, likely via HTTP or HTTPS.</li>
<li>The attacker sends a series of login requests with different username and password combinations.</li>
<li>Due to the brute-force protection bypass, the device does not enforce login attempt limits or implement account lockout mechanisms.</li>
<li>The attacker continues sending login requests until the correct credentials are found.</li>
<li>Upon successful authentication, the attacker gains administrative access to the D-Link DWM-222W USB Wi-Fi Adapter&rsquo;s configuration interface.</li>
<li>The attacker reconfigures the device to their specifications potentially enabling remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6947 allows an attacker to gain complete control over the D-Link DWM-222W USB Wi-Fi Adapter. This can lead to unauthorized access to the network it connects to, data interception, or the device being used as a launchpad for further attacks within the network. The impact is significant, as it bypasses standard security measures and grants full administrative privileges to the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for excessive authentication attempts targeting the D-Link DWM-222W USB Wi-Fi Adapter to detect potential brute-force attacks. Deploy the Sigma rule <code>Detect Excessive Authentication Attempts</code> to identify such activity.</li>
<li>Implement network segmentation to limit the impact of a compromised D-Link DWM-222W USB Wi-Fi Adapter.</li>
<li>If possible, disable remote management interfaces on the D-Link DWM-222W USB Wi-Fi Adapter to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>brute-force</category><category>credential-access</category><category>network-device</category></item><item><title>GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</link><pubDate>Wed, 22 Apr 2026 16:34:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</guid><description>This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.</description><content:encoded><![CDATA[<p>Attackers are increasingly exploiting GenAI tools to automate the discovery and exfiltration of sensitive information from compromised systems. This involves using GenAI agents to systematically scan file systems for credentials, API keys, tokens, and other secrets. Access to credential stores (.aws/credentials, .ssh/id_*) indicates credential harvesting, while modifications to shell configuration files (.bashrc, .zshrc) point to persistence attempts.  The observed activity leverages legitimate GenAI tool functionality, making it difficult to distinguish between benign use and malicious intent.  This technique has become more prevalent since late 2025, with attackers refining methods to instruct GenAI agents to specifically target and exfiltrate sensitive files. Defenders must monitor for unusual file access patterns by GenAI processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system via phishing or exploiting a software vulnerability.</li>
<li>Attacker installs or deploys a GenAI tool (e.g., LM Studio, Claude, Copilot) on the compromised system.</li>
<li>The attacker configures the GenAI tool to scan the file system for specific file names and patterns associated with sensitive data (credentials, keys, cookies).</li>
<li>The GenAI tool accesses files such as <code>.aws/credentials</code>, <code>.ssh/id_rsa</code>, browser login databases (e.g., <code>Login Data</code>, <code>logins.json</code>, <code>Cookies</code>), and other credential stores.</li>
<li>The GenAI tool may modify shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>The GenAI tool stages the collected data for exfiltration.</li>
<li>The attacker exfiltrates the harvested credentials and data to an external server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread credential compromise, allowing attackers to move laterally within a network, access sensitive data, and potentially disrupt critical business operations. A single compromised developer workstation could expose cloud infrastructure credentials, impacting hundreds of systems and services. The use of GenAI tools allows for rapid and automated credential harvesting, significantly increasing the scale and speed of potential breaches. Sectors at high risk include software development, cloud computing, and any organization that relies heavily on API keys and secrets for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>GenAI Process Accessing Sensitive Files</code> to your SIEM to detect GenAI tools accessing sensitive files. Tune for your environment to reduce false positives.</li>
<li>Monitor file access events, specifically looking for GenAI processes (ollama, lmstudio, claude) accessing files with names like <code>credentials</code>, <code>id_rsa</code>, <code>logins.json</code>, and <code>.bashrc</code>, as outlined in the Sigma rule.</li>
<li>Implement stricter access controls and monitoring for sensitive directories like <code>.aws</code>, <code>.ssh</code>, and browser profile directories.</li>
<li>Regularly audit and rotate credentials, API keys, and tokens, especially those stored in files.</li>
<li>Educate developers and users about the risks of using GenAI tools to handle sensitive data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>genai</category><category>file-access</category><category>persistence</category></item><item><title>Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL</title><link>https://feed.craftedsignal.io/briefs/2026-04-tekton-api-token-leak/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tekton-api-token-leak/</guid><description>The Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.</description><content:encoded><![CDATA[<p>A vulnerability exists in Tekton Pipelines&rsquo; git resolver (versions v1.0.0 through v1.10.0) where the system-configured Git API token is sent to a user-controlled <code>serverURL</code> when the user omits the <code>token</code> parameter. This allows a malicious tenant with TaskRun or PipelineRun create permissions to exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing <code>serverURL</code> to an attacker-controlled endpoint. The attacker can then use this token to gain unauthorized access to private repositories, potentially exposing source code, secrets, and CI/CD configurations. This vulnerability is similar to GHSA-j5q5-j9gm-2w5c, where credentials could be exfiltrated. The vulnerability resides in the <code>ResolveAPIGit()</code> function within <code>pkg/resolution/resolver/git/resolver.go</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains permission to create TaskRuns or PipelineRuns within a Tekton Pipelines namespace.</li>
<li>Attacker crafts a malicious TaskRun or PipelineRun configuration.</li>
<li>The configuration specifies the git resolver in API mode.</li>
<li>The configuration omits the <code>token</code> parameter but includes a <code>serverURL</code> pointing to an attacker-controlled endpoint.</li>
<li>Tekton Pipelines executes the TaskRun or PipelineRun, triggering the git resolver.</li>
<li>The <code>ResolveAPIGit()</code> function retrieves the system-configured Git API token using <code>getAPIToken()</code>.</li>
<li>The function creates an SCM client pointed at the attacker-controlled <code>serverURL</code> with the system token as an <code>Authorization</code> header.</li>
<li>Subsequent API calls from the resolver to the attacker-controlled URL transmit the system token, allowing the attacker to capture it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to exfiltrate the system Git API token (GitHub PAT, GitLab token, etc.). The exfiltrated token can be used to access private repositories, potentially leading to the exposure of sensitive information like source code, secrets, and CI/CD configurations.  This can lead to supply chain compromise, data breaches, or other unauthorized activities. All Tekton Pipeline instances running versions v1.0.0 through v1.10.0 are potentially vulnerable if a system-level API token is configured.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Do not configure a system-level API token</strong> in the git resolver ConfigMap. Instead, require all users to provide their own tokens via the <code>token</code> parameter, as suggested in the advisory&rsquo;s workaround section.</li>
<li><strong>Restrict TaskRun creation</strong> to limit which users or ServiceAccounts can create TaskRuns and PipelineRuns that use the git resolver, as recommended in the advisory&rsquo;s workaround section.</li>
<li><strong>Apply NetworkPolicy</strong> to the <code>tekton-pipelines-resolvers</code> namespace to restrict outbound traffic to known-good Git servers only, mitigating the risk of token exfiltration to arbitrary <code>serverURL</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tekton</category><category>git</category><category>credential-access</category><category>api-token</category></item><item><title>Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tekton-credential-leak/</guid><description>Tekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.</description><content:encoded><![CDATA[<p>Tekton Pipelines, a Kubernetes-style resource for declaring CI/CD pipelines, contains a vulnerability (CVE-2026-40161) in its git resolver component. Specifically, versions 1.0.0 to 1.10.0 are affected. When operating in API mode, the resolver inadvertently sends the system-configured Git API token (e.g., GitHub PAT, GitLab token) to a server specified by the user if the token parameter is omitted. This allows an attacker with TaskRun or PipelineRun creation privileges to exfiltrate the shared API token by directing the serverURL to an attacker-controlled endpoint. The vulnerability allows for the potential compromise of CI/CD pipelines and related infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Kubernetes tenant with permissions to create TaskRun or PipelineRun resources within Tekton Pipelines.</li>
<li>The attacker crafts a malicious TaskRun or PipelineRun configuration.</li>
<li>The configuration leverages the Tekton Pipelines git resolver in API mode.</li>
<li>The attacker omits the <code>token</code> parameter in the git resolver configuration, forcing the system to use the system-configured Git API token.</li>
<li>The attacker sets the <code>serverURL</code> parameter to an attacker-controlled endpoint.</li>
<li>Tekton Pipelines, upon execution of the TaskRun or PipelineRun, sends the system-configured Git API token to the attacker-controlled <code>serverURL</code>.</li>
<li>The attacker&rsquo;s server logs and captures the leaked Git API token.</li>
<li>The attacker uses the exfiltrated token to access and potentially compromise Git repositories or other services authenticated by the token.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40161 allows an attacker to steal the system-configured Git API token used by Tekton Pipelines. This could lead to unauthorized access to Git repositories, the modification of code, and the potential compromise of the entire CI/CD pipeline. Given Tekton&rsquo;s widespread adoption, a successful attack could affect numerous organizations using the vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tekton Pipelines to a version greater than 1.10.0 to remediate CVE-2026-40161.</li>
<li>Implement strict access controls within the Kubernetes cluster to limit TaskRun and PipelineRun creation privileges to authorized users only.</li>
<li>Monitor network traffic originating from Tekton Pipeline pods for connections to unusual or untrusted <code>serverURL</code> destinations as specified in CVE-2026-40161. Create a network connection rule for this.</li>
<li>Review Tekton Pipeline configurations for suspicious <code>serverURL</code> parameters using a file monitoring rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tekton</category><category>credential-access</category><category>cve-2026-40161</category></item><item><title>goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-github-token-leakage/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-github-token-leakage/</guid><description>The goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.</description><content:encoded><![CDATA[<p>The goshs SimpleHTTPServer, written in Go, is susceptible to an ArtiPACKED vulnerability (CVE-2026-40903) in versions prior to 2.0.0-beta.6. This vulnerability can lead to the unintended leakage of the <code>GITHUB_TOKEN</code> through workflow artifacts. Even if the token is not directly present in the repository&rsquo;s source code, the ArtiPACKED issue allows for its exposure during workflow execution. This is a significant risk for projects using goshs in their CI/CD pipelines, as a compromised <code>GITHUB_TOKEN</code> can grant attackers unauthorized access to the repository and its associated resources. Organizations utilizing goshs should upgrade to version 2.0.0-beta.6 or later to mitigate this vulnerability. The vulnerability was reported and patched in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer introduces a vulnerable version of goshs (prior to 2.0.0-beta.6) into a project&rsquo;s dependencies.</li>
<li>The project utilizes GitHub Actions or a similar CI/CD system.</li>
<li>The CI/CD workflow is configured to use or interact with the <code>GITHUB_TOKEN</code>.</li>
<li>Due to the ArtiPACKED vulnerability, the <code>GITHUB_TOKEN</code> becomes exposed within the workflow&rsquo;s generated artifacts.</li>
<li>An attacker gains access to these workflow artifacts, potentially through misconfigured permissions or compromised systems.</li>
<li>The attacker extracts the leaked <code>GITHUB_TOKEN</code> from the artifacts.</li>
<li>The attacker uses the compromised <code>GITHUB_TOKEN</code> to authenticate to the GitHub repository.</li>
<li>With the compromised token, the attacker can perform actions such as code modification, secret retrieval, or infrastructure changes depending on the token&rsquo;s permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40903 can lead to the leakage of sensitive <code>GITHUB_TOKEN</code> credentials, potentially granting unauthorized access to the affected GitHub repository. The impact of this vulnerability could include code tampering, unauthorized access to secrets, and potential compromise of associated infrastructure. The CVSS v3.1 score of 9.1 highlights the critical nature of this vulnerability. The number of affected organizations depends on the adoption rate of vulnerable goshs versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade goshs to version 2.0.0-beta.6 or later to remediate the ArtiPACKED vulnerability as detailed in CVE-2026-40903.</li>
<li>Review and restrict the permissions granted to the <code>GITHUB_TOKEN</code> in GitHub Actions workflows to minimize potential impact if the token is compromised.</li>
<li>Implement artifact scanning tools to detect potential secrets leakage in CI/CD workflow artifacts.</li>
<li>Monitor GitHub audit logs for suspicious activity originating from the <code>GITHUB_TOKEN</code>, particularly after the introduction or update of goshs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40903</category><category>github_token</category><category>credential-access</category><category>artipacked</category></item><item><title>Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</guid><description>Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.</description><content:encoded><![CDATA[<p>Cisco Catalyst SD-WAN Manager is affected by a vulnerability (CVE-2026-20128) that allows for the disclosure of stored passwords. An authenticated, local attacker with low privileges can exploit this vulnerability by accessing a credential file on the filesystem. Successful exploitation grants the attacker DCA user privileges, potentially leading to unauthorized access and control over the SD-WAN environment. CISA has issued Emergency Directive 26-03 and associated guidance to mitigate risks associated with Cisco SD-WAN devices. This vulnerability highlights the importance of proper credential management and access controls in network management systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains low-privileged access to the Cisco Catalyst SD-WAN Manager system through legitimate credentials or other vulnerabilities.</li>
<li>The attacker navigates the filesystem to locate the DCA user&rsquo;s credential file.</li>
<li>The attacker reads the credential file, which contains the DCA user&rsquo;s password in a recoverable format.</li>
<li>The attacker decodes or decrypts the password using readily available tools or techniques.</li>
<li>The attacker uses the recovered DCA user credentials to authenticate to the SD-WAN Manager with elevated privileges.</li>
<li>The attacker leverages the DCA user privileges to perform unauthorized configuration changes or access sensitive data.</li>
<li>The attacker potentially pivots to other systems or network segments accessible through the SD-WAN infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over the Cisco Catalyst SD-WAN Manager. This could lead to significant disruption of network services, data breaches, and potential compromise of connected systems. The impact is magnified by the widespread use of SD-WAN in enterprise environments, making this a critical vulnerability for organizations utilizing Cisco Catalyst SD-WAN Manager.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and apply the mitigations outlined in CISA&rsquo;s Emergency Directive 26-03 and associated guidance for Cisco SD-WAN devices, as referenced in the overview.</li>
<li>Monitor file access events on the Cisco Catalyst SD-WAN Manager system for suspicious access patterns to credential files using the <code>Detect Suspicious SD-WAN Credential File Access</code> Sigma rule.</li>
<li>Implement stricter access controls and password policies on the Cisco Catalyst SD-WAN Manager to prevent unauthorized access.</li>
<li>Apply the security updates provided by Cisco to patch CVE-2026-20128 as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-20128</category><category>credential-access</category><category>sd-wan</category><category>cisco</category></item><item><title>Multiple Vulnerabilities in Dell PowerProtect Data Domain OS</title><link>https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</link><pubDate>Tue, 21 Apr 2026 08:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</guid><description>Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within Dell PowerProtect Data Domain OS, potentially enabling a malicious actor to compromise systems. Successful exploitation could lead to arbitrary code execution with root privileges, privilege escalation to administrator level, circumvention of security mechanisms, data manipulation, sensitive information disclosure, and the execution of other unspecified malicious activities. The vulnerabilities could be exploited to gain complete control over the affected systems, leading to significant data loss, disruption of services, or other severe consequences. The full scope of affected versions and the specific vulnerabilities involved are not detailed in the source information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad nature of the advisory, the following attack chain is constructed based on the potential capabilities granted by exploiting the vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> An attacker exploits a remote code execution vulnerability in Dell PowerProtect Data Domain OS, potentially through a network service or web interface.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages an additional vulnerability to escalate privileges from an initial low-privilege shell to root access.</li>
<li><strong>Defense Evasion:</strong> With root privileges, the attacker disables or bypasses security measures, such as intrusion detection systems or anti-malware software.</li>
<li><strong>Credential Access:</strong> The attacker gains access to stored credentials, such as those used for backups or system administration, by dumping the system&rsquo;s credential store.</li>
<li><strong>Data Manipulation:</strong> The attacker modifies data stored within the Dell PowerProtect Data Domain system, potentially corrupting backups or injecting malicious code into stored files.</li>
<li><strong>Information Disclosure:</strong> The attacker extracts sensitive information, such as customer data, internal documents, or system configurations.</li>
<li><strong>Lateral Movement:</strong> Using the compromised Data Domain OS, the attacker can pivot to other systems within the network leveraging the credentials obtained or the trust relationships established.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, which may include data exfiltration, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage to organizations utilizing Dell PowerProtect Data Domain OS. This could include data loss due to corruption or deletion, financial losses from service disruption, reputational damage, and legal repercussions from the disclosure of sensitive information. The absence of specific victim counts or sector targeting makes quantifying the impact difficult, but the potential for widespread disruption and data compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Dell&rsquo;s security advisories and apply the necessary patches to address the vulnerabilities in PowerProtect Data Domain OS as soon as they become available.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Data Domain OS on other systems.</li>
<li>Enable logging on Dell PowerProtect Data Domain OS, including process creation and network connection logs, to detect potential exploitation attempts and investigate suspicious activity, allowing the deployment of the Sigma rules below.</li>
<li>Monitor for unauthorized access attempts to Dell PowerProtect Data Domain OS through webserver logs, specifically looking for suspicious cs-uri-query strings (see rule &ldquo;Detect Web Request for Potential Dell PowerProtect Exploit&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dell</category><category>powerprotect</category><category>datadomain</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category><category>credential-access</category><category>impact</category></item><item><title>Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-intel-firmware-vulns/</link><pubDate>Tue, 21 Apr 2026 08:04:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-intel-firmware-vulns/</guid><description>A local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within Intel IPU and UEFI reference firmware that could be exploited by a local attacker. The specific versions affected and the exact nature of the vulnerabilities are not detailed in this advisory. However, successful exploitation could lead to the disclosure of sensitive information or the escalation of privileges on the targeted system. Defenders should monitor systems for suspicious local activity that could indicate exploitation of these firmware vulnerabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a system running vulnerable Intel firmware (IPU or UEFI Reference Firmware).</li>
<li>Attacker executes a specially crafted program designed to interact with the vulnerable firmware components.</li>
<li>The crafted program leverages a vulnerability to bypass security checks or access control mechanisms within the firmware.</li>
<li>The vulnerability allows the attacker to read memory regions containing sensitive information, such as credentials or cryptographic keys.</li>
<li>Alternatively, the attacker uses the vulnerability to modify firmware settings or inject malicious code into the firmware execution path.</li>
<li>Modified firmware grants the attacker elevated privileges within the system, potentially allowing them to bypass operating system security controls.</li>
<li>The attacker leverages the elevated privileges to access sensitive files, install malware, or perform other malicious activities.</li>
<li>Attacker maintains persistence by exploiting the firmware vulnerabilities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow a local attacker to gain complete control over the affected system. This could result in the theft of sensitive data, the installation of persistent malware, or the disruption of system operations. Since the vulnerable components are low-level firmware, the impact is significant, as it can bypass most operating system security measures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for unusual or unsigned binaries attempting to access memory regions typically reserved for firmware components (covered by the process creation rule below).</li>
<li>Investigate any suspicious modifications to UEFI settings or firmware configurations.</li>
<li>Regularly update firmware to the latest versions provided by the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>intel</category><category>firmware</category><category>vulnerability</category><category>privilege-escalation</category><category>credential-access</category></item><item><title>Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-crosschex-vuln/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-crosschex-vuln/</guid><description>Anviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.</description><content:encoded><![CDATA[<p>Anviz CrossChex Standard is susceptible to a critical vulnerability (CVE-2026-32650) where an attacker can manipulate the TDS7 PreLogin process. By exploiting this flaw, an attacker can disable encryption mechanisms, causing sensitive database credentials to be transmitted in plaintext. This exposure enables unauthorized access to the underlying database, potentially leading to data breaches, modification of records, or other malicious activities. The vulnerability was disclosed in April 2026 and poses a significant risk to organizations utilizing the affected Anviz CrossChex Standard software. The vulnerability exists because the application allows for a downgrade to a less secure algorithm during negotiation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Anviz CrossChex Standard instance exposed to network access.</li>
<li>The attacker initiates a connection to the TDS7 PreLogin port.</li>
<li>The attacker crafts a malicious TDS7 PreLogin packet to negotiate a connection without encryption.</li>
<li>The CrossChex Standard software, due to the vulnerability, accepts the unencrypted connection.</li>
<li>The software transmits database credentials in plaintext over the unencrypted channel.</li>
<li>The attacker intercepts the plaintext database credentials.</li>
<li>The attacker uses the obtained credentials to authenticate directly to the database server.</li>
<li>The attacker gains unauthorized access to the CrossChex Standard database, enabling them to read, modify, or delete sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32650 allows unauthorized access to the Anviz CrossChex Standard database. This can lead to the exposure of sensitive employee data, including personal information and access control details. Depending on the database permissions, an attacker could also modify time and attendance records, manipulate user accounts, or even compromise the entire physical access control system managed by CrossChex Standard. The impact could range from privacy violations to significant security breaches affecting physical premises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for Anviz CrossChex Standard as provided by the vendor to remediate CVE-2026-32650.</li>
<li>Monitor network traffic for connections to the TDS7 PreLogin port that do not negotiate encryption using the provided network connection Sigma rule.</li>
<li>Restrict network access to the TDS7 PreLogin port only to trusted hosts and networks using firewall rules to mitigate the risk of unauthorized access.</li>
<li>Enable logging on the database server and monitor for successful logins from unusual IP addresses or accounts after applying the network connection Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32650</category><category>credential-access</category><category>database</category></item><item><title>Git for Windows NTLM Hash Leak Vulnerability (CVE-2026-32631)</title><link>https://feed.craftedsignal.io/briefs/2026-04-git-ntlm-hash-leak/</link><pubDate>Wed, 15 Apr 2026 18:17:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-git-ntlm-hash-leak/</guid><description>Git for Windows versions prior to 2.53.0.windows.3 are vulnerable to NTLM hash theft by attackers who can trick users into cloning malicious repositories or checking out malicious branches, leading to potential credential compromise.</description><content:encoded><![CDATA[<p>Git for Windows versions before 2.53.0.windows.3 are susceptible to a vulnerability (CVE-2026-32631) that exposes users&rsquo; NTLM hashes to malicious actors. This occurs when a user interacts with a specially crafted Git repository or branch hosted on an attacker-controlled server. The vulnerability stems from the lack of sufficient protections against unauthorized NTLM authentication requests during Git operations. The attack doesn&rsquo;t require user interaction beyond the initial clone or checkout. Successful exploitation allows attackers to capture NTLMv2 hashes, which, while computationally expensive, can be brute-forced to recover user credentials. This vulnerability was patched in Git for Windows version 2.53.0.windows.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sets up a malicious Git repository on a server under their control. This repository contains a Git configuration that triggers an NTLM authentication request to the attacker&rsquo;s server.</li>
<li>The attacker crafts a social engineering campaign to entice the victim to clone the malicious repository using the <code>git clone</code> command.</li>
<li>Alternatively, the attacker compromises an existing Git repository and adds a malicious branch. The victim is then tricked into checking out this branch using <code>git checkout</code>.</li>
<li>When the victim clones the repository or checks out the malicious branch, Git for Windows attempts to authenticate with the attacker&rsquo;s server using the NTLM protocol.</li>
<li>The victim&rsquo;s NTLMv2 hash is sent to the attacker&rsquo;s server during the NTLM authentication handshake.</li>
<li>The attacker captures the NTLMv2 hash from the authentication traffic.</li>
<li>The attacker initiates an offline brute-force attack against the captured NTLMv2 hash.</li>
<li>Upon successful brute-forcing, the attacker recovers the victim&rsquo;s credentials and can use them to access other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32631 allows attackers to steal user credentials. The impact includes unauthorized access to sensitive data, systems, and applications accessible with the compromised credentials. The number of potential victims is directly related to the number of users running vulnerable versions of Git for Windows who interact with malicious repositories or branches. Targeted sectors are broad, encompassing any organization using Git for Windows for software development and version control.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Git for Windows to version 2.53.0.windows.3 or later to remediate CVE-2026-32631.</li>
<li>Implement network monitoring to detect NTLM authentication attempts originating from Git processes to unusual or external destinations.</li>
<li>Deploy the Sigma rule &ldquo;Detect Git Process Spawning Cmd with /c net use&rdquo; to detect potential NTLM authentication attempts and adjust it to monitor outbound network connections from <code>git.exe</code> using NTLM.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>credential-access</category><category>windows</category><category>git</category></item><item><title>Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)</title><link>https://feed.craftedsignal.io/briefs/2026-04-splunk-mcp-credential-access/</link><pubDate>Wed, 15 Apr 2026 16:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-splunk-mcp-credential-access/</guid><description>A user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.</description><content:encoded><![CDATA[<p>CVE-2026-20205 affects Splunk MCP Server app versions prior to 1.0.3. The vulnerability allows a low-privileged user with access to the <code>_internal</code> index or the <code>mcp_tool_admin</code> capability to view sensitive information in cleartext. This information includes user session and authorization tokens. Successful exploitation of this vulnerability requires either local access to the log files where the tokens are stored or administrative access to Splunk&rsquo;s internal indexes. The default configuration limits access to the <code>_internal</code> index to the administrator role; however, if roles are misconfigured, less privileged users could gain unauthorized access. This vulnerability could lead to account compromise and lateral movement within the affected Splunk environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to a Splunk account with permissions to the <code>_internal</code> index or possesses the <code>mcp_tool_admin</code> capability.</li>
<li>The attacker accesses the <code>_internal</code> index through the Splunk web interface or directly via file system access (if local access is available).</li>
<li>The attacker searches the <code>_internal</code> index for logs related to MCP Server activity.</li>
<li>The attacker identifies log entries containing user session tokens and authorization tokens.</li>
<li>The attacker extracts the cleartext tokens from the log entries.</li>
<li>The attacker uses the stolen session tokens to impersonate legitimate users.</li>
<li>The attacker leverages the impersonated user&rsquo;s privileges to access sensitive data or perform unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20205 allows an attacker to obtain user session and authorization tokens in cleartext. This compromises the confidentiality and integrity of the Splunk environment. An attacker could impersonate legitimate users, escalate privileges, and gain unauthorized access to sensitive data. The number of potential victims depends on the number of Splunk users and the extent of the misconfiguration. Sectors that heavily rely on Splunk for security monitoring, such as finance, healthcare, and government, are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Splunk MCP Server app to version 1.0.3 or later to remediate CVE-2026-20205.</li>
<li>Review and restrict access to the <code>_internal</code> index to administrator-level roles only, following Splunk&rsquo;s documentation on <a href="https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities">defining roles</a>.</li>
<li>Monitor Splunk audit logs for unusual access patterns to the <code>_internal</code> index using the Sigma rule <code>Splunk Unusual Internal Index Access</code>.</li>
<li>Review and restrict the <code>mcp_tool_admin</code> capability to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>splunk</category><category>credential-access</category><category>vulnerability</category></item><item><title>Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-lms-weak-password-reset/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-lms-weak-password-reset/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.</description><content:encoded><![CDATA[<p>Chamilo LMS, a widely used learning management system, is susceptible to a critical vulnerability (CVE-2026-33707) affecting versions prior to 1.11.38 and 2.0.0-RC.3. The vulnerability lies within the default password reset mechanism, which generates password reset tokens by applying SHA1 hashing directly to user email addresses. This flawed process lacks essential security measures, including the addition of random salts, token expiration, and rate limiting. An attacker who obtains a target user&rsquo;s email address can calculate the password reset token and gain unauthorized access to the user&rsquo;s account, bypassing authentication controls. The vulnerability was publicly disclosed in April 2026 and patched in versions 1.11.38 and 2.0.0-RC.3. Organizations using vulnerable versions of Chamilo LMS are at high risk of account compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a valid email address associated with a Chamilo LMS user. This information may be obtained through OSINT or data breaches.</li>
<li>The attacker navigates to the password reset page of the Chamilo LMS instance.</li>
<li>The attacker enters the victim&rsquo;s email address into the password reset form.</li>
<li>The system generates a password reset token by applying SHA1 to the victim&rsquo;s email address without any salt or random component.</li>
<li>The attacker computes the SHA1 hash of the victim&rsquo;s email address offline.</li>
<li>The attacker uses the computed SHA1 hash as the password reset token in a crafted request to the password reset confirmation endpoint.</li>
<li>The Chamilo LMS instance validates the attacker-supplied token against the SHA1 hash of the email.</li>
<li>The attacker sets a new password for the victim&rsquo;s account and gains full access to the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33707 allows an attacker to take complete control of user accounts within the Chamilo LMS platform. This can lead to data breaches, modification of course content, disruption of educational activities, and potential reputational damage for the affected institution. The lack of rate limiting on password reset requests can allow for automated account takeover attempts affecting many users. Given the widespread use of Chamilo LMS in educational institutions and organizations globally, the potential impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Chamilo LMS installations to version 1.11.38 or 2.0.0-RC.3 to remediate CVE-2026-33707.</li>
<li>Implement rate limiting on password reset requests to mitigate automated attacks attempting to exploit this vulnerability (reference: Overview section).</li>
<li>Deploy the Sigma rules below to detect attempts to exploit this vulnerability by monitoring password reset requests (reference: rules section).</li>
<li>Monitor web server logs for suspicious password reset requests originating from unusual IPs or with unusually high frequency (reference: rules logsource).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-33707</category><category>chamilo</category><category>lms</category><category>password-reset</category><category>credential-access</category></item><item><title>Multiple Cloud Secrets Accessed by Single Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-02-multi-cloud-secrets-access/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-multi-cloud-secrets-access/</guid><description>A single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of potential credential compromise and abuse in multi-cloud environments. The core issue is the observation of a single source IP address accessing secret stores across multiple cloud providers (AWS Secrets Manager, Google Secret Manager, Azure Key Vault) and Kubernetes clusters within a short timeframe. This behavior, detected by the Elastic rule &ldquo;Multiple Cloud Secrets Accessed by Source Address&rdquo; published on 2026-04-10, is indicative of an adversary attempting to harvest secrets using stolen credentials, hijacked sessions, or replayed tokens. The rule is designed to identify anomalous cross-cloud secret retrieval, which is uncommon in legitimate multi-cloud orchestration scenarios. Defenders need to identify the source IP, the accessed secrets, and potential compromise scope to mitigate the threat effectively.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Adversary gains access to valid credentials or session tokens through various means like phishing, malware, or exposed credentials. (T1555, T1566)</li>
<li><strong>Authentication:</strong> Adversary uses the compromised credentials or tokens to authenticate to one of the cloud provider&rsquo;s API (AWS, Azure, GCP).</li>
<li><strong>Discovery (AWS):</strong> The adversary leverages the AWS CLI or API to enumerate available secrets stored in AWS Secrets Manager using <code>GetSecretValue</code> API calls.</li>
<li><strong>Discovery (Azure):</strong> The adversary uses compromised credentials to interact with Azure Key Vault, utilizing <code>SecretGet</code> or <code>KeyGet</code> actions to discover accessible secrets.</li>
<li><strong>Discovery (GCP):</strong> The adversary uses compromised service account or user credentials to access Google Secret Manager and enumerate accessible secrets using <code>google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion</code> or <code>google.cloud.secretmanager.v1.SecretManagerService.GetSecretRequest</code>.</li>
<li><strong>Discovery (Kubernetes):</strong> The adversary uses compromised credentials to access the Kubernetes API and enumerate secrets within the cluster, specifically targeting the <code>secrets</code> resource with <code>get</code> or <code>list</code> verbs.</li>
<li><strong>Credential Access:</strong> The adversary retrieves the secret values from each cloud provider and Kubernetes cluster. (T1555.006)</li>
<li><strong>Exfiltration/Lateral Movement:</strong> The adversary exfiltrates the retrieved secrets for further malicious activities, such as lateral movement within the cloud environments or unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including API keys, database passwords, and encryption keys. This could result in unauthorized access to critical systems and data, potentially leading to data breaches, financial loss, and reputational damage. The impact is amplified in multi-cloud environments as the adversary can leverage the compromised secrets to move laterally between different cloud providers, increasing the scope and severity of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Multiple Cloud Secrets Accessed by Source Address&rdquo; to your SIEM to detect this activity across your cloud environments. Enable required logging: GCP Audit DATA_READ for Secret Manager API, Azure Key Vault Diagnostic Logging, and AWS CloudTrail for Secrets Manager.</li>
<li>Investigate any alerts triggered by the Sigma rule by validating the principal (user, service account) and reviewing related activity (authentication, privilege escalation). Check application context, user agent, and IP reputation as detailed in the rule&rsquo;s triage steps.</li>
<li>Restrict or disable affected credentials or service accounts and rotate all accessed secrets if the activity is unauthorized or suspicious, as described in the rule&rsquo;s Response and Remediation steps.</li>
<li>Harden identity security by enforcing MFA, reducing permissions to least privilege, and reviewing trust relationships. Audit visibility should be improved by ensuring logging is enabled across all cloud environments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>kubernetes</category></item><item><title>Azure Service Principal Sign-In Followed by Arc Cluster Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-11-24-azure-arc-credential-access/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-24-azure-arc-credential-access/</guid><description>Detects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.</description><content:encoded><![CDATA[<p>This detection identifies a specific attack sequence targeting Azure Arc-connected Kubernetes clusters. It focuses on the scenario where a service principal authenticates to Microsoft Entra ID and subsequently requests credentials for an Azure Arc-connected Kubernetes cluster. The <code>listClusterUserCredential</code> action is used to retrieve tokens that enable kubectl access through the Arc Cluster Connect proxy. This sequence is particularly concerning when the service principal authenticates externally and immediately accesses Arc cluster credentials, especially from unexpected locations or Autonomous System Numbers (ASNs). This behavior, observed in attacks like those described by IBM X-Force in 2025, can lead to attackers gaining unauthorized access to and control over Kubernetes clusters. Defenders should investigate such events, particularly when the sign-in originates from an unexpected location or ASN.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains unauthorized access to a service principal&rsquo;s credentials (e.g., through credential stuffing, phishing, or exposed secrets).</li>
<li><strong>Service Principal Authentication:</strong> The attacker uses the compromised service principal credentials to authenticate to Microsoft Entra ID (Azure AD) using the <code>ServicePrincipalSignInLogs</code>.</li>
<li><strong>Credential Listing Request:</strong> Immediately following successful authentication, the attacker leverages the service principal to initiate a request to list the cluster user credentials for an Azure Arc-connected Kubernetes cluster, triggering the <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code> in the Activity Logs.</li>
<li><strong>Credential Retrieval:</strong> The attacker retrieves the Arc cluster credentials.</li>
<li><strong>Proxy Tunnel Establishment:</strong> The attacker uses the retrieved credentials to establish a proxy tunnel into the Kubernetes cluster via the Arc Cluster Connect proxy.</li>
<li><strong>Kubernetes Access:</strong> With the tunnel established, the attacker can now execute kubectl commands, perform unauthorized actions within the cluster, such as creating, reading, updating, and deleting (CRUD) secrets and configmaps.</li>
<li><strong>Lateral Movement &amp; Privilege Escalation:</strong> The attacker exploits vulnerabilities or misconfigurations within the Kubernetes cluster to move laterally to other resources, escalate privileges, and gain further control.</li>
<li><strong>Data Exfiltration or Ransomware Deployment:</strong> The attacker exfiltrates sensitive data from the Kubernetes cluster or deploys ransomware to encrypt critical data, impacting business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this attack chain can lead to complete compromise of Azure Arc-connected Kubernetes clusters. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and potentially deploy ransomware. The IBM X-Force team has documented cases of attackers using similar techniques for hybrid escalation and persistence. This can impact organizations across all sectors utilizing Azure Arc for managing Kubernetes clusters, potentially affecting dozens or hundreds of clusters per victim organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect the sequence of service principal sign-in followed by Arc cluster credential access.</li>
<li>Review Azure AD Audit Logs for recent changes to service principals, focusing on new credentials, federated identities, and owner changes, based on the investigation steps outlined in the rule&rsquo;s note.</li>
<li>Enable conditional access policies to restrict service principal authentication by location to prevent logins from unexpected regions, as suggested in the rule&rsquo;s note.</li>
<li>Monitor Azure Activity Logs for <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code> events to identify potential unauthorized access attempts.</li>
<li>Rotate service principal credentials regularly and revoke active sessions and tokens for the SP as outlined in the rule&rsquo;s response and remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>azure</category><category>azure-arc</category><category>credential-access</category><category>initial-access</category></item><item><title>Google Chrome Device Bound Session Credentials (DBSC) Mitigates Cookie Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-cookie-protection/</link><pubDate>Fri, 10 Apr 2026 07:50:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-cookie-protection/</guid><description>Google's rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, with a future release planned for macOS, cryptographically binds authentication sessions to the user's device, rendering stolen session cookies unusable and mitigating credential access.</description><content:encoded><![CDATA[<p>Google has introduced Device Bound Session Credentials (DBSC) in Chrome 146 for Windows to combat session cookie theft, with a macOS version planned for a future release. This feature, initially announced in April 2024, aims to protect user accounts from compromise by rendering stolen authentication cookies useless. Session cookies are often stolen using information-stealing malware and traded on cybercrime platforms, allowing attackers to access accounts without passwords. DBSC mitigates this threat by cryptographically binding authentication sessions to the user&rsquo;s device, leveraging hardware-backed security modules to generate unique public/private key pairs. This ensures that even if cookies are exfiltrated, they quickly expire and become unusable, enhancing overall security for Chrome users. Websites can adopt DBSC via registration and refresh endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker deploys information-stealing malware on a victim&rsquo;s Windows or macOS system.</li>
<li>The malware gains access to the browser&rsquo;s local files and memory, where authentication cookies are stored.</li>
<li>The malware exfiltrates the stolen session cookies to a command-and-control server.</li>
<li>The attacker attempts to use the stolen session cookies to access the victim&rsquo;s accounts on various web platforms.</li>
<li>If DBSC is not implemented, the attacker successfully gains unauthorized access to the user&rsquo;s accounts.</li>
<li>If DBSC is implemented, Chrome checks for device-bound credentials.</li>
<li>The web server requires proof of possession of the private key associated with the session. Since the attacker lacks this key, the exfiltrated cookies are useless.</li>
<li>The attacker&rsquo;s attempt to access the account is blocked, preventing unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of stolen session cookies can lead to unauthorized access to user accounts across various platforms, potentially resulting in data breaches, financial loss, and reputational damage. While the article does not cite specific victim counts or sectors affected, the widespread use of Chrome and the prevalence of cookie-stealing malware makes this a significant threat. The implementation of DBSC aims to significantly reduce the risk of account compromise via stolen cookies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Detection engineers should familiarize themselves with the concept and deployment of Device Bound Session Credentials (DBSC) to understand its impact on existing detection strategies.</li>
<li>Monitor for the presence of information-stealing malware that targets browser cookie storage locations using <code>file_event</code> and <code>process_creation</code> log sources.</li>
<li>Consider deploying the Sigma rule to detect anomalous processes accessing browser cookie storage locations to identify potential cookie theft attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cookie-theft</category><category>credential-access</category><category>chrome</category></item><item><title>LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-litellm-auth-bypass/</link><pubDate>Wed, 08 Apr 2026 00:04:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-litellm-auth-bypass/</guid><description>LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.</description><content:encoded><![CDATA[<p>LiteLLM versions prior to 1.83.0 are vulnerable to an authentication bypass vulnerability. User passwords are stored as unsalted SHA-256 hashes, a weak cryptographic practice that makes them susceptible to rainbow table attacks. Furthermore, these password hashes are exposed through several API endpoints, including <code>/user/info</code>, <code>/user/update</code>, and <code>/spend/users</code>, allowing any authenticated user to retrieve them. The <code>/v2/login</code> endpoint also accepts the raw SHA-256 hash as a valid password without proper re-hashing. This combination of vulnerabilities allows an attacker with low-level access to escalate privileges by obtaining another user&rsquo;s password hash and using it to directly log in as that user. Defenders should upgrade to version 1.83.0 or later to mitigate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to LiteLLM and authenticates as a low-privilege user.</li>
<li>Attacker sends a request to <code>/user/info</code> to retrieve the password hash of another user.</li>
<li>The API responds with the target user&rsquo;s SHA-256 password hash.</li>
<li>Attacker sends a POST request to the <code>/v2/login</code> endpoint using the stolen SHA-256 hash as the password.</li>
<li>The <code>/v2/login</code> endpoint accepts the raw SHA-256 hash without re-hashing.</li>
<li>The server authenticates the attacker as the target user.</li>
<li>Attacker now has the privileges of the target user, potentially gaining access to sensitive data or administrative functions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to unauthorized access and privilege escalation within the LiteLLM application. An attacker can impersonate other users, including administrators, potentially leading to data breaches, system compromise, and unauthorized modifications. The number of victims depends on the deployment size, but any LiteLLM instance running a version prior to 1.83.0 is vulnerable. Sectors utilizing LiteLLM are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.83.0 or later to patch the vulnerability (reference: Patches section).</li>
<li>Deploy the Sigma rule &ldquo;Detect LiteLLM User Info Hash Access&rdquo; to monitor for unauthorized access to user password hashes via the <code>/user/info</code> endpoint (reference: rule: &ldquo;Detect LiteLLM User Info Hash Access&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect LiteLLM Login with SHA256 Hash&rdquo; to detect login attempts using SHA256 hashes (reference: rule: &ldquo;Detect LiteLLM Login with SHA256 Hash&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>litellm</category><category>authentication-bypass</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts</title><link>https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</link><pubDate>Mon, 06 Apr 2026 14:37:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</guid><description>This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.</description><content:encoded><![CDATA[<p>This detection rule, published by Elastic, is designed to correlate AWS security alerts and prioritize investigations related to potentially compromised IAM access keys. Specifically, it focuses on scenarios where a long-term IAM access key is observed originating from a new source IP address (detected by the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule, rule ID 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) and is also associated with other open alerts of medium, high, or critical severity. This correlation aims to surface instances where a newly exposed or compromised access key is actively being used for malicious activities, enabling security teams to respond more effectively to potential credential access incidents and initial access attempts. The rule is a higher-order rule that analyzes existing security alerts within an Elastic Security deployment and leverages the <code>kibana.alert</code> fields to identify related events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a valid AWS IAM Long-Term Access Key. This could be through phishing, credential stuffing, or exposed credentials in source code.</li>
<li>The attacker uses the compromised access key to interact with AWS services from a new and previously unseen IP address. This triggers the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule ID: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f).</li>
<li>The attacker leverages the compromised credentials to perform reconnaissance activities within the AWS environment, such as listing resources or querying IAM configurations.</li>
<li>The attacker attempts to escalate privileges by exploiting misconfigurations or vulnerabilities in IAM policies.</li>
<li>The attacker performs actions indicating lateral movement within the AWS environment, such as accessing or modifying resources in different AWS accounts.</li>
<li>The attacker compromises additional AWS resources or services, such as EC2 instances or S3 buckets. These activities trigger medium, high, or critical severity alerts.</li>
<li>The correlation rule identifies the co-occurrence of the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; alert and other elevated severity alerts associated with the same access key ID.</li>
<li>The security team investigates the correlated alerts and takes appropriate remediation steps, such as rotating the compromised access key and reviewing IAM policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging compromised AWS IAM credentials can lead to significant data breaches, service disruption, and financial losses. Attackers can gain unauthorized access to sensitive data stored in S3 buckets, compromise EC2 instances, and disrupt critical AWS services. The correlation rule aims to reduce the dwell time of attackers by prioritizing the investigation of compromised credentials associated with ongoing malicious activity. This can prevent attackers from further escalating their attacks and minimizing the overall impact of the breach. Failure to detect and respond to these attacks can result in regulatory fines, reputational damage, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts&rdquo; rule (rule ID 98cfaa44-83f0-4aba-90c4-363fb9d51a75) in your Elastic Security environment to identify potentially compromised IAM access keys.</li>
<li>Investigate alerts triggered by the rule by pivoting on the <code>aws.cloudtrail.user_identity.access_key_id</code> in CloudTrail and IAM to understand the context of the access key usage.</li>
<li>Review the sibling alerts identified by the rule using <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_id_values</code> to understand the scope and impact of the potential compromise.</li>
<li>Configure your Elastic Security deployment to properly map risk scores to severity levels, ensuring that <code>kibana.alert.risk_score &gt;= 47</code> corresponds to medium or higher severity alerts.</li>
<li>Rotate or disable any IAM access keys identified as compromised by the rule to prevent further unauthorized access.</li>
<li>Enable AWS CloudTrail logging to capture detailed information about API calls made within your AWS environment, providing valuable context for investigating security alerts.</li>
<li>Implement the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule_id: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) if not already enabled, as it is a pre-requisite for this correlation rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>credential-access</category><category>initial-access</category></item><item><title>Kubernetes Secret Access via Unusual User Agent</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</link><pubDate>Mon, 06 Apr 2026 12:05:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubernetes-secret-access/</guid><description>Detects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where Kubernetes secrets are accessed through atypical means, specifically flagging requests originating from unusual user agents, usernames, or source IPs. The underlying assumption is that after compromising a pod or stealing a kubeconfig file, adversaries often attempt to harvest sensitive information stored as secrets within the Kubernetes cluster. This includes service account tokens, registry credentials, cloud keys, and other critical data. This activity can lead to privilege escalation and lateral movement within the cluster or the wider cloud environment. The rule focuses on identifying deviations from established access patterns to Kubernetes secrets to detect potentially malicious activity. The rule leverages data from kubernetes.audit_logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to the Kubernetes cluster, potentially by exploiting a vulnerability in a pod or by stealing a kubeconfig file.</li>
<li><strong>Discovery:</strong> The attacker enumerates available resources within the cluster to identify potential targets, including secrets. This might involve using <code>kubectl get secrets --all-namespaces</code>.</li>
<li><strong>Credential Theft:</strong> The attacker attempts to access Kubernetes secrets using an unusual user agent, source IP, or user name. For example, using <code>curl</code> from a compromised pod to access the Kubernetes API.</li>
<li><strong>Data Exfiltration:</strong> The attacker retrieves the contents of the secrets. Secrets might contain service account tokens, registry credentials, cloud IAM keys, database passwords, etc.</li>
<li><strong>Lateral Movement:</strong> With stolen credentials, the attacker attempts to move laterally within the cluster or the connected cloud environment. They might use the credentials to access other pods, services, or cloud resources.</li>
<li><strong>Privilege Escalation:</strong> The attacker uses the stolen credentials to escalate their privileges within the Kubernetes cluster or the cloud environment. For example, creating new roles or role bindings.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating backdoors or modifying existing deployments. This might involve creating new pods or modifying existing deployments.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data theft, denial of service, or infrastructure compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive data stored within Kubernetes secrets. This could include database credentials, API keys, and service account tokens. The impact can range from unauthorized access to sensitive data, to complete compromise of the Kubernetes cluster and the connected cloud environment. This can affect any organization using Kubernetes to manage their applications, potentially leading to data breaches, service disruptions, and financial losses. The severity depends on the sensitivity of the data stored in the compromised secrets and the level of access the attacker gains.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secret Access via Unusual User Agent</code> to your SIEM and tune for your environment to detect unusual access patterns to Kubernetes secrets.</li>
<li>Investigate and validate any alerts generated by the deployed Sigma rule, focusing on the requesting identity, source IP, and user agent to confirm whether they align with approved access records.</li>
<li>Implement RBAC least privilege to limit access to secrets to only the required service accounts and users to minimize the potential impact of credential theft.</li>
<li>Monitor Kubernetes audit logs (<code>logs-kubernetes.audit_logs-*</code>) for suspicious activity, including unusual API calls and access patterns to sensitive resources.</li>
<li>Regularly rotate secrets and credentials to minimize the window of opportunity for attackers to use stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Directus Aggregate Query Vulnerability Allows Disclosure of Concealed Data</title><link>https://feed.craftedsignal.io/briefs/2026-04-directus-aggregate-disclosure/</link><pubDate>Sat, 04 Apr 2026 06:13:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-directus-aggregate-disclosure/</guid><description>A vulnerability in Directus versions prior to 11.17.0 allows authenticated users to extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users, via aggregate queries.</description><content:encoded><![CDATA[<p>Directus versions prior to 11.17.0 contain a vulnerability where aggregate functions, such as <code>min</code> and <code>max</code>, when applied to fields with the <code>conceal</code> special type, incorrectly return raw database values instead of the masked placeholder. This affects authenticated users who have read access to the affected collection, enabling them to extract concealed field values via <code>groupBy</code> aggregate queries.  This vulnerability allows for the extraction of sensitive information, such as static API tokens and two-factor authentication secrets stored in <code>directus_users</code>, enabling account takeovers and 2FA bypass. The vulnerability was reported on April 4, 2026, and is identified as CVE-2026-35442. Defenders should prioritize upgrading Directus instances to version 11.17.0 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a vulnerable Directus instance with valid user credentials.</li>
<li>Attacker identifies a collection containing fields with the <code>conceal</code> special type, such as <code>directus_users</code>.</li>
<li>Attacker crafts an aggregate query using functions like <code>min</code> or <code>max</code> on the concealed field and includes a <code>groupBy</code> clause. Example: <code>SELECT min(secret_field) FROM collection GROUP BY other_field</code>.</li>
<li>The Directus server processes the aggregate query but fails to properly apply the masking logic to the nested results.</li>
<li>The server returns the raw, unmasked values of the concealed field in the aggregate query response.</li>
<li>The attacker extracts static API tokens and TOTP seeds from the returned data.</li>
<li>Attacker uses the extracted API tokens to authenticate as other users, including administrators, bypassing username/password requirements.</li>
<li>Attacker uses the extracted TOTP seeds to bypass two-factor authentication for other users, gaining unauthorized access to their accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete account takeover, including administrative accounts. Two-factor authentication mechanisms can be bypassed, invalidating this security control. The number of affected organizations depends on the adoption rate of Directus, but all instances running versions prior to 11.17.0 are vulnerable. If the attack succeeds, attackers gain full control over the Directus instance and associated data, potentially leading to data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Directus to version 11.17.0 or later to patch the vulnerability (CVE-2026-35442).</li>
<li>Implement a Web Application Firewall (WAF) rule to detect and block aggregate queries targeting concealed fields in sensitive collections. See the Sigma rule example for guidance.</li>
<li>Monitor Directus application logs for unusual aggregate query patterns, especially those involving <code>groupBy</code> and functions like <code>min</code> or <code>max</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>directus</category><category>vulnerability</category><category>credential-access</category><category>api-token</category><category>2fa-bypass</category></item><item><title>Spike in Successful Logon Events from a Source IP</title><link>https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</link><pubDate>Thu, 02 Apr 2026 13:25:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</guid><description>A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.</description><content:encoded><![CDATA[<p>This alert triggers when an Elastic machine learning job identifies a significant spike in successful authentication events originating from a specific source IP address. The underlying cause may range from legitimate administrative activity to malicious attempts at credential compromise, such as password spraying, user enumeration, or brute force attacks. The rule requires a minimum Elastic Stack version of 9.4.0 and relies on data ingested via Elastic Defend, Auditd Manager, or the System integration. The machine learning job associated with this rule is named &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo;. While build servers and CI systems can trigger this alert as false positives, its presence should always prompt investigation to rule out credential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a network or system (not explicitly described in source).</li>
<li>Credential Harvesting: The attacker attempts to gather valid credentials through password spraying or brute-force attacks (T1110, T1110.003).</li>
<li>Account Discovery: The attacker enumerates user accounts to identify potential targets, often performed in conjunction with password attacks.</li>
<li>Successful Authentication: Using compromised credentials, the attacker successfully authenticates to a system or service (T1078, T1078.002, T1078.003).</li>
<li>Lateral Movement: After successful authentication, the attacker potentially moves laterally within the network using valid accounts (not explicitly described in source).</li>
<li>Privilege Escalation: The attacker may attempt to escalate privileges to gain higher-level access (not explicitly described in source).</li>
<li>Data Exfiltration/Impact: After gaining sufficient access, the attacker may exfiltrate sensitive data or cause damage to the system or network (not explicitly described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and services. The number of affected users and the extent of the damage depend on the scope of the compromised credentials and the attacker&rsquo;s objectives. This can impact any sector, as credential compromise is a common attack vector across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and configure the Elastic Defend, Auditd Manager, or System integrations to provide the necessary data for the machine learning job (see Setup section).</li>
<li>Install the associated Machine Learning job &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo; to enable the detection (see Setup section).</li>
<li>Tune the anomaly threshold of the machine learning job based on your environment to reduce false positives (anomaly_threshold metadata).</li>
<li>Investigate alerts triggered by this rule, focusing on identifying the involved assets, users, and source IP addresses (see Note section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>brute-force</category><category>password-spraying</category></item><item><title>Kerberos Authentication Relay via DNS CNAME Abuse (CVE-2026-20929)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kerberos-relay-cname/</link><pubDate>Tue, 31 Mar 2026 17:49:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kerberos-relay-cname/</guid><description>An attacker exploits CVE-2026-20929 by manipulating DNS responses to redirect Kerberos authentication to attacker-controlled AD CS, enabling certificate enrollment for persistent access.</description><content:encoded><![CDATA[<p>CVE-2026-20929, a vulnerability patched in January 2026, allows attackers to perform Kerberos authentication relay attacks by abusing DNS CNAME records. The attack involves manipulating DNS resolution to redirect a client&rsquo;s Kerberos authentication request to an attacker-controlled server. This server then relays the authentication to Active Directory Certificate Services (AD CS) to enroll certificates on behalf of the victim user. This technique allows the attacker to gain persistent access to the domain. The vulnerability has a CVSS score of 7.5. This attack is a Kerberos-based variant of the ESC8 attack, which traditionally relies on NTLM relay. By exploiting Kerberos, the attack can bypass environments where NTLM has been disabled. The primary target is the AD CS web enrollment endpoint (/certsrv).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim attempts to access a web server (e.g., web01.test.local).</li>
<li>A DNS query is initiated to resolve the hostname of the target web server.</li>
<li>The attacker intercepts the DNS query and responds with a crafted DNS response containing a CNAME record that redirects the original hostname (web01.test.local) to an attacker-controlled target (e.g., CA01.test.local), along with an A record pointing to the attacker&rsquo;s IP address.</li>
<li>The victim&rsquo;s system accesses the attacker-controlled web server.</li>
<li>The malicious web server sends a 401 HTTP response to initiate Kerberos authentication.</li>
<li>The victim requests a Kerberos service ticket for HTTP/CA01.test.local from the domain controller.</li>
<li>The domain controller issues a service ticket for the requested SPN.</li>
<li>The attacker relays the Kerberos ticket to the AD CS web enrollment endpoint (/certsrv) to request a certificate for the victim user, thereby achieving persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20929 allows an attacker to enroll certificates on behalf of domain users, granting them persistent access to the network. Certificates are often valid for extended periods (1+ years) and are less frequently monitored than password-based authentication. This attack can bypass controls that disable NTLM authentication, and web enrollment over HTTP prevents Channel Binding Token (CBT) protection, making AD CS web enrollment an attractive relay target. The number of potential victims depends on the number of vulnerable AD CS deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for anomalous certificate-based authentication events combined with unusual AD CS service access within a short time window, as highlighted in the &ldquo;CrowdStrike has developed a correlation-based detection&rdquo; statement in the overview.</li>
<li>Disable web enrollment over HTTP to enforce Channel Binding Token (CBT) protection, mitigating the risk of successful relay attacks, as mentioned in the &ldquo;Why AD CS Web Enrollment Is an Attractive Relay Target&rdquo; section.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential exploitation attempts.</li>
<li>Review and harden AD CS configurations based on recommendations from &ldquo;Certified Pre-Owned&rdquo; research to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>kerberos</category><category>relay</category><category>adcs</category><category>cve-2026-20929</category><category>credential-access</category></item><item><title>ArthurFiorette steam-trader 2.1.1 Sensitive Information Exposure</title><link>https://feed.craftedsignal.io/briefs/2024-01-steam-trader-cve/</link><pubDate>Mon, 30 Mar 2026 10:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-steam-trader-cve/</guid><description>CVE-2026-5128 exposes sensitive Steam account data via the /users API endpoint and logs in ArthurFiorette steam-trader 2.1.1, allowing account takeover.</description><content:encoded>&lt;p>CVE-2026-5128 identifies a critical vulnerability in version 2.1.1 of the ArthurFiorette steam-trader application. This is a sensitive information exposure issue stemming from two main sources: direct access to the /users API endpoint and insecure logging practices. The vulnerable application, designed for managing Steam trading activities, inadvertently leaks highly sensitive user credentials. As the steam-trader repository is archived and no longer maintained, no patch is available, leaving…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5128</category><category>steam-trader</category><category>information-disclosure</category><category>credential-access</category><category>account-takeover</category></item><item><title>OpenClaw Credential Exposure via Leaked Pairing Codes</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-credential-exposure/</link><pubDate>Sun, 29 Mar 2026 13:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-credential-exposure/</guid><description>OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.</description><content:encoded><![CDATA[<p>OpenClaw versions before 2026.3.12 are vulnerable to credential exposure. The vulnerability stems from the embedding of long-lived shared gateway credentials directly into pairing setup codes. These codes are generated by the <code>/pair</code> endpoint and the <code>OpenClaw qr</code> command. An attacker who obtains these setup codes through various means, such as leaked chat histories, logs, or screenshots, can extract the embedded credentials. This allows the attacker to bypass the intended one-time pairing flow and gain unauthorized access to the shared gateway. The exposure of these credentials could lead to further unauthorized access and potential compromise of sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user generates a pairing setup code using the <code>/pair</code> endpoint or <code>OpenClaw qr</code> command. This code contains the embedded shared gateway credentials.</li>
<li>The setup code is shared with the intended recipient via chat, logs or screenshots.</li>
<li>The attacker gains access to the setup code through compromised chat history, exposed logs, or publicly shared screenshots.</li>
<li>The attacker extracts the long-lived shared gateway credential from the setup code.</li>
<li>The attacker reuses the stolen shared gateway credentials outside of the intended one-time pairing flow.</li>
<li>The attacker gains unauthorized access to the shared gateway.</li>
<li>The attacker leverages the access gained via the gateway for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass the intended one-time pairing flow and gain unauthorized access to the shared gateway. The number of potential victims is dependent on the number of OpenClaw deployments and the exposure of pairing setup codes. The primary impact is unauthorized access and potential compromise of sensitive data accessible through the shared gateway.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.12 or later to remediate the vulnerability (CVE-2026-33575).</li>
<li>Implement strict controls over the handling and storage of pairing setup codes to prevent unauthorized access.</li>
<li>Monitor network traffic for suspicious activity originating from OpenClaw gateways, potentially indicating unauthorized access using leaked credentials.</li>
<li>Deploy the Sigma rule to detect the usage of the <code>/pair</code> endpoint which could indicate unauthorized pairing attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>vulnerability</category><category>openclaw</category></item><item><title>OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-file-permissions/</link><pubDate>Sun, 29 Mar 2026 13:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-file-permissions/</guid><description>OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.</description><content:encoded>&lt;p>OpenClaw before version 2026.2.17 is vulnerable to an insufficient file permissions issue. The application creates session transcript JSONL files with overly permissive default access controls. This vulnerability allows local users to read these transcript files, potentially exposing sensitive information such as secrets, API keys, passwords, or other confidential data that might be present in tool outputs or commands executed during a session. The vulnerability is identified as CVE-2026-33572…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-33572</category><category>file-permissions</category><category>credential-access</category></item><item><title>Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)</title><link>https://feed.craftedsignal.io/briefs/2026-03-doveadm-timing-oracle/</link><pubDate>Fri, 27 Mar 2026 09:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-doveadm-timing-oracle/</guid><description>Doveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.</description><content:encoded>&lt;p>CVE-2026-27856 describes a vulnerability in Doveadm, a component often used in conjunction with mail servers such as Dovecot. The vulnerability stems from the direct comparison method used to verify credentials, making it susceptible to timing oracle attacks. This vulnerability was published on March 27, 2026. An attacker leveraging this flaw can potentially determine the configured credentials by observing the time it takes for the system to respond to different credential attempts. While no…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>timing oracle</category><category>credential access</category><category>doveadm</category></item><item><title>cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects</title><link>https://feed.craftedsignal.io/briefs/2026-03-cpp-httplib-credential-leak/</link><pubDate>Fri, 27 Mar 2026 01:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cpp-httplib-credential-leak/</guid><description>The cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.</description><content:encoded><![CDATA[<p>The cpp-httplib library, a C++11 single-file header-only cross platform HTTP/HTTPS library, contains a vulnerability (CVE-2026-33745) in versions prior to 0.39.0. This flaw allows an attacker to potentially steal sensitive credentials by exploiting the library&rsquo;s behavior when handling cross-origin HTTP redirects (301, 302, 307, 308). Specifically, stored Basic Auth, Bearer Token, and Digest Auth credentials are unintentionally forwarded to arbitrary hosts during these redirects. This means a compromised server or a malicious actor can redirect a client using the vulnerable library to a host under their control, effectively capturing the plaintext credentials within the <code>Authorization</code> header. Upgrading to version 0.39.0 resolves this vulnerability. This is critical because it impacts any application using the vulnerable version of the library and relying on HTTP authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises or sets up a malicious HTTP server.</li>
<li>Attacker crafts a response that includes an HTTP redirect (301, 302, 307, or 308) to a domain controlled by the attacker. This redirect targets a resource on the attacker&rsquo;s controlled domain.</li>
<li>A client application using a vulnerable version of cpp-httplib (prior to 0.39.0) attempts to access a resource on the compromised or malicious server.</li>
<li>The cpp-httplib library in the client application receives the HTTP redirect response.</li>
<li>The vulnerable library incorrectly appends any stored <code>Authorization</code> headers (Basic Auth, Bearer Token, or Digest Auth) to the redirected request, even though it&rsquo;s a cross-origin request.</li>
<li>The client application, through cpp-httplib, sends the redirected request to the attacker-controlled host, including the sensitive <code>Authorization</code> header.</li>
<li>The attacker captures the <code>Authorization</code> header, extracting the plaintext credentials.</li>
<li>The attacker uses the stolen credentials to impersonate the user or gain unauthorized access to protected resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33745 allows attackers to steal authentication credentials from applications utilizing the vulnerable cpp-httplib library. The impact could range from unauthorized access to user accounts and sensitive data to full compromise of the application and its related systems. The number of potential victims depends on the usage and distribution of the vulnerable cpp-httplib library across different software projects and organizations. Organizations across all sectors are potentially vulnerable if they use affected applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to cpp-httplib version 0.39.0 or later to remediate CVE-2026-33745 as mentioned in the <strong>Overview</strong>.</li>
<li>Implement network monitoring to detect HTTP requests containing <code>Authorization</code> headers being sent to unexpected or untrusted domains, based on the attack chain steps described above, specifically step 6.</li>
<li>If upgrading is not immediately feasible, consider implementing a proxy that strips <code>Authorization</code> headers from HTTP redirect requests to external domains as a temporary mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cpp-httplib</category><category>credential-leak</category><category>cve-2026-33745</category><category>http-redirect</category><category>credential-access</category><category>cross-origin</category></item><item><title>IBM InfoSphere Information Server Plaintext Credential Storage Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-ibm-infosphere-plaintext-creds/</link><pubDate>Wed, 25 Mar 2026 21:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ibm-infosphere-plaintext-creds/</guid><description>IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 stores user credentials in plaintext, allowing local users to read sensitive information.</description><content:encoded><![CDATA[<p>IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 are vulnerable to plaintext storage of user credentials and other sensitive information. A local user with access to the affected system can potentially read these credentials, leading to unauthorized access or privilege escalation. This vulnerability, identified as CVE-2025-36258, can have significant impact on organizations using the affected IBM InfoSphere versions, as it exposes sensitive data and potentially compromises the entire system. Defenders should identify systems running these versions and apply recommended mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local user gains access to a server running a vulnerable version of IBM InfoSphere Information Server (11.7.0.0 through 11.7.1.6).</li>
<li>The user navigates to the file system location where the application stores configuration files.</li>
<li>The user opens the configuration files using a text editor or command-line tool like <code>cat</code> or <code>type</code>.</li>
<li>The user searches for plaintext credentials or other sensitive information within the configuration files.</li>
<li>The user discovers usernames, passwords, API keys, or other secrets stored in plaintext.</li>
<li>The user uses the discovered credentials to authenticate to the InfoSphere system or related services.</li>
<li>The user gains unauthorized access to data, configurations, or administrative functions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-36258 allows a local user to read sensitive information, including user credentials stored in plaintext. This can lead to unauthorized access to the InfoSphere system and potentially other connected systems. The impact includes data breaches, privilege escalation, and complete system compromise. The severity is rated as HIGH with a CVSS v3.1 score of 7.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update or patch provided by IBM to address CVE-2025-36258; refer to <a href="https://www.ibm.com/support/pages/node/7266489">https://www.ibm.com/support/pages/node/7266489</a>.</li>
<li>Implement access controls to restrict local user access to sensitive configuration files.</li>
<li>Deploy the Sigma rules provided to detect unauthorized access to configuration files and processes attempting to read them.</li>
<li>Enable file integrity monitoring for InfoSphere configuration directories to detect unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2025-36258</category><category>credential-access</category><category>plaintext-storage</category><category>infosphere</category></item><item><title>Device Code Phishing Campaign Targeting Cloud Platforms</title><link>https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</guid><description>A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.</description><content:encoded><![CDATA[<p>An active phishing campaign is leveraging Microsoft&rsquo;s Device Code OAuth flow to target users of cloud-based file storage and document workflow platforms. Unlike traditional phishing attacks that aim to steal usernames and passwords directly, this campaign exploits a legitimate authentication mechanism to gain unauthorized access. The campaign impersonates popular cloud services, enticing users to enter a provided device code on a Microsoft login page. By doing so, victims inadvertently grant the attacker access to their accounts on the targeted platforms. This campaign highlights the evolving tactics of phishing actors and the need for robust detection mechanisms beyond simple credential harvesting alerts. The scope and scale of the campaign are currently unknown.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email impersonating a cloud-based file storage or document workflow service.</li>
<li>The email contains a message prompting the user to &ldquo;activate&rdquo; or &ldquo;authenticate&rdquo; their account.</li>
<li>The email includes a device code and instructs the user to visit a Microsoft login page (e.g., microsoft.com/devicelogin).</li>
<li>The user, believing the request is legitimate, enters the provided device code on the Microsoft login page.</li>
<li>The Microsoft login page prompts the user to grant permissions to an application controlled by the attacker.</li>
<li>If the user approves the permissions, the attacker gains OAuth tokens that allow access to the user&rsquo;s account on the targeted cloud platform.</li>
<li>The attacker can then access, modify, or exfiltrate data stored on the compromised account.</li>
<li>The attacker may use the compromised account to further propagate the phishing campaign to other users within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to unauthorized access to sensitive data stored in cloud-based file storage and document workflow platforms. This can result in data breaches, financial loss, and reputational damage for affected organizations. The use of a legitimate Microsoft authentication flow makes this campaign difficult to detect with traditional phishing detection methods. The lack of credential harvesting may also bypass security controls focused on monitoring password theft. The specific number of victims and sectors targeted remains unknown, but the potential impact is significant given the widespread use of cloud services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement user awareness training to educate employees about device code phishing and the risks of entering unknown codes on login pages.</li>
<li>Monitor Microsoft Entra ID (Azure AD) logs for unusual device code authentication patterns, focusing on applications requesting broad permissions (reference: Attack Chain steps 5 and 6). Deploy the &ldquo;Detect Suspicious Device Code Authentication&rdquo; Sigma rule to identify anomalous activity.</li>
<li>Implement Conditional Access policies in Microsoft Entra ID to restrict device code authentication to trusted devices and locations.</li>
<li>Investigate any successful device code authentications where the application requesting permissions is not recognized or approved by the organization.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>initial-access</category><category>phishing</category><category>oauth</category></item><item><title>OpenClaw Improper Header Validation Leads to Credential Leakage</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</guid><description>OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.</description><content:encoded><![CDATA[<p>OpenClaw, a Node.js framework, is susceptible to a critical vulnerability (CVE-2026-32913) affecting versions prior to 2026.3.7. The vulnerability lies in the <code>fetchWithSsrFGuard</code> function, which improperly validates headers. This flaw allows attackers to potentially forward custom authorization headers, such as <code>X-Api-Key</code> and <code>Private-Token</code>, across cross-origin redirects. Successful exploitation enables the interception of sensitive credentials intended for the original, legitimate destination. The vulnerability was reported in March 2026 and impacts applications using the vulnerable versions of OpenClaw. Defenders should prioritize patching and implementing compensating controls to prevent credential leakage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL targeting an OpenClaw application using a version prior to 2026.3.7.</li>
<li>The victim&rsquo;s browser or application requests the malicious URL, including custom authorization headers like <code>X-Api-Key</code> or <code>Private-Token</code>.</li>
<li>The vulnerable <code>fetchWithSsrFGuard</code> function in OpenClaw fails to properly validate or sanitize headers during cross-origin redirects.</li>
<li>The attacker configures their malicious server to respond with an HTTP 302 redirect to a different origin controlled by the attacker.</li>
<li>The victim&rsquo;s client, upon receiving the redirect, unknowingly forwards the sensitive authorization headers to the attacker&rsquo;s server.</li>
<li>The attacker&rsquo;s server logs or captures the leaked <code>X-Api-Key</code> and/or <code>Private-Token</code> values.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to resources or data protected by those credentials on the original target application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32913 can lead to the leakage of sensitive API keys and private tokens. This allows unauthorized access to protected resources, potentially leading to data breaches, account compromise, and other malicious activities. While the specific number of affected applications remains unknown, all OpenClaw deployments prior to version 2026.3.7 are vulnerable. The impact is significant due to the potential for widespread credential compromise across various sectors utilizing OpenClaw for their applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.7 or later to patch CVE-2026-32913 (see references for patch information).</li>
<li>Implement server-side validation to sanitize and strip potentially sensitive authorization headers before following redirects.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Header Forwarding</code> to identify potential exploitation attempts by monitoring for cross-origin redirects involving sensitive headers.</li>
<li>Monitor web server logs for unusual redirect activity and suspicious user agents (see log source information in the Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32913</category><category>credential-access</category><category>header-injection</category><category>openclaw</category></item><item><title>WWBN AVideo Channel Password Bypass Vulnerability (CVE-2026-33297)</title><link>https://feed.craftedsignal.io/briefs/2024-01-avideo-password-bypass/</link><pubDate>Mon, 23 Mar 2026 14:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-avideo-password-bypass/</guid><description>WWBN AVideo versions prior to 26.0 are vulnerable to a credential access vulnerability where passwords containing non-numeric characters are incorrectly processed, effectively setting the password to '0' and allowing trivial channel access bypass.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. A critical vulnerability exists in versions prior to 26.0 within the CustomizeUser plugin. Specifically, the <code>setPassword.json.php</code> endpoint is susceptible to a logic error affecting channel password assignments. When an administrator attempts to set a channel password containing non-numeric characters for any user, the system incorrectly coerces the password to the integer zero before storing it. This effectively sets the channel password to &lsquo;0&rsquo;…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-33297</category><category>credential-access</category><category>web-application</category></item><item><title>EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)</title><link>https://feed.craftedsignal.io/briefs/2026-03-equitypandit-logging/</link><pubDate>Mon, 23 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-equitypandit-logging/</guid><description>EquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.</description><content:encoded>&lt;p>EquityPandit 1.0, an Android application, is vulnerable to insecure logging practices. Specifically, the application logs sensitive user credentials, including plaintext passwords, within the developer console logs. This vulnerability, identified as CVE-2019-25605, allows an attacker with access to the device or ADB (Android Debug Bridge) to extract these credentials. The vulnerability was reported in 2019, but publicly disclosed details and exploits surfaced more recently. Successful…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>insecure-logging</category><category>credential-access</category><category>android</category></item><item><title>NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)</title><link>https://feed.craftedsignal.io/briefs/2026-03-netntlm-phishing/</link><pubDate>Wed, 18 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-netntlm-phishing/</guid><description>A phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).</description><content:encoded>&lt;p>A vulnerability, tracked as CVE-2025-59284, enables attackers to capture NetNTLM hashes from Windows systems through a specially crafted archive file. This technique exploits how Windows handles file extraction, potentially forcing authentication requests to a malicious server controlled by the attacker. The vulnerability was presented at BsidesLjubljana in March 2026, suggesting recent active research and potential exploitation. The original Reddit post indicates that the Microsoft patch might…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>netntlm</category><category>phishing</category><category>windows</category></item><item><title>Azure Service Principal Sign-In Followed by Arc Cluster Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azure-arc-credential-access/</link><pubDate>Tue, 17 Mar 2026 15:06:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azure-arc-credential-access/</guid><description>Detects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.</description><content:encoded><![CDATA[<p>This detection rule identifies a specific attack chain targeting Azure Arc-connected Kubernetes clusters. The attack begins with a service principal authenticating to Microsoft Entra ID and immediately requesting credentials for an Azure Arc-connected Kubernetes cluster. This <code>listClusterUserCredential</code> action retrieves tokens enabling <code>kubectl</code> access via the Arc Cluster Connect proxy. This behavior is indicative of adversaries using stolen service principal secrets to gain unauthorized access and establish a proxy tunnel into Kubernetes environments. The rule prioritizes external service principal authentications (excluding managed identities) followed by Arc cluster credential access, particularly when sign-in origins are from unexpected locations or Autonomous System Numbers (ASNs). This activity was observed in attacks documented by IBM X-Force and Microsoft, as referenced below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or obtains valid credentials for an Azure Service Principal.</li>
<li>The attacker authenticates to Microsoft Entra ID using the compromised service principal credentials, generating a ServicePrincipalSignInLogs event in Azure.</li>
<li>The attacker attempts to list cluster user credentials for a connected Kubernetes cluster using the compromised service principal. This generates an Azure Activity Log event: <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code>.</li>
<li>If successful, the <code>listClusterUserCredential</code> action provides the attacker with tokens to access the Kubernetes cluster through the Arc Cluster Connect proxy.</li>
<li>The attacker uses the acquired credentials to interact with the Kubernetes cluster via <code>kubectl</code> proxied through Azure Arc.</li>
<li>The attacker performs reconnaissance within the Kubernetes cluster to identify valuable targets.</li>
<li>The attacker attempts to create, read, update, or delete (CRUD) sensitive Kubernetes resources, such as secrets or configmaps.</li>
<li>The attacker may attempt to escalate privileges within the cluster or pivot to other resources within the Azure environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of service principal credentials and subsequent access to Azure Arc-connected Kubernetes clusters can lead to significant data breaches, service disruption, and unauthorized resource access. Successful exploitation allows attackers to gain control over Kubernetes clusters, potentially leading to lateral movement within the environment, exfiltration of sensitive data, and deployment of malicious workloads. The number of victims and specific sectors targeted vary based on the attacker&rsquo;s objectives and the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the described attack chain, tuning the <code>maxspan</code> value based on observed authentication patterns and network latency.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on unexpected sign-in locations or ASNs for the service principal (refer to the investigation fields in the rule definition).</li>
<li>Implement regular rotation of service principal credentials and enforce multi-factor authentication where possible (refer to Microsoft Entra ID documentation).</li>
<li>Review and restrict Azure role assignments for service principals on Arc-connected clusters to minimize potential impact from compromised credentials (refer to Azure RBAC documentation).</li>
<li>Enable logging for Azure sign-in logs and activity logs to ensure the data sources are available for the detection rule (refer to Azure Monitor documentation).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>azure-arc</category><category>credential-access</category><category>initial-access</category></item><item><title>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</title><link>https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</guid><description>The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.</description><content:encoded><![CDATA[<p>The Azure AD Connect Authentication Agent facilitates pass-through authentication (PTA) in hybrid environments. Attackers may attempt to load malicious DLLs into the <code>AzureADConnectAuthenticationAgentService.exe</code> process to intercept or persist credentials. This involves placing an untrusted DLL in a location where the service will load it, such as a directory with weak permissions or through DLL side-loading. Successful exploitation allows attackers to capture user credentials as they are processed by the PTA service, potentially leading to domain compromise. This activity specifically targets systems utilizing Azure AD Connect with PTA enabled. Defenders should monitor for unexpected DLL loads by the Azure AD Connect Authentication Agent to identify and prevent credential access attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system hosting the Azure AD Connect Authentication Agent.</li>
<li>The attacker identifies a location where they can place a malicious DLL that the <code>AzureADConnectAuthenticationAgentService.exe</code> process will load, such as a directory with weak permissions or a location susceptible to DLL side-loading.</li>
<li>The attacker places a malicious DLL (e.g., <code>evil.dll</code>) into the identified location.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process is started or restarted.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process loads the malicious DLL (<code>evil.dll</code>).</li>
<li>The malicious DLL intercepts or captures credentials as they are processed by the PTA service.</li>
<li>The attacker exfiltrates the captured credentials.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept credentials handled by the Azure AD Connect Authentication Agent. This can lead to the compromise of user accounts and the ability to move laterally within the environment. Organizations using Azure AD Connect with Pass-through Authentication are at risk. The impact includes potential data breaches, unauthorized access to sensitive information, and domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</code> to detect the loading of untrusted DLLs by the Azure AD Connect Authentication Agent service in your environment.</li>
<li>Monitor process creation events for <code>AzureADConnectAuthenticationAgentService.exe</code> loading DLLs outside of the standard Microsoft directories, as defined in the Sigma rule.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Restrict write access to the Azure AD Connect Authentication Agent directories to prevent unauthorized DLL placement.</li>
<li>Review administrative access to the PTA host to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>dll-side-loading</category><category>azure-ad-connect</category></item><item><title>MemProcFS Usage for Memory Dump Mounting and Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-11-memprocfs-memory-dump/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-memprocfs-memory-dump/</guid><description>Adversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.</description><content:encoded><![CDATA[<p>MemProcFS is a memory forensics tool that allows users to mount physical memory as a virtual file system. While legitimate uses exist for forensic analysis, adversaries are abusing it to gain unauthorized access to sensitive information. Observed tactics involve mounting memory dumps of compromised systems and extracting credentials, LSA secrets, SAM data, and cached domain credentials. This activity is particularly concerning as it allows threat actors to bypass traditional security measures and directly access sensitive data within the memory space of targeted processes. Unapproved usage of MemProcFS should be considered suspicious and investigated immediately to prevent credential theft and lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through unspecified means (e.g., exploiting a vulnerability or using stolen credentials).</li>
<li>The attacker obtains a memory dump of the compromised system, which may contain sensitive information.</li>
<li>The attacker executes <code>MemProcFS.exe</code> with the <code>-device</code> parameter to mount the memory dump as a virtual file system.</li>
<li>MemProcFS creates a virtual file system representation of the memory dump, allowing the attacker to browse the memory space as files and directories.</li>
<li>The attacker accesses the memory of the LSASS process (lsass.exe) through the mounted file system.</li>
<li>The attacker extracts credentials, such as usernames and passwords, from the LSASS process memory.</li>
<li>The attacker may also access registry hives through the mounted file system to obtain LSA secrets, SAM data, and cached domain credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows threat actors to steal sensitive information, including credentials, LSA secrets, SAM data, and cached domain credentials. Compromised credentials can be used for lateral movement within the network, privilege escalation, and further data breaches. The number of potential victims is unknown, but the severity of the impact is high due to the potential for widespread compromise. Sectors at risk include any organization that stores sensitive data on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect MemProcFS Execution with Device Parameter&rdquo; to your SIEM to identify suspicious use of MemProcFS based on process creation events.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rules above.</li>
<li>Monitor for unusual file system access patterns that may indicate a memory dump being mounted as a virtual file system.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>memory-dump</category><category>memprocfs</category></item><item><title>Kubernetes Admission Controller Modification</title><link>https://feed.craftedsignal.io/briefs/2024-11-kubernetes-admission-controller-modification/</link><pubDate>Fri, 01 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-kubernetes-admission-controller-modification/</guid><description>An adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.</description><content:encoded><![CDATA[<p>The Kubernetes admission controller is a crucial component that governs API requests to a Kubernetes cluster. Attackers can modify mutating or validating webhook configurations to intercept and manipulate these requests. By creating, updating, or replacing these configurations, adversaries can inject malicious code, alter resource definitions, or even exfiltrate sensitive information like access credentials. This activity can lead to privilege escalation, persistence within the cluster, and ultimately, a compromise of the entire Kubernetes environment. The attacks are typically stealthy as they operate within the legitimate Kubernetes API framework, making detection challenging. This behavior is particularly concerning for organizations relying on Kubernetes for critical applications and sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the Kubernetes cluster, potentially through compromised credentials or a vulnerability in a deployed application.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing admission controller configurations (mutatingwebhookconfigurations and validatingwebhookconfigurations) to identify potential targets.</li>
<li><strong>Configuration Modification:</strong> The attacker uses <code>kubectl</code> or the Kubernetes API to create, update, or replace a webhook configuration. This involves crafting a malicious webhook that will intercept API requests.</li>
<li><strong>Webhook Deployment:</strong> The malicious webhook is deployed as a service within the Kubernetes cluster.</li>
<li><strong>API Interception:</strong> When a user or application makes an API request that matches the webhook&rsquo;s defined rules, the webhook intercepts the request.</li>
<li><strong>Malicious Code Injection:</strong> The webhook injects malicious code or alters the API request to achieve the attacker&rsquo;s objectives (e.g., granting unauthorized permissions, modifying resource configurations).</li>
<li><strong>Persistence/Privilege Escalation/Credential Access:</strong> Depending on the injected code, the attacker achieves persistence by ensuring malicious code is always present, escalates privileges by modifying role bindings, or accesses credentials by intercepting secret creation requests.</li>
<li><strong>Lateral Movement/Data Exfiltration:</strong> The attacker leverages their gained access to move laterally within the cluster or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Kubernetes admission controllers can have severe consequences. This can result in unauthorized access to sensitive data, complete cluster compromise, and denial of service. The impact ranges from data breaches and service disruptions to long-term persistence within the environment, allowing attackers to maintain control over the cluster. The stealthy nature of this attack makes it difficult to detect, potentially allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Admission Controller Modification&rdquo; to your SIEM and tune it for your environment to detect suspicious modifications to webhook configurations (logsource: kubernetes, service: audit).</li>
<li>Monitor Kubernetes audit logs for <code>create</code>, <code>delete</code>, <code>patch</code>, <code>replace</code>, and <code>update</code> verbs on <code>mutatingwebhookconfigurations</code> and <code>validatingwebhookconfigurations</code> resources (logsource: kubernetes, service: audit).</li>
<li>Implement strong RBAC policies to limit access to Kubernetes API resources and prevent unauthorized modification of admission controller configurations.</li>
<li>Regularly review and audit existing admission controller configurations to identify any unexpected or malicious webhooks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>admission-controller</category><category>privilege-escalation</category><category>persistence</category><category>credential-access</category></item><item><title>Potential Veeam Credential Access via SQL Commands</title><link>https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</guid><description>Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting backup infrastructure to maximize the impact of ransomware and data exfiltration attacks. Veeam, a popular backup and disaster recovery solution, stores credentials for backup operations in MSSQL databases. An attacker who gains access to these databases may attempt to use tools like <code>sqlcmd.exe</code> or PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to extract and decrypt these credentials. This tactic allows the attacker to compromise the backups themselves, preventing recovery and increasing pressure on the victim. This activity has been observed in real-world incidents, such as those involving the Diavol ransomware. Defenders should monitor for suspicious command-line activity targeting Veeam credentials within MSSQL environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the target environment is gained through methods such as phishing or exploiting a vulnerability in a public-facing application.</li>
<li>The attacker performs reconnaissance to identify the location of the Veeam MSSQL database server.</li>
<li>The attacker obtains valid credentials or exploits a vulnerability to gain access to the Veeam MSSQL database server.</li>
<li>The attacker executes <code>sqlcmd.exe</code> or uses PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to query the <code>[VeeamBackup].[dbo].[Credentials]</code> table.</li>
<li>The attacker retrieves the encrypted Veeam credentials from the database.</li>
<li>The attacker decrypts the Veeam credentials using custom scripts or tools, potentially leveraging the Veeam backup server itself.</li>
<li>The attacker uses the compromised Veeam credentials to access and delete or encrypt backup data.</li>
<li>The attacker deploys ransomware on the remaining systems, knowing that recovery from backups is now impossible.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful compromise of Veeam credentials can have devastating consequences. Attackers can encrypt or delete backup data, making recovery impossible and significantly increasing the impact of ransomware attacks. This can lead to prolonged downtime, data loss, financial losses, and reputational damage. Organizations relying on Veeam for backup and recovery should prioritize monitoring and securing their Veeam infrastructure to prevent credential access and backup compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture command-line activity, specifically <code>sqlcmd.exe</code> and PowerShell.</li>
<li>Deploy the Sigma rule &ldquo;Potential Veeam Credential Access Command&rdquo; to detect suspicious command executions targeting Veeam credentials in MSSQL databases.</li>
<li>Review and restrict access controls to the Veeam MSSQL database, ensuring only authorized personnel and services have access.</li>
<li>Monitor for unusual login activity and failed login attempts to the Veeam MSSQL database server.</li>
<li>Implement multi-factor authentication for all accounts with access to Veeam infrastructure.</li>
<li>Regularly audit Veeam backup configurations and logs to identify any unauthorized modifications or access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>veeam</category><category>credential-access</category><category>mssql</category><category>windows</category><category>ransomware</category></item><item><title>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</guid><description>This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts containing artifacts indicative of NTLM relay or pass-the-hash (PtH) attacks. These techniques allow attackers to authenticate to systems without needing plaintext passwords, enabling lateral movement and privilege escalation. The rule focuses on identifying specific byte sequences and strings within PowerShell script blocks that suggest NTLM/SMB negotiation and credential access attempts. This detection helps defenders identify and respond to potential credential theft and abuse within their Windows environments. The rule is based on observed techniques used in various publicly available tools such as Invoke-TheHash, Check-LocalAdminHash, and PoshC2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system. This script could be directly executed or obfuscated to evade initial detection.</li>
<li>The PowerShell script attempts to perform NTLM relay or pass-the-hash attacks by utilizing specific byte sequences related to NTLM/SMB negotiation, such as <code>NTLMSSPNegotiate</code> or <code>0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50</code>.</li>
<li>The script may utilize tools like Invoke-WMIExec or Invoke-SMBExec to execute commands on remote systems using the stolen credentials.</li>
<li>The attacker attempts to authenticate to other systems on the network using the relayed credentials or password hashes.</li>
<li>Successful authentication allows the attacker to move laterally, accessing sensitive data or escalating privileges on other systems.</li>
<li>The attacker may deploy additional payloads or establish persistence mechanisms for continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful pass-the-hash or NTLM relay attack can grant an attacker unauthorized access to sensitive systems and data within the network. This can lead to data breaches, financial loss, or disruption of critical services. The impact could range from compromising a few systems to gaining domain administrator privileges, depending on the attacker&rsquo;s goals and the network&rsquo;s security posture. Organizations can experience significant financial and reputational damage due to data breaches and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary data for this detection. Refer to the setup instructions in the rule documentation for configuration details.</li>
<li>Deploy the Sigma rule <code>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</code> to your SIEM and tune it based on your environment.</li>
<li>Investigate any alerts generated by this rule to determine the scope and impact of the potential attack. Refer to the triage and analysis section in the rule documentation for guidance on investigation steps.</li>
<li>Implement network segmentation and access controls to limit the impact of lateral movement.</li>
<li>Monitor authentication events (event codes 4624, 4625, 4648) for suspicious activity, such as NTLM authentication from unexpected source IPs or to unusual target systems, as described in the rule&rsquo;s investigation notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>pass-the-hash</category><category>ntlm-relay</category><category>powershell</category></item><item><title>NTDS Dump via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</guid><description>Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>wbadmin.exe</code> with arguments indicative of an attempt to access and dump the NTDS.dit file from a Windows domain controller. Attackers with sufficient privileges, specifically those belonging to groups like Backup Operators, can abuse the legitimate <code>wbadmin.exe</code> utility to create a backup of the Active Directory database (NTDS.dit). This file contains sensitive credential information, and once obtained, attackers can extract password hashes and compromise the entire domain. This activity is often part of a larger attack aimed at gaining persistent access and control over the network. The Elastic detection rule was published on 2024-06-05 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network. This may be achieved through phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>The attacker escalates privileges to obtain membership in the Backup Operators group or a similar privileged group capable of running backups.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>recovery</code> argument, targeting the NTDS.dit file. The command line includes parameters to create a system state backup.</li>
<li>Wbadmin creates a backup of the system state, including the NTDS.dit file, in a specified location.</li>
<li>The attacker copies the NTDS.dit file from the backup location to a separate location for offline analysis.</li>
<li>The attacker uses tools such as <code>ntdsutil.exe</code> or <code>secretsdump.py</code> to extract password hashes from the NTDS.dit file.</li>
<li>The attacker cracks the password hashes or uses them in pass-the-hash attacks to gain access to other systems and resources within the domain.</li>
<li>The attacker achieves domain dominance and persistence, allowing them to control critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to dump credentials from the NTDS.dit file, leading to complete compromise of the Active Directory domain. This enables them to move laterally, access sensitive data, and establish persistent control over the environment. The impact can include data breaches, ransomware deployment, and long-term disruption of business operations. The medium risk score indicates that while the attack requires specific privileges, the consequences are significant if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>wbadmin.exe</code> execution as described in the Attack Chain (Data Source: Windows Security Event Logs, Sysmon).</li>
<li>Implement the provided Sigma rule to detect suspicious <code>wbadmin.exe</code> execution with NTDS.dit related arguments in your SIEM (Rule: NTDS Dump via Wbadmin).</li>
<li>Monitor and restrict membership in privileged groups like Backup Operators to minimize the risk of abuse (Reference: <a href="https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)">https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)</a>.</li>
<li>Review and whitelist legitimate backup schedules or disaster recovery processes to reduce false positives (False positive analysis).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>wbadmin</category><category>ntds.dit</category></item><item><title>Suspicious Registry Hive Access via RegBack</title><link>https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</link><pubDate>Tue, 02 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</guid><description>This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access registry backup hives (SAM, SECURITY, and SYSTEM) located in the <code>RegBack</code> folder on Windows systems. These hives contain sensitive credential material, making them attractive targets for attackers seeking to compromise system security. The detection logic focuses on file access events, specifically successful file opens, while excluding known benign processes such as <code>taskhostw.exe</code> and various AV/EDR solutions (SophosScanCoordinator.exe, MsSense.exe, ccSvcHst.exe, etc.) to minimize false positives. The rule is designed to provide defenders with high-fidelity alerts when unauthorized access to these critical registry hives is detected. The scope includes any Windows system where endpoint file access logging is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means.</li>
<li>The attacker attempts to access the <code>SAM</code>, <code>SECURITY</code>, or <code>SYSTEM</code> registry hives located in the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory.</li>
<li>The attacker leverages a tool or script to open one or more of these registry hives. This could involve using built-in Windows utilities, scripting languages, or custom-developed tools.</li>
<li>If the attacker successfully opens the <code>SAM</code> and <code>SYSTEM</code> hives, they can extract user account credentials, including usernames, password hashes, and other sensitive information. The <code>SECURITY</code> hive is also useful.</li>
<li>The attacker may stage the registry hive files by copying them to a different location on the system for further analysis or exfiltration.</li>
<li>The attacker uses credential dumping tools (e.g., Mimikatz, secretsdump.py) or custom scripts to extract credentials from the staged registry hives.</li>
<li>The attacker leverages the extracted credentials to escalate privileges, move laterally within the network, or access sensitive data.</li>
<li>The final objective is typically to gain unauthorized access to critical systems, steal sensitive data, or establish long-term persistence within the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to the compromise of user account credentials, enabling attackers to escalate privileges, move laterally within the network, and gain unauthorized access to sensitive data. The impact can range from data breaches and financial losses to reputational damage and disruption of critical business operations. The number of victims can vary depending on the scope of the attacker&rsquo;s activities and the security posture of the targeted organization. Sectors commonly targeted include finance, healthcare, government, and critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file access monitoring for the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory to capture file open events.</li>
<li>Deploy the Sigma rule <code>Registry Hive Access via RegBack</code> to your SIEM and tune the exclusions based on your environment.</li>
<li>Monitor <code>process_creation</code> events for unusual processes accessing files in <code>C:\\Windows\\System32\\config\\RegBack\\</code>, using the rule <code>Suspicious Process Accessing RegBack Hives</code>.</li>
<li>Enable Sysmon process creation logging and file creation to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>regback</category><category>windows</category></item><item><title>Suspicious DNS-Named Record Creation in Active Directory Integrated DNS</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</link><pubDate>Wed, 22 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-record-creation/</guid><description>Detection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) is a core component of AD DS, storing DNS zones as AD objects. The default permission settings allow any authenticated user to create DNS-named records. This creates an opportunity for attackers to perform Dynamic Spoofing attacks by monitoring LLMNR/NBT-NS requests and creating DNS-named records to target systems or specific services like WPAD. This attack can enable credential access by redirecting traffic through attacker-controlled systems, leading to the capture of sensitive information. This activity is detectable by monitoring Windows event code 5137 related to DNS record creation and filtering out legitimate system accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a domain-joined system, possibly through compromised credentials or phishing.</li>
<li>The attacker passively monitors LLMNR/NBT-NS broadcast traffic to identify systems being requested on the network.</li>
<li>Upon observing a request for a target system (e.g., WPAD), the attacker creates a DNS-named record in ADIDNS that resolves the target system&rsquo;s name to an attacker-controlled IP address. This leverages the default permissions in ADIDNS that allow authenticated users to create DNS records.</li>
<li>When a legitimate user attempts to access the target system, the DNS query resolves to the attacker&rsquo;s IP address.</li>
<li>The user&rsquo;s traffic is redirected to the attacker&rsquo;s system.</li>
<li>The attacker intercepts the user&rsquo;s credentials or other sensitive information.</li>
<li>The attacker may relay captured credentials to other systems on the network.</li>
<li>The attacker achieves credential access and lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain unauthorized access to sensitive systems and data within the Active Directory domain. While the severity is low, it can be a stepping stone to further, more damaging attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (event code 5137) for detection.</li>
<li>Deploy the Sigma rule <code>Creation of a DNS-Named Record</code> to detect suspicious DNS record creation events.</li>
<li>Implement stricter access controls on DNS record creation within Active Directory to limit permissions to only necessary and trusted accounts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>active-directory</category></item><item><title>Potential ADIDNS Poisoning via Wildcard Record Creation</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</link><pubDate>Fri, 03 May 2024 14:58:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</guid><description>Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) stores DNS zones as Active Directory objects, which, while providing access control and replication benefits, introduces security issues. A significant concern is the creation of wildcard records due to the default permission allowing any authenticated user to create DNS-named records. By exploiting this, attackers can establish wildcard records to redirect traffic for domain names lacking explicit DNS records, effectively positioning themselves as an adversary-in-the-middle. This manipulation of ADIDNS can lead to credential interception or relay attacks, similar to LLMNR/NBNS spoofing. This poses a high risk to organizations relying on ADIDNS for domain consistency and secure name resolution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the domain.</li>
<li>Attacker leverages existing privileges to create a wildcard DNS record (A record) within an ADIDNS zone.</li>
<li>The wildcard record is created with a DN like <code>DC=*,DC=example.com,CN=MicrosoftDNS,DC=DomainDnsZones,DC=example,DC=com</code>, where <code>DC=*</code> signifies the wildcard. Event ID 5137 is generated.</li>
<li>The wildcard record points to a malicious server controlled by the attacker.</li>
<li>A client attempts to resolve a domain name that does not have an explicit DNS record.</li>
<li>Due to the wildcard record, the DNS query resolves to the attacker&rsquo;s malicious server.</li>
<li>The client connects to the attacker&rsquo;s server, potentially exposing credentials or other sensitive information.</li>
<li>The attacker intercepts or relays the client&rsquo;s traffic, gaining unauthorized access or control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain control over systems within the affected domain. The impact includes unauthorized access to sensitive data, lateral movement within the network, and potential compromise of critical domain services. This can affect any organization using Active Directory Integrated DNS, leading to widespread disruption and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (5137) for detecting ADIDNS wildcard record creation as described in the <a href="https://ela.st/audit-directory-service-changes">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Potential ADIDNS Poisoning via Wildcard Record Creation&rdquo; to detect the creation of wildcard DNS records in ADIDNS based on Windows Event ID 5137.</li>
<li>Review and restrict ADIDNS permissions for DNS zones to limit wildcard-creation opportunities, focusing on authenticated-user create-child rights.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on <code>winlog.event_data.ObjectDN</code>, <code>user.name</code>, and the originating session as outlined in the rule&rsquo;s <code>note</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>adidns</category><category>windows</category><category>active-directory</category></item><item><title>Veeam Backup Library Loaded by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-05-veeam-credential-access/</link><pubDate>Fri, 03 May 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-veeam-credential-access/</guid><description>Detects potential credential decryption operations by PowerShell or unsigned processes using the Veeam.Backup.Common.dll library, indicating potential credential access attempts to target backups as part of destructive operations.</description><content:encoded><![CDATA[<p>This detection identifies potential credential compromise attempts targeting Veeam Backup software. Attackers may attempt to load the Veeam.Backup.Common.dll library through unauthorized processes, such as PowerShell or unsigned executables, to decrypt and misuse stored credentials. These credentials can then be used to target backups, potentially leading to destructive operations like ransomware attacks. The rule focuses on flagging untrusted or unsigned processes loading the Veeam library, providing an indicator of possible malicious activity. The detection logic specifically looks for scenarios where PowerShell or other unusual processes load the Veeam backup library, which deviates from typical administrative or backup-related operations. This activity warrants further investigation to determine if it&rsquo;s part of a credential access attempt.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker uses PowerShell (powershell.exe, pwsh.exe, powershell_ise.exe) or another unsigned process to execute malicious commands.</li>
<li>The malicious process attempts to load the Veeam.Backup.Common.dll library.</li>
<li>The Veeam.Backup.Common.dll library is loaded into the process memory.</li>
<li>The attacker leverages the loaded library to decrypt stored Veeam credentials.</li>
<li>Using the decrypted credentials, the attacker gains access to Veeam backups.</li>
<li>The attacker may then encrypt, delete, or exfiltrate the backups, leading to data loss or ransomware attacks.</li>
<li>The attacker pivots to other systems using the compromised credentials, further expanding the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain access to sensitive Veeam backup data. This can lead to data exfiltration, data encryption, or complete data loss. The impact includes potential ransomware attacks, significant business disruption, and financial losses due to recovery efforts and downtime. The compromise of Veeam backups can severely impact an organization&rsquo;s ability to recover from incidents, making it a critical target for attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Veeam Backup Library Loaded by Unusual Process&rdquo; to your SIEM to detect suspicious DLL loads (rule.name).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process details and execution history to determine legitimacy (rule.description).</li>
<li>Enable process creation and library load logging to capture the necessary events for the Sigma rule to function correctly.</li>
<li>Review and enforce code signing policies to prevent unsigned processes from loading critical libraries like Veeam.Backup.Common.dll.</li>
<li>Implement multi-factor authentication for Veeam accounts to mitigate the impact of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>veeam</category><category>powershell</category></item><item><title>Potential Abuse of AWS Console GetSigninToken</title><link>https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</guid><description>Adversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.</description><content:encoded><![CDATA[<p>The AWS GetSigninToken API, typically used for legitimate console access, can be abused by attackers to generate temporary, federated credentials. This technique, often facilitated by tools like <code>aws_consoler</code>, allows attackers to obfuscate the compromised access keys used to generate the tokens. By pivoting from the AWS CLI to console sessions with these temporary credentials, adversaries bypass MFA requirements and complicate forensic investigations. This activity is crucial for defenders to monitor, especially in environments not configured for AWS SSO, as it can indicate unauthorized access and lateral movement within the AWS infrastructure. The tool <code>aws_consoler</code> is specifically designed to automate this process, creating a streamlined path for malicious actors to leverage compromised credentials for further exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS environment using compromised credentials (access key, secret key).</li>
<li>The attacker uses the compromised credentials with the AWS CLI or SDK to call the <code>GetSigninToken</code> API.</li>
<li>AWS CloudTrail logs the <code>GetSigninToken</code> event with the event source <code>signin.amazonaws.com</code> and event name <code>GetSigninToken</code>.</li>
<li>The <code>GetSigninToken</code> API returns a temporary sign-in token.</li>
<li>The attacker uses the temporary token along with the AWS account ID to construct a sign-in URL.</li>
<li>The attacker accesses the AWS Management Console via the crafted URL, bypassing MFA if the original compromised credentials required it.</li>
<li>Once in the console, the attacker performs reconnaissance, identifies valuable resources, and escalates privileges as needed.</li>
<li>The attacker moves laterally within the AWS environment, accessing and potentially exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful abuse of the <code>GetSigninToken</code> API can lead to unauthorized access to the AWS Management Console, enabling lateral movement and data exfiltration.  The obfuscation of the original compromised credentials makes incident response more difficult. While the exact number of victims is unknown, this technique has been observed in intrusions targeting telecom and BPO companies.  The impact includes potential data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>GetSigninToken</code> events in AWS CloudTrail logs.</li>
<li>Investigate any <code>GetSigninToken</code> events originating from outside of expected AWS SSO user agents or other known legitimate sources.</li>
<li>Monitor AWS CloudTrail logs for <code>GetSigninToken</code> events where the requesting user identity does not match expected patterns.</li>
<li>Implement and enforce MFA for all AWS IAM users, even though this attack bypasses it for console access using the temporary tokens.</li>
<li>Review and restrict IAM policies to adhere to the principle of least privilege, minimizing the potential impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>credential-access</category></item><item><title>Bitbucket User Login Failure Detection</title><link>https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</link><pubDate>Fri, 08 Mar 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</guid><description>Detection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user login failures within Bitbucket environments. Monitoring failed login attempts is crucial as it can indicate various malicious activities, including credential stuffing, brute-force attacks, or attempts to gain unauthorized initial access. The audit logs in Bitbucket record details of these authentication failures, providing valuable data for security monitoring. The rule provided detects these events and can be used for correlation with other security events based on the &ldquo;author.name&rdquo; field for enhanced accuracy and context. Requires &ldquo;Advance&rdquo; log level to receive audit events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access Attempt:</strong> An attacker attempts to gain initial access to a Bitbucket account using a compromised or guessed username.</li>
<li><strong>Credential Guessing:</strong> The attacker attempts to guess the user&rsquo;s password through manual attempts or automated tools.</li>
<li><strong>Authentication Failure:</strong> Bitbucket records a &ldquo;User login failed&rdquo; event due to incorrect credentials. The <code>auditType.category</code> is Authentication, and <code>auditType.action</code> is User login failed.</li>
<li><strong>Multiple Failed Attempts:</strong> The attacker repeats the login attempts with different password variations or using a list of compromised credentials.</li>
<li><strong>Account Lockout (Optional):</strong> Depending on Bitbucket&rsquo;s configuration, repeated failed login attempts may trigger an account lockout.</li>
<li><strong>Successful Login (Potential):</strong> After multiple attempts, the attacker may eventually guess the correct password or use a valid compromised credential.</li>
<li><strong>Privilege Escalation/Persistence (If Successful):</strong> If successful, the attacker could escalate privileges, establish persistence, or perform other malicious actions within the Bitbucket environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive code repositories, intellectual property theft, and potential supply chain compromise. Attackers could inject malicious code, modify existing code, or exfiltrate sensitive data. Detecting these failed login attempts early can prevent significant damage. Although the number of victims cannot be determined with this specific detection, a successful attack can have far-reaching impacts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Bitbucket User Login Failure&rdquo; to your SIEM to detect suspicious authentication failures (logsource: bitbucket, service: audit). Tune for your environment by correlating on the author.name field.</li>
<li>Investigate the source IP addresses associated with the failed login attempts to identify potential malicious actors.</li>
<li>Implement multi-factor authentication (MFA) to significantly reduce the risk of successful credential-based attacks.</li>
<li>Monitor for unusual activity following any successful login after a series of failures.</li>
<li>Enforce strong password policies to reduce the effectiveness of brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bitbucket</category><category>authentication</category><category>brute-force</category><category>credential-access</category><category>initial-access</category></item><item><title>Wireless Credential Dumping via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</guid><description>Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>Attackers often target wireless credentials to gain unauthorized network access. This involves using the legitimate Windows command-line tool <code>netsh.exe</code> to extract Wi-Fi passwords stored on a compromised system. By leveraging <code>netsh</code>, attackers can bypass traditional security measures and retrieve sensitive information without deploying custom malware. The technique involves specific command-line arguments that instruct <code>netsh</code> to display wireless keys in cleartext, exposing the network passwords. Defenders must monitor <code>netsh</code> command-line activity to identify potential credential access attempts. This activity can lead to lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to list available wireless profiles.</li>
<li>The attacker identifies a target wireless profile from the list.</li>
<li>The attacker executes <code>netsh.exe</code> again, this time specifying the target profile and requesting the key to be displayed in cleartext using the <code>key=clear</code> argument.</li>
<li><code>Netsh.exe</code> retrieves the Wi-Fi password from the Windows Wireless LAN service.</li>
<li>The password is displayed in the command output, which the attacker captures.</li>
<li>The attacker uses the obtained Wi-Fi password to connect to the wireless network.</li>
<li>The attacker can now perform lateral movement and access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful credential dumping allows attackers to gain unauthorized access to wireless networks. This can lead to lateral movement within the organization&rsquo;s network, access to sensitive data, and further compromise of systems and resources. The impact includes potential data breaches, financial losses, and reputational damage. This technique allows attackers to bypass traditional network access controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Wireless Credential Dumping via Netsh</code> to identify suspicious <code>netsh.exe</code> commands in your environment.</li>
<li>Enable Sysmon process creation logging to capture the <code>netsh.exe</code> command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process lineage and user context as outlined in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
<li>Implement strong password policies for Wi-Fi networks, including the use of WPA2 or WPA3 encryption.</li>
<li>Review and restrict the use of <code>netsh.exe</code> on systems where it is not required, using application control solutions.</li>
<li>Monitor for related alerts indicating lateral movement, staging, remote access, or persistence, as mentioned in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>netsh</category><category>windows</category></item><item><title>TYPO3 CMS 14.2.0 Stores Passwords in Cleartext</title><link>https://feed.craftedsignal.io/briefs/2024-01-typo3-cleartext-passwords/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-typo3-cleartext-passwords/</guid><description>TYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.</description><content:encoded><![CDATA[<p>TYPO3 CMS version 14.2.0 contains a vulnerability where user passwords are stored in cleartext within the <code>uc</code> and <code>user_settings</code> fields of the <code>be_users</code> database table. This issue arises due to the <code>SetupModuleController</code> incorrectly conflating entity data with user-interface settings during persistence. The vulnerability is triggered when backend users modify their credentials through the backend user settings module while using the affected TYPO3 version. This flaw, reported by Martin Clewing and addressed by the TYPO3 core team, poses a significant risk as it exposes user credentials to unauthorized access and potential compromise. Defenders should prioritize upgrading to TYPO3 version 14.3.0 LTS and executing the User Settings Scrubbing wizard.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the TYPO3 backend, potentially through brute-force attacks or stolen credentials.</li>
<li>The attacker navigates to the backend user settings module.</li>
<li>A legitimate user or the attacker changes their password within the module while the TYPO3 instance is running version 14.2.0.</li>
<li>The <code>SetupModuleController</code> processes the password change request.</li>
<li>Instead of properly hashing the password, the <code>SetupModuleController</code> stores it in cleartext in the <code>uc</code> and <code>user_settings</code> fields of the <code>be_users</code> database table.</li>
<li>An attacker with database access can now retrieve the cleartext passwords from these fields.</li>
<li>The attacker uses the compromised credentials to impersonate the user and gain access to sensitive data or perform unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers with database access to retrieve cleartext passwords, potentially leading to complete compromise of backend user accounts. While the vulnerability is limited to TYPO3 CMS version 14.2.0, the impact on affected instances is significant, as administrative accounts could be hijacked, allowing attackers to modify website content, install malicious extensions, or exfiltrate sensitive data. This could result in data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to TYPO3 version 14.3.0 LTS to address the underlying vulnerability (reference: Solution section).</li>
<li>Execute the User Settings Scrubbing wizard in the TYPO3 Install Tool to sanitize existing cleartext passwords in the <code>uc</code> and <code>user_settings</code> fields (reference: Solution section).</li>
<li>Require affected backend user accounts to reset their passwords immediately (reference: Solution section).</li>
<li>Monitor database access logs for suspicious activity, especially access to the <code>be_users</code> table (reference: Attack Chain).</li>
<li>Deploy the Sigma rule provided below to detect potential unauthorized access attempts following password changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>typo3</category><category>cleartext-password</category><category>credential-access</category><category>cve-2026-6553</category></item><item><title>VaultCmd Usage for Listing Windows Credentials</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-vaultcmd-credential-access/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-vaultcmd-credential-access/</guid><description>Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Credential Manager to list or dump credentials stored within. This allows for the exfiltration of saved usernames and passwords. The tool vaultcmd.exe can be used to interact with the Credential Manager and list the stored credentials. This activity is often performed in preparation for lateral movement within a compromised network. This detection focuses on identifying instances where vaultcmd.exe is executed with the <code>/list*</code> argument, indicating an attempt to enumerate stored credentials. The detection rule is designed to identify abuse of vaultcmd for credential access, enabling defenders to detect unauthorized credential access activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker executes <code>vaultcmd.exe</code> with the <code>/list</code> argument to enumerate the credentials stored in the Windows Credential Manager.</li>
<li>The <code>vaultcmd.exe</code> process accesses the Credential Manager to retrieve the list of saved credentials.</li>
<li>The output of <code>vaultcmd.exe</code> (the list of credentials) is captured or redirected to a file for later exfiltration.</li>
<li>The attacker parses the output to identify valuable credentials, such as domain administrator accounts or service accounts.</li>
<li>The attacker uses the acquired credentials to authenticate to other systems on the network (lateral movement).</li>
<li>The attacker elevates privileges on the target systems.</li>
<li>The final objective is achieved, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack chain can lead to unauthorized access to sensitive resources, lateral movement within the network, and ultimately, data theft, system compromise, or ransomware deployment. A compromised user account can grant the attacker access to internal systems, confidential data, and critical infrastructure. If the attacker gains domain administrator credentials, they can compromise the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution events for instances of <code>vaultcmd.exe</code> being executed with the <code>/list*</code> argument (Data Source: Windows Security Event Logs, Sysmon, Microsoft Defender XDR, SentinelOne, Crowdstrike).</li>
<li>Deploy the Sigma rule &ldquo;Detect VaultCmd Credential Listing&rdquo; to your SIEM to identify potential credential access attempts.</li>
<li>Investigate any identified instances of <code>vaultcmd.exe</code> being executed with the <code>/list*</code> argument to determine the legitimacy of the activity.</li>
<li>Review and update endpoint protection configurations to ensure that similar threats are detected and blocked in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>vaultcmd</category></item><item><title>Multiple Logon Failure from the Same Source Address</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</guid><description>Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.</description><content:encoded><![CDATA[<p>This detection rule identifies potential password guessing or brute force activity against Windows systems. It focuses on detecting a high number of failed network logon attempts originating from a single source IP address within a short time frame. The rule analyzes Windows Security Event Logs, specifically looking for event category &ldquo;authentication&rdquo; and event action &ldquo;logon-failed&rdquo;. By aggregating failed authentication counts within a 60-second window and filtering out common authentication misconfiguration errors, the rule aims to pinpoint suspicious activity indicative of credential access attempts. This is important for defenders as it highlights potential breaches or malicious actors attempting to compromise user accounts via brute-force or password spraying attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates a network connection to a Windows system, likely targeting a service such as SMB or RDP.</li>
<li>The attacker attempts to authenticate using a list of usernames and passwords or commonly used passwords, generating failed logon attempts (Event ID 4625).</li>
<li>The Windows system logs the failed authentication attempts in the Security Event Log.</li>
<li>The detection rule monitors the Security Event Log for failed logon events (event.category == &ldquo;authentication&rdquo; and event.action == &ldquo;logon-failed&rdquo;).</li>
<li>The rule aggregates the number of failed logon attempts from the same source IP address within a 60-second time window.</li>
<li>If the number of failed attempts exceeds a threshold (e.g., 100) and involves multiple target usernames (Esql.count_distinct_target_user_name &gt;= 2), the rule triggers a detection.</li>
<li>The attacker may continue attempts after initial failures or pivot to successful credentials for lateral movement.</li>
<li>Successful credential access can lead to privilege escalation, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful brute-force or password spraying attacks can lead to unauthorized access to user accounts and sensitive data. The impact can range from minor inconvenience to significant data breaches and financial losses, depending on the compromised accounts and the data they have access to. The rule aims to reduce the window of opportunity for attackers to gain a foothold in the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs. Follow the setup instructions outlined in the rule documentation.</li>
<li>Deploy the Sigma rule &ldquo;Multiple Logon Failure from the Same Source Address&rdquo; to your SIEM and tune the threshold values (Esql.failed_auth_count and Esql.count_distinct_target_user_name) to minimize false positives in your environment.</li>
<li>Investigate any triggered alerts by examining the logon failure reason codes and the targeted user names as described in the rule&rsquo;s investigation guide.</li>
<li>Monitor network connections from the source IP address for any suspicious outbound traffic or lateral movement activity.</li>
<li>Review and enforce strong password policies to mitigate the risk of successful brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>password-spraying</category><category>windows</category></item><item><title>AWS Identity API Access from Rare ASN Organizations</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</guid><description>This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.</description><content:encoded><![CDATA[<p>This detection identifies AWS identities that primarily use API traffic originating from well-known cloud providers (e.g., Amazon, Google, Microsoft), but also exhibit a small amount of traffic from less common Autonomous System (AS) organizations. This pattern can indicate that automation or CI credentials are being reused or pivoted outside of their usual hosted cloud environment. The detection focuses on successful API calls and looks for a combination of high volume from trusted cloud providers and at least one sensitive action originating from an uncommon network. This behavior could be indicative of credential compromise and lateral movement. This rule was published by Elastic on 2026-04-22.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to valid AWS credentials, potentially through phishing, credential stuffing, or exposed secrets.</li>
<li>The attacker uses the compromised credentials to make API calls from their own infrastructure, which is associated with a rare AS organization.</li>
<li>The attacker performs reconnaissance, such as <code>GetCallerIdentity</code>, <code>ListBuckets</code>, or <code>ListSecrets</code>, to understand the AWS environment.</li>
<li>The attacker attempts to escalate privileges by calling <code>AssumeRole</code>, <code>AttachUserPolicy</code>, or <code>CreateAccessKey</code>.</li>
<li>The attacker attempts to access sensitive data using actions such as <code>GetObject</code> or <code>GetSecretValue</code>.</li>
<li>The attacker attempts to create new users or modify existing user profiles using actions such as <code>CreateUser</code>, <code>UpdateLoginProfile</code>, or <code>AddUserToGroup</code>.</li>
<li>The attacker may attempt to invoke cloud ML models using <code>InvokeModel</code> or <code>Converse</code> to further their objectives.</li>
<li>The attacker persists in the environment by creating new IAM users, roles, or policies, or by modifying existing ones.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored in S3 buckets, Secrets Manager, or other AWS services. It can also allow the attacker to escalate privileges, create new users, and modify existing configurations, leading to long-term control of the AWS environment. The severity of the impact depends on the level of access granted to the compromised credentials. This can lead to exfiltration of sensitive data, denial of service, or complete compromise of the AWS account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging in all regions and send logs to a centralized SIEM or logging platform to enable detection capabilities (<a href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference.html">references</a>).</li>
<li>Deploy the Sigma rule &ldquo;AWS Rare Source AS Organization Activity&rdquo; translated from the provided ESQL query to detect unusual source ASNs for AWS API calls.</li>
<li>Investigate alerts generated by the rule, focusing on the <code>user.name</code>, <code>aws.cloudtrail.user_identity.type</code>, <code>Esql.src_asn_values</code>, and <code>Esql.untrusted_suspicious_actions</code> to understand the context of the activity.</li>
<li>Rotate credentials for the affected principal if abuse is suspected and enforce OIDC or short-lived keys for automation.</li>
<li>Tighten IAM and data-plane permissions to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>initial-access</category><category>credential-access</category></item><item><title>Kerberos Pre-authentication Disabled for User Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-kerberos-preauth-disabled/</guid><description>Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.</description><content:encoded><![CDATA[<p>This detection identifies instances where the Kerberos pre-authentication requirement is disabled for a user account within an Active Directory environment. Attackers with <code>GenericWrite</code> or <code>GenericAll</code> permissions over a target account can modify the <code>UserAccountControl</code> attribute to disable pre-authentication. This configuration weakens the account&rsquo;s security posture, making it vulnerable to AS-REP roasting attacks, where attackers can request Kerberos tickets and crack the password offline. The activity is logged as Event ID 4738 in the Windows Security Event Logs, specifically when the <code>NewUACList</code> includes the <code>USER_DONT_REQUIRE_PREAUTH</code> flag. This poses a significant risk, especially if applied to privileged accounts, as it allows adversaries to potentially compromise credentials and escalate privileges within the domain. The detection is based on research and recommendations from Microsoft regarding Kerberos security best practices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an account with sufficient privileges (e.g., Domain Admin, or an account with delegated permissions) to modify user account attributes in Active Directory.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages their initial access to target a specific user account for which they intend to disable Kerberos pre-authentication.</li>
<li><strong>Account Modification:</strong> The attacker modifies the <code>UserAccountControl</code> attribute of the target user account, specifically disabling the &ldquo;Do not require pre-authentication&rdquo; setting (setting the <code>USER_DONT_REQUIRE_PREAUTH</code> flag). This is often done using tools like <code>Active Directory Users and Computers</code> or PowerShell cmdlets.</li>
<li><strong>Event Logging:</strong> The modification triggers a Windows Security Event Log event (Event ID 4738) on the Domain Controller, indicating that the user account attribute has been changed. The <code>NewUACList</code> field in the event data contains <code>USER_DONT_REQUIRE_PREAUTH</code>.</li>
<li><strong>AS-REQ Request:</strong> The attacker crafts an AS-REQ (Authentication Service Request) to the Kerberos Key Distribution Center (KDC) for the targeted user account. Since pre-authentication is disabled, the KDC processes the request without requiring pre-authentication.</li>
<li><strong>AS-REP Response:</strong> The KDC issues an AS-REP (Authentication Service Response) to the attacker, containing an encrypted Ticket Granting Ticket (TGT) for the targeted user account.</li>
<li><strong>Offline Cracking:</strong> The attacker extracts the encrypted TGT from the AS-REP response and attempts to crack it offline using password cracking tools and techniques, such as hashcat or John the Ripper.</li>
<li><strong>Credential Access:</strong> Upon successfully cracking the TGT, the attacker obtains the plaintext password for the targeted user account. This password can then be used for lateral movement, privilege escalation, and further malicious activities within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising user accounts through AS-REP roasting can have significant consequences. Attackers can gain unauthorized access to sensitive resources, escalate privileges, and move laterally within the network. Successful AS-REP roasting leads to credential compromise, which could result in data breaches, system compromise, and disruption of services. Organizations failing to monitor and prevent Kerberos pre-authentication disabling are at an increased risk of credential theft and subsequent exploitation, potentially affecting all systems within the compromised domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit User Account Management&rdquo; and ensure Windows Security Event Logs (specifically Event ID 4738) are being collected and forwarded to your SIEM for analysis as described in the setup instructions linked in the rule source.</li>
<li>Deploy the provided Sigma rule to detect Event ID 4738 events where the <code>NewUACList</code> contains <code>USER_DONT_REQUIRE_PREAUTH</code> within your environment to identify potential AS-REP roasting vulnerabilities.</li>
<li>Investigate any instances of disabled pre-authentication, especially on privileged accounts, following the triage steps outlined in the rule documentation.</li>
<li>Enforce the principle of least privilege by reviewing and restricting the privileges assigned to users and groups to prevent unauthorized modification of Active Directory user account attributes.</li>
<li>Monitor for suspicious Kerberos authentication patterns and investigate any anomalies that might indicate AS-REP roasting attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kerberos</category><category>credential-access</category><category>as-rep-roasting</category><category>active-directory</category><category>windows</category></item><item><title>PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-powershell-kerberos-dump/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-powershell-kerberos-dump/</guid><description>Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting PowerShell scripts designed to extract Kerberos tickets from memory. Attackers use these scripts to gain unauthorized access to credentials, which can then be leveraged for lateral movement within a network. The scripts achieve this by interacting with the Local Security Authority (LSA) and accessing Kerberos authentication packages. The observed PowerShell scripts utilize specific Kerberos ticket message types or dynamic Kerberos package lookup to enumerate and retrieve tickets. This behavior is often associated with post-exploitation activity, where attackers are attempting to escalate privileges or move laterally within a compromised environment. Defenders should monitor PowerShell activity for these patterns, as successful Kerberos ticket dumping can lead to significant security breaches. The scripts are not associated with any specific campaign or version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a PowerShell script.</li>
<li>The PowerShell script uses <code>LsaCallAuthenticationPackage</code> to interact with the LSA.</li>
<li>The script attempts to retrieve Kerberos tickets by using functions like <code>KerbRetrieveEncodedTicketMessage</code>, <code>KerbQueryTicketCacheMessage</code>, <code>KerbQueryTicketCacheExMessage</code>, or <code>KerbRetrieveTicketMessage</code>.</li>
<li>Alternatively, the script uses <code>LsaLookupAuthenticationPackage</code> to dynamically locate the Kerberos package.</li>
<li>The script may then decrypt the ticket data using <code>KerbDecryptDataMessage</code>.</li>
<li>The script may attempt to serialize or export the extracted tickets to a file.</li>
<li>The attacker uses the dumped Kerberos tickets to impersonate users or services, gaining unauthorized access to resources and facilitating lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal Kerberos tickets from memory. The attacker can then use these tickets to impersonate legitimate users or services, enabling them to move laterally within the network, access sensitive data, and potentially compromise critical systems. The impact includes unauthorized access to resources, data breaches, and potentially a complete compromise of the targeted Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the malicious script content (as mentioned in the &ldquo;Setup&rdquo; section).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Kerberos Ticket Dump&rdquo; to detect scripts exhibiting Kerberos ticket dumping behavior.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the reconstructed script block content and process lineage as outlined in the &ldquo;Triage and analysis&rdquo; section.</li>
<li>Monitor for file creation events related to ticket material exports (e.g., &ldquo;.kirbi&rdquo; files) to identify potential ticket dumping activity.</li>
<li>Review authentication events (event codes 4624, 4625, 4648) to identify suspicious logins originating from compromised systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>powershell</category><category>windows</category></item><item><title>Potential Kerberos Coercion via DNS-Based SPN Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</guid><description>Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos coercion attempts via DNS-based SPN spoofing on Windows systems. The technique abuses MicrosoftDNS records, specifically looking for directory-service access or creation events (event codes 4662 and 5137) involving a MicrosoftDNS record that contains a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, a known indicator of DNS-based SPN spoofing used in Kerberos coercion tradecraft. The goal is to detect adversaries coercing victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services. This activity is typically observed within Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to a system with privileges to modify DNS records in Active Directory.</li>
<li>The attacker creates a new MicrosoftDNS record or modifies an existing one.</li>
<li>Within the DNS record, specifically in the <code>AdditionalInfo</code> or <code>ObjectDN</code> attributes, the attacker inserts a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob contains a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The attacker configures the DNS record to point to an attacker-controlled host. This involves manipulating the record&rsquo;s name and associated IP address.</li>
<li>The attacker triggers a victim system to resolve the manipulated DNS record, causing the victim to attempt Kerberos authentication with the attacker-controlled host, believing it to be a legitimate service.</li>
<li>The attacker intercepts the Kerberos authentication request.</li>
<li>The attacker relays the Kerberos ticket to a legitimate service, impersonating the victim system.</li>
<li>The attacker gains unauthorized access to the legitimate service using the relayed Kerberos ticket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberos coercion can grant attackers unauthorized access to critical systems and services within the Active Directory domain. This may lead to privilege escalation, lateral movement, data exfiltration, and other malicious activities. The scope of impact depends on the permissions and access rights of the coerced victim system and the targeted services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; and &ldquo;Audit Directory Service Changes&rdquo; Windows audit policies to ensure relevant events are logged (Setup section).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential Kerberos coercion attempts via DNS-based SPN spoofing. Tune the rules based on your environment and known legitimate activity.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the associated user accounts, systems, and modified DNS records (rule titles).</li>
<li>Restrict access to modify DNS records in Active Directory to only authorized personnel and systems to prevent unauthorized manipulation (Overview section).</li>
<li>Monitor Windows Security authentication events for any suspicious Kerberos activity following the modification of DNS records (Attack Chain steps 5-8).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>coercion</category><category>dns</category><category>spn</category><category>spoofing</category><category>credential-access</category></item><item><title>LSASS Credential Dumping via Windows Error Reporting (WER) Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-lsass-shtinkering/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-lsass-shtinkering/</guid><description>Attackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.</description><content:encoded><![CDATA[<p>The LSASS Shtinkering attack involves abusing Windows Error Reporting (WER) to dump the memory of the LSASS process, which contains sensitive credentials. By enabling full user-mode dumps system-wide, attackers can fake a crash on LSASS, causing WER to generate a dump file. This setting is not enabled by default and requires modifying the registry. The DeepInstinct researchers publicized this attack at Defcon 30, demonstrating a method to access credentials without directly injecting malware into the LSASS process. This technique allows attackers to bypass traditional endpoint detection mechanisms that focus on malware signatures, making it a stealthy approach to credential theft. Defenders should monitor for registry modifications related to WER dump settings to detect and prevent this attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\DumpType</code> to the value <code>2</code> or <code>0x00000002</code> to enable full user-mode dumps system-wide.</li>
<li>The attacker triggers a crash or fakes a crash of the LSASS process.</li>
<li>Windows Error Reporting (WER) generates a full user-mode dump file of the LSASS process.</li>
<li>The dump file is stored in the location specified in the registry, typically <code>C:\ProgramData\Microsoft\Windows\WER\ReportQueue</code>.</li>
<li>The attacker accesses the generated dump file.</li>
<li>The attacker extracts credentials from the LSASS dump file using tools like Mimikatz or custom scripts.</li>
<li>The attacker uses the stolen credentials to move laterally within the network or access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials and other sensitive information stored in LSASS memory, such as NTLM hashes and Kerberos tickets. This can enable attackers to move laterally within the network, escalate privileges, and access critical systems and data. A single compromised system can lead to a widespread breach affecting numerous users and systems. The sectors most vulnerable are those handling sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Full User-Mode Dumps Enabled System-Wide&rdquo; to your SIEM to detect suspicious registry modifications related to Windows Error Reporting (WER).</li>
<li>Examine process execution logs to identify any suspicious processes that may have triggered the dump, especially those not matching the legitimate <code>svchost.exe</code> process with user IDs <code>S-1-5-18</code>, <code>S-1-5-19</code>, or <code>S-1-5-20</code> as described in the rule&rsquo;s investigation guide.</li>
<li>Monitor for access to WER dump files located in <code>C:\ProgramData\Microsoft\Windows\WER\ReportQueue</code> using file monitoring rules.</li>
<li>Review and update endpoint protection configurations to ensure they can detect and block credential dumping techniques as mentioned in the rule&rsquo;s response and remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>lsass</category><category>wepw</category></item><item><title>First Time Seen Account Performing DCSync</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-dcsync-new-account/</guid><description>Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.</description><content:encoded><![CDATA[<p>The DCSync attack is a technique used to retrieve credential information from Active Directory, potentially leading to complete domain compromise. This attack involves initiating the Active Directory replication process, which is normally reserved for domain controllers. This detection identifies user accounts initiating this process for the first time, which can be an indicator of malicious activity. This activity is detected via Windows Security Event Logs and focuses on the identification of the initial use of replication protocols. Attackers exploit this to steal credentials or sensitive data stored within the Active Directory. This technique can be used to escalate privileges and move laterally within the network, eventually leading to data exfiltration or other malicious objectives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network.</li>
<li>The attacker escalates privileges to obtain the necessary rights to perform DCSync. This may involve exploiting vulnerabilities or using stolen credentials.</li>
<li>The attacker uses a tool like Mimikatz or custom scripts to initiate the Active Directory replication process.</li>
<li>The tool requests replication of directory data, specifically targeting credential information. This involves using the <code>DS-Replication-Get-Changes</code> or similar replication-right GUIDs.</li>
<li>The Active Directory server responds by providing the requested data, which includes password hashes and other sensitive information.</li>
<li>The attacker extracts the credential information from the replicated data.</li>
<li>The attacker uses the extracted credentials to move laterally within the network and access other systems or data.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or long-term persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DCSync attack can lead to the compromise of the entire Active Directory domain. This can result in widespread data breaches, loss of sensitive information, and significant disruption to business operations. Attackers can gain access to critical systems and data, potentially leading to financial losses, reputational damage, and legal liabilities. The number of potential victims is dependent on the size of the compromised Active Directory environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to generate the necessary Windows Security Event Logs (event code 4662) as described in the <a href="https://ela.st/audit-directory-service-access">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect First Time DCSync Activity&rdquo; to your SIEM and tune for your environment to identify suspicious DCSync behavior.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>SubjectUserSid</code>, <code>SubjectUserName</code>, <code>Properties</code>, <code>AccessMask</code>, and <code>computer_name</code> fields in the Windows Security Event Logs.</li>
<li>Monitor for changes to Active Directory object permissions (5136 events) that could grant unauthorized users DCSync capabilities as outlined in the triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>windows</category><category>active-directory</category></item><item><title>Detecting Rare SMB Connections for Potential NTLM Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</guid><description>This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying unusual Server Message Block (SMB) traffic that originates from internal IP addresses and connects to external networks. The SMB protocol, commonly used for file and printer sharing within a network, can be exploited to exfiltrate data by injecting rogue UNC paths to capture NTLM credentials. This activity is often associated with threat actors attempting to steal credentials for lateral movement or data exfiltration. Defenders should be aware of this technique as it allows adversaries to bypass traditional security controls by leveraging a legitimate protocol for malicious purposes. This detection is relevant for environments utilizing Windows operating systems and SMB for internal network communications. The goal is to identify and alert on SMB connections to external IPs, excluding known safe ranges and legitimate business applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an internal system via phishing or other means (not detailed in source).</li>
<li>The attacker injects a rogue UNC path into a document, email, or other medium.</li>
<li>A user opens the malicious document or clicks the injected link, triggering an SMB connection to a malicious external server.</li>
<li>The SMB connection attempts to authenticate with the user&rsquo;s NTLM credentials.</li>
<li>The attacker captures the NTLM hash from the authentication attempt.</li>
<li>The attacker attempts to crack the NTLM hash to obtain the user&rsquo;s password.</li>
<li>Using the cracked password, the attacker gains unauthorized access to other systems and resources on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential theft, allowing attackers to gain unauthorized access to sensitive data and systems within the organization. This can result in data breaches, financial losses, and reputational damage. The impact is significant because SMB is a common protocol within many Windows environments, making this technique highly effective if not properly monitored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect SMB Connection to External IP&rdquo; to your SIEM to identify potentially malicious SMB connections to the internet. Tune the rule by excluding known good external IPs used by legitimate services.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) with proper filtering to capture SMB traffic details as recommended in the linked setup guide, to enhance the fidelity of the detection.</li>
<li>Implement network segmentation to restrict SMB traffic to only necessary internal communications, reducing the attack surface and mitigating the risk of external exposure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exfiltration</category><category>credential-access</category><category>windows</category><category>smb</category><category>ntlm</category></item><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item><item><title>Okta User Account Created</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-okta-user-created/</guid><description>Detection of new user account creation in Okta, which could indicate malicious activity related to credential access.</description><content:encoded><![CDATA[<p>This alert detects the creation of new user accounts within an Okta environment. While legitimate user creation is common, malicious actors may create accounts to gain unauthorized access to resources, escalate privileges, or establish persistence within the network. Monitoring for anomalous user creation activity, such as accounts created outside of normal business hours or with suspicious naming conventions, is crucial for identifying potential security breaches. Reviewing the source IP and administrator account used for the user creation can also provide valuable context.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta administrator account, potentially through phishing, credential stuffing, or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Okta admin portal.</li>
<li>The attacker navigates to the user management section within the Okta admin console.</li>
<li>The attacker creates a new user account, potentially mimicking an existing user or using a generic naming convention.</li>
<li>The attacker assigns the new user account specific roles and permissions, potentially granting elevated privileges.</li>
<li>The attacker may use the newly created account to access sensitive applications and data within the Okta-protected environment.</li>
<li>The attacker uses the compromised or newly created account to maintain persistence within the Okta environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leading to unauthorized user creation can result in significant data breaches, privilege escalation, and unauthorized access to sensitive applications and resources. This could lead to financial loss, reputational damage, and compliance violations. The impact depends on the permissions granted to the created user and the applications they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Okta User Created&rdquo; to your SIEM to detect user creation events and tune for your environment.</li>
<li>Investigate any detected user creation events for legitimacy, focusing on the source IP address and the administrator account used.</li>
<li>Implement multi-factor authentication (MFA) for all Okta administrator accounts to mitigate the risk of credential compromise.</li>
<li>Review Okta event logs regularly for suspicious activity, including user creation, permission changes, and application access.</li>
<li>Establish baseline user creation patterns to identify anomalous behavior, such as accounts created outside of normal business hours.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>user-creation</category><category>credential-access</category></item><item><title>Detection of Sensitive LDAP Attribute Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</link><pubDate>Fri, 19 Jan 2024 16:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ldap-attribute-access/</guid><description>This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.</description><content:encoded><![CDATA[<p>This detection rule identifies attempts to access sensitive attributes within Active Directory via the Lightweight Directory Access Protocol (LDAP). These attributes, including <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, and <code>msPKI-CredentialRoamingTokens</code>, are valuable targets for adversaries aiming to steal credentials or escalate privileges. The rule focuses on Windows Security Event Logs, specifically monitoring event code 4662 which indicates an attempt to access an object. By filtering out common benign access patterns, such as those originating from the SYSTEM account or using specific access masks, the rule aims to highlight potentially malicious activity that warrants further investigation. The original rule was created in November 2022 and updated in May 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target domain (e.g., through phishing or exploiting a public-facing application).</li>
<li>The attacker uses valid credentials or exploits a vulnerability to authenticate to the domain.</li>
<li>The attacker uses LDAP queries to enumerate Active Directory objects.</li>
<li>The attacker crafts specific LDAP queries to target sensitive attributes like <code>unixUserPassword</code>, <code>ms-PKI-AccountCredentials</code>, or <code>msPKI-CredentialRoamingTokens</code>.</li>
<li>Windows Security Event 4662 is generated, logging the access attempt with details about the user, accessed object, and properties.</li>
<li>The attacker exfiltrates the accessed attribute data, potentially containing password hashes, certificates, or other sensitive information.</li>
<li>The attacker uses the stolen credentials or certificates to impersonate other users or gain elevated privileges within the domain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain accounts, including privileged accounts. Attackers can use stolen credentials to move laterally within the network, access sensitive data, and disrupt business operations. Depending on the attributes accessed, this could also expose private keys and authentication certificates leading to further attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Access to Sensitive LDAP Attributes&rdquo; to your SIEM to detect access attempts to critical AD attributes (rule.name).</li>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; to ensure that necessary Windows Security Event Logs (event code 4662) are generated for the Sigma rule to function (setup).</li>
<li>Review and tune the &ldquo;Access to Sensitive LDAP Attributes&rdquo; Sigma rule, creating exceptions for legitimate administrative accounts and scheduled system processes to minimize false positives (rule.note).</li>
<li>Implement stricter access controls and permissions for sensitive LDAP attributes within Active Directory to restrict access to only necessary personnel (rule.note).</li>
<li>Investigate any triggered alerts from the Sigma rule, focusing on identifying the user/process attempting access (winlog.event_data.SubjectUserSid) and the specific sensitive attribute accessed (winlog.event_data.Properties) (rule.note).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>privilege-escalation</category><category>collection</category><category>windows</category></item><item><title>Unauthorized Removal of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</guid><description>An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.</description><content:encoded><![CDATA[<p>The unauthorized removal of a Conditional Access (CA) policy in Azure Active Directory can significantly weaken an organization&rsquo;s security posture. Conditional Access policies are critical for enforcing multi-factor authentication, device compliance, and other security controls based on user, location, device, and application conditions. When a non-approved actor removes such a policy, it can open the door for privilege escalation, credential access, and persistence by malicious actors. This activity is often performed after an initial compromise to disable security controls and move laterally within the environment. Identifying and responding to such removals promptly is essential to maintain a strong security posture.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an account with sufficient privileges to view and modify Azure Active Directory settings. This could be through phishing, password spraying, or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges within Azure AD to gain the necessary permissions to manage Conditional Access policies. This might involve adding themselves to a privileged role or exploiting misconfigurations in existing roles.</li>
<li>Discovery: The attacker enumerates existing Conditional Access policies to identify targets for removal. They may focus on policies that enforce MFA or restrict access based on location.</li>
<li>Defense Evasion: The attacker disables or modifies logging configurations to reduce the likelihood of detection.</li>
<li>Policy Removal: The attacker removes the targeted Conditional Access policy using the Azure portal, PowerShell, or the Azure CLI. The audit logs will record a &ldquo;Delete conditional access policy&rdquo; event.</li>
<li>Credential Access: With the CA policy removed, the attacker may attempt to access sensitive resources or applications without MFA, potentially gaining access to credentials or sensitive data.</li>
<li>Persistence: The attacker establishes persistence by creating new user accounts or modifying existing ones to maintain access even if their initial entry point is discovered.</li>
<li>Lateral Movement: The attacker leverages the compromised credentials and weakened security controls to move laterally to other systems and resources within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful removal of a Conditional Access policy can lead to widespread compromise. Attackers can bypass multi-factor authentication, gain unauthorized access to sensitive data, and escalate privileges within the organization. The impact can range from data breaches and financial losses to reputational damage and compliance violations. Depending on the scope of the compromised policy, the number of affected users could range from dozens to thousands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect the &ldquo;Delete conditional access policy&rdquo; event in Azure audit logs, indicating a CA policy removal.</li>
<li>Regularly review and audit Azure Active Directory role assignments to minimize the risk of unauthorized privilege escalation.</li>
<li>Implement multi-factor authentication for all user accounts, especially those with administrative privileges.</li>
<li>Monitor Azure audit logs for unusual activity, such as changes to user accounts, role assignments, and Conditional Access policies.</li>
<li>Investigate any detected instances of CA policy removal to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Review and harden Conditional Access policies to ensure they are effectively protecting critical resources and applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category><category>credential-access</category><category>persistence</category><category>defense-impairment</category></item><item><title>PowerShell Invoke-NinjaCopy Script Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-invoke-ninjacopy/</link><pubDate>Tue, 09 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-invoke-ninjacopy/</guid><description>The Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.</description><content:encoded><![CDATA[<p>Invoke-NinjaCopy is a PowerShell script used to perform direct volume file access, enabling attackers to bypass traditional file access controls. This technique allows reading locked system files, such as the NTDS.dit or registry hives, which are essential for credential dumping. The script, often incorporated into post-exploitation frameworks like Empire, leverages stealth functions to minimize detection. Defenders need to monitor PowerShell script block content for the presence of Invoke-NinjaCopy or related &ldquo;Stealth*&rdquo; functions to identify potential credential access attempts. This activity is typically observed in Windows environments where attackers attempt to escalate privileges or move laterally within a network. The use of NinjaCopy allows attackers to grab sensitive data without being blocked by standard security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script, either directly or through a command-line interface.</li>
<li>The PowerShell script contains the Invoke-NinjaCopy function or related StealthReadFile, StealthOpenFile functions.</li>
<li>The script utilizes the StealthOpenFile function to directly access the volume where the target file resides (e.g., NTDS.dit).</li>
<li>StealthReadFile is used to read the contents of the target file, bypassing standard file access controls.</li>
<li>The script copies the contents of the NTDS.dit or registry hives to a temporary location.</li>
<li>The attacker dumps credentials from the copied NTDS.dit file using tools like secretsdump.py or other credential harvesting tools.</li>
<li>The attacker uses the harvested credentials to escalate privileges or move laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials, granting the attacker access to sensitive information and systems. Credential dumping from NTDS.dit or registry hives can expose user accounts, service accounts, and other privileged credentials. The impact ranges from data breaches and financial losses to complete network compromise and disruption of services. If successful, attackers may gain persistent access and control over critical infrastructure, potentially affecting thousands of users and systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging and monitor event ID 4104 for script content containing <code>Invoke-NinjaCopy</code>, <code>StealthReadFile</code>, <code>StealthOpenFile</code>, <code>StealthCloseFileDelegate</code> as described in the Overview.</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Invoke-NinjaCopy script&rdquo; to your SIEM and tune the rule for false positives in your environment.</li>
<li>Investigate any PowerShell processes with command-line arguments that contain the identified keywords to identify potential attacker activity as outlined in the Attack Chain.</li>
<li>Implement strict access controls on sensitive files like <code>NTDS.dit</code> and registry hives to limit the impact of successful credential access attempts.</li>
<li>Review PowerShell execution policies to prevent the execution of unsigned or untrusted scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>powershell</category><category>ninjacopy</category></item><item><title>Potential Local NTLM Relay via HTTP</title><link>https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</guid><description>Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.</description><content:encoded><![CDATA[<p>This detection identifies attempts to coerce local NTLM authentication over HTTP through WebDAV named-pipe paths, focusing on Print Spooler and SRVSVC. Attackers can exploit this vulnerability, often combined with tools like NTLMRelay2Self, PetitPotam, or modified versions of krbrelayx&rsquo;s printerbug.py, to relay the obtained credentials and escalate their privileges within the network. This technique allows attackers to bypass traditional security measures by leveraging legitimate Windows protocols for malicious purposes. Successful exploitation can lead to domain dominance and unauthorized access to sensitive resources. This activity is often associated with post-exploitation activity following initial access via other means.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>rundll32.exe</code> to load <code>davclnt.dll</code> using the <code>DavSetCookie</code> function.</li>
<li>The <code>rundll32.exe</code> process is invoked with arguments specifying a named pipe path over HTTP, such as <code>http*/print/pipe/*</code>, <code>http*/pipe/spoolss</code>, or <code>http*/pipe/srvsvc</code>.</li>
<li>The system attempts to authenticate to the specified HTTP endpoint using NTLM.</li>
<li>The attacker intercepts the NTLM authentication request.</li>
<li>Using a relay tool like NTLMRelay2Self or ntlmrelayx, the attacker relays the captured NTLM credentials to another service or machine.</li>
<li>The attacker leverages the relayed credentials to escalate privileges or gain unauthorized access to network resources.</li>
<li>The attacker may then perform lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to escalate privileges within the compromised system and potentially the entire domain. This can lead to unauthorized access to sensitive data, deployment of ransomware, or other destructive activities. The impact ranges from data breaches and financial losses to complete system compromise. Depending on the targeted accounts, the attacker may be able to achieve domain administrator privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Local NTLM Relay via HTTP&rdquo; to your SIEM to detect the execution of <code>rundll32.exe</code> with specific arguments indicative of NTLM relay attempts.</li>
<li>Enable Sysmon process creation logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Monitor network connections originating from processes that load <code>davclnt.dll</code> to identify potential NTLM relay traffic.</li>
<li>Investigate and block the usage of tools like NTLMRelay2Self, PetitPotam, and ntlmrelayx within the environment.</li>
<li>Implement mitigations for NTLM relay attacks, such as enabling Extended Protection for Authentication (EPA) and disabling NTLM where possible.</li>
<li>Review and restrict the usage of WebClient service and Print Spooler service where not required.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntlm-relay</category><category>credential-access</category><category>windows</category><category>webdav</category></item><item><title>Multiple Logon Failure Followed by Logon Success</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-multiple-logon-failure-success/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-multiple-logon-failure-success/</guid><description>This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying brute-force or password guessing attacks against Windows systems. It detects multiple failed logon attempts originating from the same source IP address, followed by a successful logon. This pattern suggests an attacker attempting to guess credentials to gain unauthorized access to an account. The rule leverages Windows Security Event Logs to monitor authentication events. This activity is important for defenders because successful brute-force attacks can lead to account compromise, data breaches, and further malicious activities within the network. The rule uses EQL and analyzes <code>logs-system.security*</code>, <code>logs-windows.forwarded*</code>, and <code>winlogbeat-*</code> indices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates multiple failed logon attempts to a Windows system using various username and password combinations. These attempts originate from a single source IP address and target network logon types.</li>
<li>The system records each failed logon attempt as a Windows Security Event Log event (Event ID 4625). The event includes information about the source IP address, target username, and failure reason.</li>
<li>After several failed attempts, the attacker guesses the correct password for a valid user account.</li>
<li>The system records a successful logon event (Event ID 4624) for the compromised account, originating from the same source IP address as the previous failed attempts, also via a network logon type.</li>
<li>The attacker gains initial access to the target system using the compromised account.</li>
<li>The attacker may then attempt to escalate privileges or move laterally within the network, using the compromised account to access additional resources or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful brute-force attack can lead to unauthorized access to sensitive data, system compromise, and further malicious activities within the network. Compromised accounts can be used to escalate privileges, move laterally, and deploy ransomware. The severity depends on the privileges of the compromised account and the sensitivity of the data it can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary events (4624, 4625) in the Windows Security Event Logs for the detection rule to function. Reference: <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect multiple logon failures followed by a successful logon. Tune the rule based on your environment and baseline activity.</li>
<li>Investigate any triggered alerts to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Consider implementing multi-factor authentication (MFA) to mitigate the risk of brute-force attacks.</li>
<li>Monitor network traffic for suspicious activity originating from the source IP address associated with the brute-force attempts.</li>
<li>Review and enforce strong password policies to reduce the likelihood of successful password guessing.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>windows</category></item><item><title>Suspicious LSASS Access via Malicious Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</guid><description>An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.</description><content:encoded><![CDATA[<p>This threat leverages the Windows Secondary Logon service (seclogon.dll) to gain unauthorized access to the Local Security Authority Subsystem Service (LSASS) process. The attack involves manipulating the seclogon service to leak an LSASS handle, which can then be used to extract credentials. This technique is often employed as a precursor to credential dumping and lateral movement within a compromised network. The detection focuses on identifying specific call traces to seclogon.dll coupled with suspicious access rights (0x14c0) when accessing LSASS, originating from svchost.exe. Defenders should monitor for this activity as it indicates a potential attempt to compromise sensitive credentials stored within LSASS memory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes code within the context of a user account.</li>
<li>The attacker leverages the Secondary Logon service (seclogon.dll) to request access to LSASS.</li>
<li>The malicious code interacts with the seclogon service to obtain a handle to the LSASS process with specific access rights (0x14c0), typically from a svchost.exe process.</li>
<li>The seclogon service, acting on behalf of the attacker, grants access to LSASS.</li>
<li>The attacker uses the leaked LSASS handle to read memory contents.</li>
<li>The attacker extracts sensitive information, such as user credentials (passwords, NTLM hashes, Kerberos tickets), from the LSASS memory.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials, leading to unauthorized access to sensitive systems and data. This can result in data breaches, financial losses, and reputational damage. The compromise of domain administrator credentials can grant the attacker complete control over the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (event ID 1) and process access logging (event ID 10) to detect suspicious LSASS handle access.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Handle Access via MalSecLogon&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the call trace, access rights, and source process.</li>
<li>Monitor authentication events for signs of credential misuse following suspicious LSASS access.</li>
<li>Review local administrator and debug-privilege exposure, LSASS protection such as RunAsPPL or Credential Guard where supported, and Secondary Logon service necessity on critical servers</li>
<li>Block the GrantedAccess value &ldquo;0x14c0&rdquo; in conjunction with CallTrace &ldquo;<em>seclogon.dll</em>&rdquo; when the TargetImage is &ldquo;lsass.exe&rdquo; (Sysmon Event ID 10).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>seclogon</category><category>windows</category></item><item><title>LSASS Process Access via Windows API</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-process-access/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-process-access/</guid><description>Detection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.</description><content:encoded><![CDATA[<p>This rule identifies attempts to access the LSASS process via Windows API calls, specifically <code>OpenProcess</code>, <code>OpenThread</code>, and <code>ReadProcessMemory</code>. The Local Security Authority Subsystem Service (LSASS) is a critical Windows component responsible for managing user authentication and security policies. Attackers often target LSASS to dump credentials from memory for lateral movement and privilege escalation. This detection focuses on identifying unusual processes attempting to access the LSASS process, excluding common legitimate applications and directories. The rule leverages data from Elastic Defend and Microsoft Defender XDR to identify suspicious activity and provide defenders with actionable alerts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system through various means.</li>
<li>The attacker attempts to escalate privileges to gain administrative rights.</li>
<li>The attacker uses a custom tool or script to call the <code>OpenProcess</code>, <code>OpenThread</code> or <code>ReadProcessMemory</code> Windows APIs.</li>
<li>The tool targets the <code>lsass.exe</code> process to obtain a handle for memory access.</li>
<li>The attacker uses the obtained handle to read LSASS memory, searching for credential data.</li>
<li>The attacker extracts usernames, passwords, and other sensitive information from the dumped memory.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, which may include data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials, allowing attackers to move laterally within the network and gain access to sensitive resources. This can result in data breaches, system compromise, and significant financial or reputational damage. The rule aims to detect these attacks early, limiting the scope of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;LSASS API Access by Non-Standard Process&rdquo; to your SIEM and tune for your environment to detect suspicious access to the LSASS process.</li>
<li>Investigate any alerts triggered by this rule, focusing on the process execution chain and the access rights requested as documented in the provided Microsoft documentation.</li>
<li>Enable process creation and API call logging via Elastic Defend or Microsoft Defender XDR to provide the necessary data for this detection.</li>
<li>Review and harden LSASS protection mechanisms such as Credential Guard to minimize the risk of successful credential dumping.</li>
<li>Implement the Osquery queries to gather system information like DNS cache, services, and unsigned executables, to aid in investigation and threat hunting.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>windows</category></item><item><title>Potential LSASS Clone Creation via PssCaptureSnapShot</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-clone-creation/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-clone-creation/</guid><description>Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies the creation of an LSASS process clone via <code>PssCaptureSnapShot</code> on Windows systems. The rule focuses on scenarios where the parent process of the new LSASS instance is also <code>lsass.exe</code>. This behavior is often associated with attackers attempting to bypass security controls and dump LSASS memory to extract credentials. The technique is used to evade detection mechanisms that monitor the primary LSASS process. Successful exploitation can lead to the compromise of domain or local credentials stored in memory, allowing for lateral movement and privilege escalation within the network. The detection is based on Windows Security Event Logs, specifically event code 4688, and is designed to identify this specific cloning behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes code on the target system, potentially using tools like PowerShell or command-line utilities.</li>
<li>The attacker initiates a process to clone the LSASS process using <code>PssCaptureSnapShot</code>.</li>
<li>The newly created process, a clone of LSASS, runs alongside the original.</li>
<li>The attacker leverages the cloned LSASS process to dump its memory. This may involve tools like <code>comsvcs.dll</code>, <code>rundll32.exe</code> or custom scripts leveraging the MiniDumpWriteDump function.</li>
<li>The attacker extracts sensitive information from the dumped memory, including usernames, passwords, and Kerberos tickets.</li>
<li>The attacker uses the extracted credentials to move laterally within the network, accessing additional systems and resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can result in the compromise of sensitive credentials stored in LSASS memory, including domain and local account credentials. This can lead to unauthorized access to critical systems and data, potentially resulting in data breaches, financial loss, and reputational damage. Domain controllers, jump hosts, and systems with privileged accounts are at especially high risk. The number of affected systems can range from a single machine to a large portion of the network, depending on the attacker&rsquo;s objectives and the scope of the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs with event code 4688 for process creation events, specifically focusing on the process and parent process names to identify LSASS cloning attempts (see rule below).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect potential LSASS clone creation via <code>PssCaptureSnapShot</code>. Tune the rule for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the processes involved in cloning and dumping LSASS memory.</li>
<li>Enable Audit Process Creation and Command Line logging as per the Elastic documentation to ensure the events used by the provided Sigma rules are captured.</li>
<li>If a LSASS clone is detected, review authentication events (4624, 4648, 4625) on the affected host to identify any suspicious logons or credential usage.</li>
<li>Monitor for file activity related to memory dumps (e.g., .dmp files) using the process clone to identify potential credential theft attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>process-injection</category></item><item><title>IIS AppCmd Tool Used to Dump Service Account Credentials</title><link>https://feed.craftedsignal.io/briefs/2024-01-iis-appcmd-credential-dump/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-iis-appcmd-credential-dump/</guid><description>Attackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers who have gained a foothold on a Windows web server running Internet Information Services (IIS) may attempt to extract sensitive information, such as application pool credentials, to facilitate lateral movement and privilege escalation. This is achieved by leveraging the AppCmd.exe utility, a command-line tool used to manage IIS configurations. By issuing specific commands, attackers can dump the entire web server configuration or target specific fields containing credential-related data, exposing usernames, passwords, and connection strings in clear text. Successful exploitation allows attackers to reuse these credentials to access other systems within the environment, potentially leading to significant data breaches or system compromise. This technique is particularly effective against organizations that store sensitive credentials within their IIS configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Windows web server, often through a web shell or by exploiting a vulnerability in a web application.</li>
<li>The attacker executes <code>appcmd.exe</code> via the command line.</li>
<li>The attacker uses the <code>list</code> argument to enumerate application pools or other relevant IIS configurations.</li>
<li>The attacker uses <code>/text:*password*</code>, <code>/text:*processModel*</code>, <code>/text:*userName*</code>, <code>/config</code> or <code>*connectionstring*</code> parameters with <code>appcmd.exe</code> to filter the output and specifically target credential-related data. Alternatively the attacker may use <code>/text:*</code> to output the full configuration.</li>
<li><code>appcmd.exe</code> outputs the requested configuration data, which may include usernames, passwords, and connection strings in clear text.</li>
<li>The attacker parses the output to extract valid credentials.</li>
<li>The attacker uses the extracted credentials to authenticate to other systems or services within the network.</li>
<li>The attacker achieves lateral movement, privilege escalation, and access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to recover service account passwords and other sensitive credentials stored within the IIS configuration. This can lead to unauthorized access to databases, file shares, and other internal systems, potentially resulting in data breaches, financial loss, and reputational damage. While the rule itself is low severity, the subsequent impact of exposed credentials can be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Microsoft IIS Service Account Password Dumped&rdquo; Sigma rule to your SIEM to detect the use of <code>appcmd.exe</code> to dump sensitive IIS configuration data.</li>
<li>Review IIS and web server activity for signs of exploitation, such as requests to newly created ASPX or PHP files as suggested in the rule&rsquo;s Triage and Analysis section.</li>
<li>Enable Sysmon process creation logging to activate the rules above and provide detailed process execution data.</li>
<li>Implement the password rotation for affected service accounts as suggested in the rule&rsquo;s Triage and Analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>iis</category><category>appcmd</category><category>windows</category></item><item><title>Okta Session Hijacking via Multiple Device Token Hashes</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-okta-session-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:41:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-okta-session-hijacking/</guid><description>Detection of multiple device token hashes and source IPs for a single Okta session, indicating potential session hijacking and unauthorized access to Okta resources.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of Okta session hijacking, where adversaries may steal session cookies or tokens to gain unauthorized access to Okta resources. The alert focuses on detecting anomalous Okta sessions characterized by multiple device token hashes and source IP addresses associated with a single authenticated user. This activity may indicate that an authenticated session has been compromised and is being replayed from different devices or networks. Defenders should be aware of the potential for attackers to leverage stolen sessions to access the Okta admin console, applications, tenants, and other sensitive resources. Elastic has published a rule to detect this behavior, last updated on April 13, 2026, which can be used to proactively identify potentially compromised Okta sessions within the environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to a valid Okta session token or cookie through methods such as phishing or malware.</li>
<li><strong>Session Token Theft:</strong> The attacker steals a valid Okta session token/cookie from a compromised endpoint.</li>
<li><strong>Session Replay:</strong> The attacker replays the stolen session token/cookie from a different device and network location than the original user.</li>
<li><strong>Okta Authentication:</strong> The replayed session token authenticates to Okta, creating a new session instance.</li>
<li><strong>Multiple Device Hashes:</strong> Because the session is accessed from a different device, a new device token hash is generated. The attacker may also use proxy services from different locations.</li>
<li><strong>Unauthorized Access:</strong> The attacker uses the hijacked session to access Okta resources, such as the admin console or applications.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the hijacked session belongs to a privileged user, the attacker may escalate privileges within the Okta environment.</li>
<li><strong>Data Exfiltration/Manipulation:</strong> The attacker exfiltrates sensitive data or modifies Okta configurations to establish persistence or further compromise the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Okta session hijacking attack can lead to unauthorized access to sensitive applications and data, privilege escalation, and disruption of business operations. The impact can range from data breaches and financial loss to reputational damage and regulatory fines. Attackers can potentially access and modify user accounts, security policies, and application integrations. The number of potential victims depends on the scope of the attacker&rsquo;s access and the sensitivity of the data they can access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect multiple device token hashes and source IPs for single Okta sessions and tune for your environment.</li>
<li>Investigate alerts generated by the Sigma rule by pivoting into Okta system logs using the <code>okta.actor.alternate_id</code> and <code>okta.authentication_context.external_session_id</code> fields.</li>
<li>Monitor Okta system logs for suspicious post-authentication activity, such as admin console access, policy changes, or application assignment modifications as described in the rule&rsquo;s triage steps.</li>
<li>Enforce MFA enrollment for all Okta users to mitigate the risk of session hijacking and credential theft, as recommended in the investigation guide.</li>
<li>Revoke active sessions and reset passwords for affected users exhibiting suspicious activity as mentioned in the false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>session-hijacking</category><category>credential-access</category></item><item><title>Kubernetes Secret Access by Node or Pod Service Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secret-access/</link><pubDate>Wed, 03 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secret-access/</guid><description>This rule detects Kubernetes audit events where a node or pod service account attempts to read secrets directly, which is often a sign of credential access.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious Kubernetes API access patterns indicative of credential access. Specifically, it focuses on <code>get</code> or <code>list</code> operations targeting the <code>secrets</code> resource performed by node identities (<code>system:node:*</code>) or pod service accounts (<code>system:serviceaccount:*</code>). Attackers who have compromised a pod service account or node credentials might attempt to enumerate secrets to discover sensitive information such as tokens, registry credentials, TLS keys, or application configurations. While legitimate controllers may read secrets, direct access from node or pod service accounts warrants investigation, especially when cross-namespace or involving high-value secrets. The rule is intended to be triaged based on namespace scope, user agent, RBAC, and relevance of the identity to the accessed secret.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Kubernetes cluster, possibly through compromising a pod or node.</li>
<li>Attacker obtains credentials for a service account associated with the compromised pod or accesses node credentials.</li>
<li>Attacker uses the stolen credentials to authenticate against the Kubernetes API.</li>
<li>The attacker attempts to enumerate secrets within the cluster using <code>kubectl get secrets --all-namespaces</code> or similar API calls.</li>
<li>The Kubernetes API server receives the request and generates an audit log entry.</li>
<li>This audit log entry contains details such as the user (<code>system:node:*</code> or <code>system:serviceaccount:*</code>), the action (<code>get</code> or <code>list</code>), and the resource (<code>secrets</code>).</li>
<li>The attacker identifies valuable secrets containing sensitive information such as API keys or database passwords.</li>
<li>Attacker exfiltrates the secrets, gaining unauthorized access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Kubernetes secrets can lead to a wide range of security breaches, including unauthorized access to sensitive data, lateral movement within the cluster, and compromised external services that rely on the exposed credentials. If successful, attackers could gain complete control over the cluster and its applications, leading to data breaches, service disruption, and reputational damage. The risk is elevated in environments where secrets are not properly managed or where RBAC is overly permissive.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized secret access attempts by node or pod service accounts in Kubernetes audit logs.</li>
<li>Review RBAC configurations to ensure least privilege for service accounts and nodes, limiting their access to only necessary secrets.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on cross-namespace access, high-value secret names, and unusual user agents.</li>
<li>Implement a process for regularly rotating secrets and auditing access to sensitive resources within the Kubernetes cluster.</li>
<li>Baseline normal secret access patterns for in-cluster operators, CSI drivers, and GitOps agents, and create allowlists to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>cloud</category></item><item><title>Symbolic Link Creation to Shadow Copies for Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</guid><description>Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.</description><content:encoded><![CDATA[<p>This rule identifies the creation of symbolic links to shadow copies on Windows systems. Attackers use this technique to gain access to sensitive files stored within shadow copies, including the ntds.dit file (containing password hashes), system boot keys, and browser offline credentials. This approach allows them to bypass normal file access controls and extract credentials for lateral movement or privilege escalation. The detection rule is designed to ingest data from various sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, providing broad coverage across different endpoint security solutions. The activity is typically initiated by command-line tools like cmd.exe or powershell.exe, making detection through process monitoring feasible. This technique is particularly relevant as it targets credential dumping, a critical stage in many attack campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker elevates privileges to gain administrative rights, which are required to create shadow copies and symbolic links.</li>
<li>The attacker creates a volume shadow copy using <code>vssadmin.exe</code> or similar tools.</li>
<li>The attacker uses <code>mklink</code> command or PowerShell <code>New-Item -ItemType SymbolicLink</code> to create a symbolic link to the shadow copy path.</li>
<li>The symbolic link points to a directory within the shadow copy containing sensitive files like <code>ntds.dit</code> or browser credential stores.</li>
<li>The attacker copies the targeted sensitive files (e.g., <code>ntds.dit</code>) from the shadow copy using the symbolic link.</li>
<li>The attacker removes the shadow copy to cover their tracks, although the symbolic link creation remains as evidence.</li>
<li>The attacker extracts credentials from the copied <code>ntds.dit</code> file offline for use in lateral movement or further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to sensitive credentials stored on the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, the compromise of critical assets. If the <code>ntds.dit</code> file is accessed, the entire Active Directory domain could be at risk, potentially affecting thousands of users and systems. This type of attack is particularly damaging as it allows attackers to operate undetected for extended periods while they harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via Cmd&rdquo; to detect the creation of symbolic links to shadow copies via <code>cmd.exe</code> (rules).</li>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via PowerShell&rdquo; to detect the creation of symbolic links to shadow copies via <code>powershell.exe</code> (rules).</li>
<li>Enable Sysmon Event ID 1 (Process Creation) logging to provide necessary data for the Sigma rules to function correctly (setup).</li>
<li>Review the &ldquo;Investigating Symbolic Link to Shadow Copy Created&rdquo; section in the rule&rsquo;s notes for triage and analysis steps when the rule triggers.</li>
<li>Monitor for the usage of <code>mklink</code> command with the <code>HarddiskVolumeShadowCopy</code> argument in process command lines.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Browser Process Spawned from an Unusual Parent</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</guid><description>Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where a browser process, specifically Google Chrome or Microsoft Edge, is initiated from an unexpected parent process on a Windows system. The rule focuses on scenarios where browsers are launched with arguments indicative of remote debugging, headless automation, or minimal user interaction. Such activity can signal an attempt to manipulate a browser session for malicious purposes, potentially leading to credential theft or unauthorized access to sensitive information. The rule is designed to leverage data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Process Creation Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or command to launch a browser process (chrome.exe or msedge.exe).</li>
<li>The browser is launched with specific command-line arguments, such as <code>--remote-debugging-port</code>, <code>--headless</code>, or <code>--window-position=-x,-y</code>, to enable remote control or hide the browser window.</li>
<li>The parent process of the browser is an unusual executable, not typically associated with launching browsers (e.g., not explorer.exe).</li>
<li>The attacker leverages the remote debugging port to interact with the browser session programmatically.</li>
<li>The attacker attempts to steal credentials or session cookies from the browser.</li>
<li>The attacker uses stolen credentials to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of user credentials, enabling unauthorized access to sensitive data and systems. This could result in financial loss, data breaches, and reputational damage for affected organizations. The targeted use of browser manipulation techniques increases the likelihood of bypassing traditional security controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Browser Process Spawned from Unusual Parent</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the <code>Browser Process Spawned from Unusual Parent</code> Sigma rule.</li>
<li>Review process command lines for arguments like <code>--remote-debugging-port</code> or <code>--headless</code> to identify potential browser manipulation attempts.</li>
<li>Monitor network connections originating from browser processes for unexpected destinations, as described in the investigation guide from the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>browser-exploitation</category></item><item><title>Potential Credential Access via LSASS Handle Duplication</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</link><pubDate>Wed, 03 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</guid><description>Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access the Local Security Authority Subsystem Service (LSASS) memory via the DuplicateHandle function on Windows systems. LSASS is a critical process that manages user credentials, making it a prime target for credential dumping attacks. Attackers may use DuplicateHandle to bypass the NtOpenProcess API, which is commonly monitored, to evade detection. The rule focuses on EventCode 10, looking for lsass.exe requesting DuplicateHandle access rights (0x40) where the call trace originates from an unknown executable region (<em>UNKNOWN</em>). This technique is often associated with tools like MirrorDump.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a malicious program or script on the compromised system.</li>
<li>The malicious code attempts to open a handle to the LSASS process.</li>
<li>Instead of using NtOpenProcess, the attacker leverages the DuplicateHandle function to obtain a handle to LSASS.</li>
<li>The DuplicateHandle call originates from an unknown or suspicious module, as indicated by &ldquo;<em>UNKNOWN</em>&rdquo; in the call trace.</li>
<li>With a valid handle to LSASS, the attacker dumps the LSASS memory to a file or other location.</li>
<li>The attacker parses the dumped memory to extract sensitive credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the compromise of user credentials, including domain administrator accounts. This can give attackers unrestricted access to the entire domain, allowing them to steal sensitive data, install malware, or disrupt critical services. The impact can range from data breaches and financial loss to complete infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and event 10 logging to capture the necessary telemetry for this detection. (Setup instructions: <a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>)</li>
<li>Deploy the Sigma rule &ldquo;Potential Credential Access via DuplicateHandle in LSASS&rdquo; to your SIEM and tune for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by this rule by reviewing the event logs and call trace details to identify suspicious modules or processes.</li>
<li>Implement enhanced monitoring and logging for LSASS and related processes to detect any future attempts to exploit the DuplicateHandle function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>duplicatehandle</category><category>mirrordump</category><category>windows</category></item><item><title>Detect Application AppID URI Configuration Changes in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</link><pubDate>Wed, 03 Jan 2024 17:24:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-appid-uri-change/</guid><description>Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.</description><content:encoded><![CDATA[<p>Attackers may modify the AppID URI of an application in Azure to facilitate various malicious activities, including gaining unauthorized access, establishing persistence, accessing credentials, escalating privileges, or maintaining stealth within the environment. The AppID URI serves as a unique identifier for an application within the Azure Active Directory (Azure AD) ecosystem. Changes to this URI could indicate that an attacker is attempting to impersonate a legitimate application or service, potentially bypassing security controls and gaining elevated access. Monitoring for these changes is crucial for defenders to identify and respond to potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or exploiting a vulnerability (T1078.004).</li>
<li>The attacker enumerates available applications and service principals within the Azure environment.</li>
<li>The attacker identifies a target application with a high-value AppID URI.</li>
<li>The attacker modifies the AppID URI of the target application, potentially to impersonate another service or application (T1552).</li>
<li>This change might be done to allow the attacker to request tokens for that application.</li>
<li>The attacker leverages the modified AppID URI to request access tokens, potentially gaining unauthorized access to resources (T1078.004).</li>
<li>The attacker uses the acquired access tokens to move laterally within the Azure environment and access sensitive data or systems.</li>
<li>The attacker maintains persistence by using the modified application for continued unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of an AppID URI can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. An attacker can impersonate legitimate applications, bypassing security controls and potentially affecting numerous resources and users. The scope of the impact depends on the permissions and access levels associated with the compromised application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Application AppID Uri Configuration Changes&rdquo; to your SIEM to detect unauthorized modifications to AppID URIs (rule provided below).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the AppID URI changes.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Regularly review and audit application permissions and configurations to identify and remediate any misconfigurations.</li>
<li>Monitor Azure audit logs for other suspicious activities related to application and service principal management.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>appid</category><category>uri</category><category>application</category><category>serviceprincipal</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>SeEnableDelegationPrivilege Assignment Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</link><pubDate>Wed, 03 Jan 2024 17:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</guid><description>Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.</description><content:encoded><![CDATA[<p>The SeEnableDelegationPrivilege user right, when assigned to a security principal, allows that principal to be trusted for delegation within Active Directory. Attackers can abuse this right to compromise accounts and elevate privileges by impersonating other users or services. This technique can be used for lateral movement, persistence, and ultimately, domain dominance. Defenders should monitor for the assignment of this privilege, especially to accounts that should not have it. The targeted behavior is logged as event ID 4704 in Windows Security logs. This activity is critical to monitor as it represents a powerful tool for attackers to move laterally and maintain persistence within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised account with sufficient privileges to modify user rights.</li>
<li>The attacker assigns the SeEnableDelegationPrivilege to a target account using tools like <code>ntrights.exe</code> or PowerShell cmdlets.</li>
<li>Windows Security Event 4704 is generated, logging the privilege assignment.</li>
<li>The attacker modifies the target account&rsquo;s attributes, such as <code>userAccountControl</code> or <code>msDS-AllowedToDelegateTo</code>, to enable delegation.</li>
<li>The attacker leverages Kerberos delegation to impersonate other users or services.</li>
<li>Using the impersonated credentials, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>The attacker moves laterally within the network, compromising additional systems and accounts.</li>
<li>The attacker achieves their final objective, such as data exfiltration or domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise Active Directory accounts and elevate privileges, potentially leading to full control over the domain. The impact includes unauthorized access to sensitive data, lateral movement to critical systems, and the potential for long-term persistence. Depending on the compromised accounts, the entire organization can be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Authorization Policy Change&rdquo; to generate Windows Security Event ID 4704 (Setup instructions: <a href="https://ela.st/audit-authorization-policy-change)">https://ela.st/audit-authorization-policy-change)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Sensitive Privilege SeEnableDelegationPrivilege assigned to a Principal&rdquo; to your SIEM to detect the assignment of this privilege.</li>
<li>Investigate any instances where SeEnableDelegationPrivilege is assigned, focusing on the targeted account and the source of the change.</li>
<li>Monitor for modifications to delegation-related attributes on user and computer objects.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>windows</category><category>active-directory</category></item><item><title>Mimikatz MemSSP Log File Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</guid><description>This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.</description><content:encoded><![CDATA[<p>This detection identifies the creation of the <code>mimilsa.log</code> file, a default log generated by the Mimikatz <code>misc::memssp</code> module. The <code>misc::memssp</code> module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Mimikatz or a similar tool with the <code>misc::memssp</code> module.</li>
<li>Mimikatz injects a malicious SSP library (e.g., <code>mimilib.dll</code>) into the LSASS process (<code>lsass.exe</code>).</li>
<li>The injected SSP hooks into the authentication process.</li>
<li>When users log on to the system, the SSP captures their credentials.</li>
<li>The captured credentials are written to the <code>mimilsa.log</code> file, typically located in <code>C:\Windows\System32\</code>.</li>
<li>The attacker retrieves the <code>mimilsa.log</code> file to obtain the captured credentials.</li>
<li>The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Mimikatz Memssp Log File Detected</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging to detect the creation of <code>mimilsa.log</code> files.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.</li>
<li>Monitor for the presence of <code>mimilib.dll</code> and any LSA Security Packages registry modifications, as these may indicate persistent SSP installation.</li>
<li>Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.</li>
<li>Investigate related alerts for the same <code>host.id</code> in the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>memssp</category><category>windows</category></item><item><title>Malicious Azure Kubernetes Admission Controller Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-admission-controller/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-admission-controller/</guid><description>An adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.</description><content:encoded><![CDATA[<p>Kubernetes Admission Controllers are critical components that intercept and potentially modify requests to the Kubernetes API server. These controllers rely on admission webhooks (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) deployed within the cluster. A malicious actor can abuse these webhooks to establish persistence by modifying pod creation operations and injecting malicious containers into new pods via MutatingAdmissionWebhook. Alternatively, ValidatingAdmissionWebhook can be used to intercept API server requests, potentially exposing secrets and sensitive information. This activity allows for credential access and privilege escalation, impacting the overall security posture of the Kubernetes cluster.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure Kubernetes cluster, possibly through compromised credentials or a vulnerability in a deployed application.</li>
<li>The attacker identifies the existing Admission Controller configuration within the Kubernetes cluster.</li>
<li>The attacker crafts a malicious MutatingAdmissionWebhook configuration to intercept pod creation requests.</li>
<li>The malicious webhook is deployed to the cluster, configured to modify pod specifications.</li>
<li>When new pods are created, the webhook injects a malicious container into the pod specification before deployment.</li>
<li>The malicious container executes within the newly created pod, providing the attacker with persistent access to the cluster.</li>
<li>Alternatively, the attacker crafts a malicious ValidatingAdmissionWebhook to intercept API requests.</li>
<li>The webhook captures sensitive data, such as secrets, and sends it to an attacker-controlled server, resulting in credential access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising the Kubernetes Admission Controller can lead to persistent access within the cluster. The attacker can inject malicious containers into numerous pods, potentially affecting all applications deployed in the cluster. Sensitive information, like secrets, can be stolen, enabling lateral movement and privilege escalation within the Azure environment. The impact ranges from data breaches to complete cluster compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Kubernetes Admission Controller Configuration Change&rdquo; to detect unauthorized modifications to Admission Controller configurations in Azure Activity Logs.</li>
<li>Regularly review and audit existing Admission Controller configurations for any unexpected or malicious webhooks.</li>
<li>Implement strong RBAC policies to restrict access to Admission Controller configuration and prevent unauthorized modifications.</li>
<li>Monitor Azure Activity Logs for <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO</code> and <code>MICROSOFT.CONTAINERSERVICE/MANAGEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO</code> operations to identify potential abuse.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>kubernetes</category><category>admission-controller</category><category>persistence</category><category>privilege-escalation</category><category>credential-access</category></item><item><title>Non-Firefox Process Accessing Firefox Profile Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</link><pubDate>Wed, 03 Jan 2024 15:22:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</guid><description>This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to Firefox profile directories. The Firefox profile directory stores sensitive user data, including login credentials, browsing history, and cookies. When a non-Firefox process accesses this directory, it could be an indicator of malicious activity, such as a Remote Access Trojan (RAT) or other malware attempting to steal user information. The analytic leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This is relevant because successful credential theft can lead to account compromise, data breaches, and further propagation of malware within the network. The threat encompasses a broad range of malware families, including stealers (Azorult, RedLine Stealer, 0bj3ctivity Stealer), RATs (Remcos, Quasar RAT, Warzone RAT), keyloggers (Snake Keylogger, VIP Keylogger), and other malware like DarkGate, NjRAT, AgentTesla, and Lokibot. The activity has been observed in campaigns such as CISA AA23-347A and the 3CX Supply Chain Attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user executes a malicious file, potentially delivered via phishing or drive-by download (not covered in source).</li>
<li>The malicious file executes and establishes persistence on the system.</li>
<li>The malware attempts to access the Firefox profile directory, located at <code>*\AppData\Roaming\Mozilla\Firefox\Profiles*</code>.</li>
<li>Windows Security Event 4663 is generated, logging the access attempt to the Firefox profile directory.</li>
<li>The malware reads sensitive data, such as login credentials, cookies, and browsing history, from the profile directory.</li>
<li>The stolen data is exfiltrated to a command-and-control (C2) server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts and sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and credential theft can lead to a wide range of negative outcomes, including unauthorized access to sensitive data, financial fraud, and further compromise of systems within the organization. The impact can range from individual user account compromise to large-scale data breaches affecting thousands of users. Industries heavily reliant on web-based applications and sensitive user data, such as finance, healthcare, and e-commerce, are particularly vulnerable. The consequences include financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure it to log both success and failure events for object access to activate the underlying log source required for this detection.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect non-Firefox processes accessing Firefox profile directories.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the <code>ProcessName</code> and <code>ObjectName</code> to identify potentially malicious processes and the specific profile data being accessed.</li>
<li>Review and update your organization&rsquo;s security policies to restrict unauthorized access to sensitive user data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>malware</category><category>firefox</category></item><item><title>Potential Remote Credential Access via Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-sam-secretsdump/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-sam-secretsdump/</guid><description>Detects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.</description><content:encoded><![CDATA[<p>This detection identifies potential remote access to the Windows registry to dump credential data from the Security Account Manager (SAM) registry hive. This activity often precedes credential access and privilege elevation attempts. The rule focuses on detecting the creation of specific file types by <code>svchost.exe</code>, a legitimate Windows process, in temporary directories. However, when <code>svchost.exe</code> creates files with registry file (REGF) header bytes in temporary locations, and those files are also of a significant size, it indicates a potential secretsdump-style attack. The rule is designed for data generated by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system via compromised credentials or exploiting a vulnerability.</li>
<li>Attacker uses remote registry tools or scripts, such as those based on Impacket&rsquo;s <code>secretsdump.py</code>, to connect to the target system&rsquo;s registry service.</li>
<li>The attacker initiates a connection to the RemoteRegistry service.</li>
<li>The <code>svchost.exe</code> process on the target system is leveraged to access the SAM, SECURITY, and SYSTEM registry hives.</li>
<li><code>svchost.exe</code> creates a temporary file (e.g., a <code>.tmp</code> file) in the <code>\Windows\System32\</code> or <code>\WINDOWS\Temp\</code> directory.</li>
<li>The temporary file contains the contents of the registry hive, identifiable by the &ldquo;72656766&rdquo; (REGF) header bytes and a file size greater than 30000 bytes.</li>
<li>The attacker retrieves the dumped registry hive files from the target system.</li>
<li>The attacker parses the registry hives offline to extract sensitive credential information, such as password hashes. This leads to lateral movement and privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack allows adversaries to extract sensitive credentials, including password hashes, from the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, domain compromise. The extraction of credentials provides the attacker with persistent access and the ability to move undetected through the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Svchost.exe Registry Hive Dump</code> to detect the creation of registry hive files by <code>svchost.exe</code> in temporary directories based on the <code>file.Ext.header_bytes</code> and <code>file.path</code> fields.</li>
<li>Deploy the Sigma rule <code>Suspicious RemoteRegistry File Creation</code> to detect files with REGF header bytes created by svchost.exe, outside the standard system path to catch unusual service context.</li>
<li>Enable and monitor process creation events, specifically focusing on <code>svchost.exe</code> and its command-line arguments, to identify suspicious service groups.</li>
<li>Monitor file creation events for files with the <code>.tmp</code> extension in the <code>\Windows\System32\</code> and <code>\WINDOWS\Temp\</code> directories, paying attention to file sizes and header bytes, as indicated by the file path and size conditions in the rule.</li>
<li>Review the investigation steps outlined in the rule documentation to properly triage and analyze potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Potential NTLM Relay Attack against a Computer Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-computer-account/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-computer-account/</guid><description>This rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.</description><content:encoded><![CDATA[<p>This detection rule identifies potential NTLM relay attacks targeting computer accounts in Windows environments. The attack involves coercing a target server to authenticate to an attacker-controlled system and then relaying that authentication to another service. It focuses on detecting a sequence of events: initial coercion attempts against specific named pipes known to be vulnerable, followed by authentication attempts using the target server&rsquo;s computer account from a different host. This activity can allow an attacker to gain unauthorized access and execute commands with the privileges of the compromised computer account. The rule leverages Windows Security Event Logs to identify these patterns, providing a mechanism for defenders to detect and respond to NTLM relay attacks. The detection is based on research from 2025/2026 on coerced authentication methods and NTLM reflection techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a machine within the network.</li>
<li>The attacker initiates a coercion attack against a target server, forcing it to authenticate to a malicious endpoint. This often involves leveraging vulnerabilities in services such as Spoolss, Netlogon, or other RPC services. The attacker uses methods outlined in the referenced coercion authentication research.</li>
<li>The target server attempts to access a named pipe on the attacker-controlled system. This is logged as a File Share event (Event ID 5145) on the target server, indicating access to a named pipe like <code>Spoolss</code>, <code>netdfs</code>, <code>lsarpc</code>, <code>lsass</code>, <code>netlogon</code>, <code>samr</code>, <code>efsrpc</code>, <code>FssagentRpc</code>, <code>eventlog</code>, <code>winreg</code>, <code>srvsvc</code>, <code>dnsserver</code>, or <code>WinsPipe</code>.</li>
<li>The attacker captures the NTLM authentication attempt from the target server.</li>
<li>The attacker relays the captured NTLM authentication to another service on the network, impersonating the target server. The authentication event is logged (Event ID 4624 or 4625), showing a logon attempt using the NTLM protocol and a computer account (username ending in &ldquo;$&rdquo;).</li>
<li>The authentication attempt originates from a different IP address than the target server&rsquo;s IP, indicating the relay.</li>
<li>If successful, the attacker gains unauthorized access to the service and can execute commands or access data with the privileges of the target server&rsquo;s computer account.</li>
<li>The attacker leverages the compromised computer account to move laterally within the network, potentially gaining access to sensitive resources or escalating privileges further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NTLM relay attack can allow attackers to gain control of critical systems and data. By compromising a computer account, attackers can move laterally within the network, access sensitive information, and potentially disrupt business operations. The number of victims and the extent of the damage can vary depending on the scope of the attacker&rsquo;s activities after compromising the computer account. Organizations in any sector that rely on Windows networks and Active Directory are vulnerable. Failure to detect and prevent these attacks can lead to significant financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs, specifically for Event IDs 5145 (File Share access), 4624 (Successful Logon), and 4625 (Failed Logon), as these are crucial for detecting NTLM relay attempts.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential NTLM relay attacks based on the sequence of file access and authentication events.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the source and target of the authentication events, the named pipes accessed, and any follow-on activity.</li>
<li>Review and harden NTLM configuration to mitigate relay attacks, and consider disabling NTLM where possible in favor of more secure authentication protocols like Kerberos.</li>
<li>Enable SMB signing and Extended Protection for Authentication to prevent NTLM relay attacks.</li>
<li>Implement network segmentation and access controls to limit the scope of potential NTLM relay attacks.</li>
<li>Apply the &ldquo;Setup&rdquo; configurations by enabling the recommended Windows audit policies to ensure the events required by the rules are generated.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>ntlm-relay</category><category>windows</category></item><item><title>Azure AD User Password Reset Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</guid><description>Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user-initiated password resets within Azure Active Directory (Azure AD). While legitimate password resets are common, monitoring this activity can help identify potentially malicious behavior, such as an attacker attempting to gain unauthorized access to an account or an insider threat actor escalating privileges. Attackers may leverage compromised credentials or social engineering to initiate password resets, bypassing multi-factor authentication (MFA) if it is not properly configured or enforced. This detection is important for defenders because successful password resets can lead to a complete account takeover, allowing attackers to access sensitive data, resources, and systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li>The attacker attempts to log in to an Azure AD-protected resource using the compromised credentials.</li>
<li>The attacker fails to authenticate, either because they do not have the correct password or MFA is enabled.</li>
<li>The attacker initiates a password reset request using the &ldquo;Forgot password&rdquo; feature or a similar mechanism.</li>
<li>Azure AD sends a password reset verification code or link to the user&rsquo;s registered email address or phone number.</li>
<li>If the attacker controls the registered email address or phone number (due to prior compromise), they can access the verification code or link.</li>
<li>The attacker uses the verification code or link to set a new password for the user&rsquo;s Azure AD account.</li>
<li>The attacker logs in to the Azure AD account with the new password, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets by attackers can lead to complete account takeover, allowing them to access sensitive data, resources, and systems protected by Azure AD. This can result in data breaches, financial loss, reputational damage, and disruption of business operations. The impact depends on the privileges and permissions assigned to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Password Reset By User Account</code> to your SIEM to detect user-initiated password resets in Azure AD audit logs.</li>
<li>Investigate any detected password resets, especially those initiated by users who have not recently requested a password change.</li>
<li>Review and enforce multi-factor authentication (MFA) policies to prevent attackers from bypassing password-based authentication.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to password resets, such as multiple failed login attempts followed by a successful reset.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>password-reset</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>credential-access</category><category>stealth</category></item><item><title>AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</guid><description>This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.</description><content:encoded><![CDATA[<p>This detection rule identifies lateral movement in AWS environments stemming from Kubernetes service accounts utilizing <code>AssumeRoleWithWebIdentity</code>. It focuses on detecting instances where credentials obtained via this method are subsequently used to perform several distinct AWS control-plane actions within a single session. This behavior deviates from typical pod traffic and could signify unauthorized access or privilege escalation. The rule prioritizes the detection of sensitive API usage, including reconnaissance activities, access to secrets, IAM modifications, and compute creation events, while strategically excluding high-volume S3 data-plane operations to minimize false positives. The targeted environments are those leveraging EKS IAM Roles for Service Accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A Kubernetes service account projects a token.</li>
<li>The service account uses <code>AssumeRoleWithWebIdentity</code> to exchange the token for short-lived IAM credentials.</li>
<li>The attacker leverages the assumed role to perform reconnaissance activities such as <code>ListUsers</code>, <code>ListRoles</code>, and <code>DescribeInstances</code>.</li>
<li>The attacker attempts to access secrets using actions like <code>GetSecretValue</code> and <code>ListSecrets</code>.</li>
<li>The attacker escalates privileges by modifying IAM policies with actions like <code>AttachRolePolicy</code> and <code>PutRolePolicy</code>.</li>
<li>The attacker attempts to create new users or roles within the AWS environment using actions like <code>CreateUser</code> and <code>CreateRole</code>.</li>
<li>The attacker performs lateral movement using actions like <code>SendCommand</code> and <code>StartSession</code>.</li>
<li>The attacker attempts to evade detection by stopping logging with the <code>StopLogging</code> action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, privilege escalation, and the potential compromise of the entire AWS environment. Lateral movement within the AWS infrastructure allows attackers to gain access to critical systems and data, potentially leading to data breaches, service disruptions, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious activity related to <code>AssumeRoleWithWebIdentity</code> and tune for your environment.</li>
<li>Review and harden IAM role trust policies associated with Kubernetes service accounts, specifically focusing on OIDC trust conditions, as referenced in the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html">IAM OIDC identity provider</a> documentation.</li>
<li>Implement strict least privilege principles for Kubernetes service accounts, limiting their access to only the necessary AWS resources, as covered in <a href="https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html">EKS IAM roles for service accounts</a>.</li>
<li>Monitor CloudTrail logs for <code>AssumeRoleWithWebIdentity</code> events followed by suspicious API calls, focusing on the actions listed in the Sigma rule detection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kubernetes</category><category>lateral-movement</category><category>credential-access</category><category>discovery</category></item><item><title>Potential Shadow Credentials added to AD Object</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</link><pubDate>Wed, 03 Jan 2024 14:57:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-credentials/</guid><description>This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.</description><content:encoded><![CDATA[<p>The &ldquo;Shadow Credentials&rdquo; attack involves manipulating the <code>msDS-KeyCredentialLink</code> attribute in Active Directory (AD) to gain unauthorized access to user or computer accounts. Attackers can create a key pair, append the raw public key to the attribute, and authenticate as the target object. This technique allows for persistent and stealthy access, as it leverages Kerberos key trust account mapping. The original detection rule was created in January 2022 and last updated in April 2026. This attack abuses control over an object to create the shadow credentials. Defenders should monitor for modifications to the <code>msDS-KeyCredentialLink</code> attribute, especially those not associated with legitimate Azure AD Connect or ADFS provisioning.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains initial access to a system with sufficient privileges to modify Active Directory objects.</li>
<li><strong>Discovery:</strong> The attacker identifies a target user or computer object within Active Directory to compromise.</li>
<li><strong>Credential Access:</strong> The attacker generates a new key pair.</li>
<li><strong>Privilege Escalation:</strong> The attacker modifies the <code>msDS-KeyCredentialLink</code> attribute of the target object to include the attacker&rsquo;s public key. This requires specific permissions on the target object.</li>
<li><strong>Persistence:</strong> The attacker uses the private key to authenticate as the target object, bypassing normal authentication mechanisms.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised account to move laterally within the network, accessing resources and systems.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as data exfiltration, system compromise, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent and stealthy access to Active Directory objects, potentially compromising sensitive accounts and resources. Shadow Credentials can be used to bypass multi-factor authentication and other security controls, leading to significant data breaches or system-wide compromises. Without proper monitoring and alerting, these attacks can remain undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows Security Event Logs, specifically event ID 5136, for modifications to the <code>msDS-KeyCredentialLink</code> attribute as described in the rule description.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious modifications to the <code>msDS-KeyCredentialLink</code> attribute, and tune for your environment.</li>
<li>Implement strict access controls and auditing on Active Directory objects, particularly those with sensitive privileges, to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the <code>winlog.event_data.ObjectDN</code>, <code>winlog.event_data.SubjectUserName</code>, and <code>winlog.event_data.AttributeValue</code> fields to determine the legitimacy of the changes.</li>
<li>Follow the triage and analysis steps in the rule&rsquo;s <code>note</code> field to investigate alerts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>shadow-credentials</category><category>windows</category></item><item><title>Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting</title><link>https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</guid><description>This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting command-line credential harvesting across multiple cloud platforms. Attackers may attempt to steal application access tokens or extract credentials from files by executing specific commands via command-line interfaces (CLIs) for GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, and Kubernetes. This activity is particularly concerning when originating from the same host within a short time frame (e.g., five minutes), potentially indicating automated credential theft. This technique can lead to unauthorized access to cloud resources, data breaches, and lateral movement within cloud environments. Defenders should monitor for suspicious command-line activity involving cloud CLIs and credential access patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses a shell (cmd.exe, PowerShell, bash, etc.) to execute cloud CLI commands.</li>
<li>The attacker executes commands to list available credentials or tokens (e.g., <code>aws configure list</code>, <code>az account list</code>, <code>kubectl config view</code>).</li>
<li>The attacker executes commands to print access tokens for various cloud providers (e.g., <code>gcloud auth print-access-token</code>, <code>az account get-access-token</code>, <code>gh auth token</code>).</li>
<li>The attacker uses credential harvesting commands across multiple cloud platforms within a short timeframe.</li>
<li>The attacker exfiltrates the harvested credentials to a remote location.</li>
<li>The attacker uses the stolen credentials to access sensitive cloud resources and data.</li>
<li>The attacker performs lateral movement within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive cloud resources, data breaches, and lateral movement within cloud environments. The impact includes potential data exfiltration, service disruption, and financial loss. The number of affected victims will depend on the scope of the compromised credentials and the attacker&rsquo;s ability to exploit them.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Multi-Cloud CLI Token and Credential Access Commands&rdquo; to your SIEM to detect suspicious command-line activity related to cloud credential harvesting.</li>
<li>Review <code>Esql.process_command_line_values</code> in the rule output to identify the exact commands executed and determine if the activity was legitimate or malicious.</li>
<li>Correlate the detected activity with authentication, Kubernetes audit, and cloud API logs to confirm unauthorized access and misuse of printed tokens.</li>
<li>Implement monitoring and alerting for unusual CLI activity originating from user workstations or build servers, focusing on the CLIs mentioned in the Overview section.</li>
<li>Follow vendor-specific guidance to revoke compromised credentials, such as revoking tokens and rotating secrets, as outlined in the rule&rsquo;s &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>cli</category><category>token-harvesting</category></item><item><title>AWS Identity Center Identity Provider Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</guid><description>An adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.</description><content:encoded><![CDATA[<p>AWS Identity Center (formerly AWS SSO) enables centralized management of access to AWS accounts and applications. Attackers can manipulate the configured identity provider to gain unauthorized access. The modification of the configured Identity Provider (IdP) within AWS Identity Center can lead to a full compromise of the AWS environment. By associating a malicious directory or disabling/disassociating legitimate directories, attackers can potentially establish persistent access, escalate privileges, and impersonate legitimate users. This can be achieved by utilizing compromised AWS credentials or exploiting vulnerabilities in the AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via compromised AWS credentials or by exploiting an AWS vulnerability.</li>
<li>The attacker enumerates the current AWS Identity Center configuration to identify the currently associated directory.</li>
<li>The attacker disassociates the existing, legitimate directory using <code>DisassociateDirectory</code>.</li>
<li>The attacker associates a malicious directory they control using <code>AssociateDirectory</code>. This malicious directory is configured to impersonate legitimate users.</li>
<li>Alternatively, the attacker disables external IdP configuration for the directory using <code>DisableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker enables external IdP configuration for the directory, pointing to an attacker-controlled IdP, using <code>EnableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker uses the malicious or attacker-controlled IdP to authenticate as legitimate users, gaining access to AWS resources.</li>
<li>The attacker performs malicious actions within the AWS environment, such as data exfiltration or resource destruction.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the AWS Identity Center identity provider can lead to complete compromise of an AWS environment. Attackers can gain persistent access, escalate privileges, and impersonate legitimate users. This can result in data breaches, service disruption, financial loss, and reputational damage. The impact can extend to all AWS accounts and applications managed by the compromised Identity Center instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized changes to the AWS Identity Center identity provider.</li>
<li>Investigate any detected events related to <code>AssociateDirectory</code>, <code>DisableExternalIdPConfigurationForDirectory</code>, <code>DisassociateDirectory</code>, or <code>EnableExternalIdPConfigurationForDirectory</code> in AWS CloudTrail logs.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and users to reduce the risk of credential compromise.</li>
<li>Review and restrict IAM permissions to minimize the blast radius of compromised credentials.</li>
<li>Monitor AWS CloudTrail logs for unusual activity patterns that might indicate malicious directory association attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>identity</category><category>persistence</category><category>credential-access</category><category>defense-evasion</category></item><item><title>Suspicious Process Accessing Browser Password Store</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</guid><description>Detection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to browser password stores, a technique commonly employed by credential-stealing malware such as Snake Keylogger. These attackers aim to exfiltrate sensitive information, including stored credentials and browsing history, by accessing browser user data profiles. This activity is detected by monitoring Windows Security Event logs (EventCode 4663) and comparing process access patterns against an expected list of browser applications via the <code>browser_app_list</code> lookup table. The detection identifies processes that are not recognized as legitimate browser applications but are attempting to access browser user data. This technique has been observed in trojan stealers, where credential access is a key component of their information-gathering strategy. This method allows defenders to quickly pivot and discover potentially malicious processes on the system, such as credential stealers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads and executes a malicious file, often disguised as a legitimate application or document.</li>
<li>The malicious file executes, dropping a stealer component into the system.</li>
<li>The stealer process initiates an attempt to access browser user data profiles.</li>
<li>Windows generates a Security Event Log (EventCode 4663) when the stealer attempts to access a browser data file.</li>
<li>The detection analytic identifies processes accessing the browser data folder not present in the <code>browser_app_list</code> lookup file.</li>
<li>The stealer process reads sensitive information, such as usernames, passwords, and browsing history, from the accessed files.</li>
<li>The collected data is staged for exfiltration, potentially compressed or encrypted.</li>
<li>The stolen credentials and information are exfiltrated to a command-and-control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of user credentials, potentially granting attackers unauthorized access to sensitive accounts and systems. This can result in data breaches, financial loss, and reputational damage. The Snake Keylogger, for example, is known to target credentials, potentially impacting a wide range of users and organizations. Other stealers like Meduza Stealer, 0bj3ctivity Stealer, and BlankGrabber Stealer also utilize similar techniques, showing the widespread impact. The impact spans across various sectors, as credential theft is a generic attack applicable to almost any environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logging, specifically event code 4663, with auditing enabled for both success and failure events, to capture object access attempts (reference: search description).</li>
<li>Populate and maintain the <code>browser_app_list</code> lookup table with known and allowed browser processes and their associated paths (reference: search description).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect anomalous processes accessing browser password stores, and tune it for your specific environment (reference: rules).</li>
<li>Investigate any alerts generated by the Sigma rule to identify potentially compromised systems and user accounts (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-access</category><category>stealer</category><category>windows</category></item><item><title>Azure Application URI Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</link><pubDate>Wed, 03 Jan 2024 14:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</guid><description>Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers may modify application URIs within Azure Active Directory to redirect users or applications to malicious resources, obtain unauthorized access, or establish persistence. The modification of an application&rsquo;s URI can be a subtle but effective technique for gaining a foothold in an environment. By manipulating the URI settings, attackers can redirect traffic to attacker-controlled servers, intercept credentials, or perform other malicious actions. This activity is often difficult to detect because it can blend in with legitimate administrative tasks. Investigation is merited if URIs for domain names no longer exist, are not using HTTPS, have wildcards at the end of the domain, are not unique to that app, or point to domains that the organization does not control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Azure Active Directory portal.</li>
<li>The attacker locates a target application registration.</li>
<li>The attacker modifies the application&rsquo;s URI settings, such as the reply URLs or identifier URIs.</li>
<li>The attacker configures the URI to point to a malicious server or a phishing page.</li>
<li>Users or applications are redirected to the malicious URI when attempting to authenticate or access the application.</li>
<li>The attacker intercepts credentials or performs other malicious actions.</li>
<li>The attacker establishes persistence by maintaining control over the application&rsquo;s URI settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to credential theft, data breaches, or unauthorized access to sensitive resources. By compromising application URIs, attackers can redirect users to phishing pages, intercept credentials, or gain a foothold in the environment for further exploitation. This activity can be difficult to detect and can have a significant impact on the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Application URI Configuration Changes</code> to your SIEM to detect suspicious modifications to application URIs in Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Application URI Configuration Changes</code> to determine if the URI modification is legitimate or malicious.</li>
<li>Monitor Azure Audit Logs for any changes to application URI settings (as indicated by <code>properties.message: Update Application Sucess- Property Name AppAddress</code>) and validate the legitimacy of the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>application</category><category>uri</category><category>modification</category><category>persistence</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Suspicious CertUtil Commands Used for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-certutil/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-certutil/</guid><description>Attackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.</description><content:encoded><![CDATA[<p>CertUtil is a command-line utility included with Windows, designed for managing digital certificates and certificate services. Attackers frequently abuse it to &ldquo;live off the land&rdquo; by downloading malware, deobfuscating files, and establishing command and control channels within compromised environments. This activity leverages certutil.exe to perform actions typically associated with malicious payloads, blending in with legitimate system activity and evading traditional security measures. The tool&rsquo;s capability to encode, decode, and retrieve files from URLs makes it a versatile asset for attackers aiming to maintain a low profile while executing malicious operations. This detection focuses on identifying specific command-line arguments indicative of this abuse, such as those used for encoding, decoding, and URL retrieval.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access through an undisclosed means (e.g., phishing, exploit).</li>
<li>The attacker executes certutil.exe via cmd.exe or PowerShell.</li>
<li>Certutil is used with the <code>urlcache</code> parameter to download a malicious payload from a remote server.</li>
<li>Certutil uses the <code>decode</code> parameter to decode a base64-encoded payload, saving it to disk.</li>
<li>The attacker uses certutil with <code>encodehex</code> to encode a binary into a hexadecimal representation to evade signature-based detection.</li>
<li>The attacker then uses certutil with <code>decodehex</code> to decode the hexadecimal encoded data.</li>
<li>The attacker executes the decoded payload, gaining further control of the system.</li>
<li>The attacker establishes a command and control channel, using certutil to encode/decode communications.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to download and execute arbitrary code, bypass security measures, and maintain persistence within the compromised system. This can lead to data exfiltration, system compromise, and further propagation of the attack within the network. The lack of directly observed IOCs in the originating advisory limits quantification of victim count and impact scope, but the technique is widely applicable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious CertUtil Usage for Encoding/Decoding&rdquo; to detect abuse of encoding/decoding functions within certutil.exe, focusing on unusual file types or destinations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious CertUtil URL Download&rdquo; to identify certutil.exe being used to download files from URLs, and tune the rule based on known good software deployment practices.</li>
<li>Enable Sysmon process creation logging to ensure the rules above function correctly by capturing command-line arguments (as referenced in the logsource for each rule).</li>
<li>Review historical process execution logs for instances of certutil.exe using suspicious parameters like <code>decode</code>, <code>encode</code>, <code>urlcache</code>, <code>verifyctl</code>, <code>encodehex</code>, <code>decodehex</code>, or <code>exportPFX</code> to identify potentially compromised systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>credential-access</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Windows Remote Desktop Network Bruteforce Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</guid><description>This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.</description><content:encoded><![CDATA[<p>This analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. It detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity. This activity can lead to account compromise and potential ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker scans the network to identify systems with open RDP ports (TCP 3389).</li>
<li>The attacker initiates multiple RDP connection attempts to a target host, using a list of common usernames and passwords or compromised credentials.</li>
<li>The firewall logs each connection attempt, recording the source and destination IPs, ports, and timestamps.</li>
<li>Sysmon logs the network connections with Event ID 3.</li>
<li>The attacker continues to attempt connections, typically exceeding 10 attempts within an hour.</li>
<li>Upon successful authentication, the attacker gains unauthorized access to the target system.</li>
<li>The attacker may then install malware, move laterally, or exfiltrate sensitive data.</li>
<li>The attacker might deploy ransomware like SamSam or Ryuk, as referenced in external reports.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RDP brute force attacks can lead to unauthorized access to systems, data breaches, malware infections, and ransomware deployment. Compromised systems can be used as a staging point for further attacks within the network. The references indicate that ransomware attacks have been delivered using RDP brute-force techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure network traffic data is populating the Network_Traffic data model to enable the provided search query.</li>
<li>Deploy the Sigma rule <code>RDP Bruteforce via Network Traffic</code> to detect brute force attempts based on network connection patterns.</li>
<li>Adjust the count and duration thresholds in the detection query to tune the sensitivity for your environment.</li>
<li>Investigate source IPs identified by the detection rule as potential attackers.</li>
<li>Monitor Sysmon EventID 3 for network connections to detect RDP brute-force attempts.</li>
<li>Review the referenced Zscaler and ReliaQuest articles for additional context and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rdp</category><category>bruteforce</category><category>credential-access</category><category>windows</category><category>network</category></item><item><title>Unsecured Outlook Credentials Access in Windows Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-unsecured-outlook-credentials-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unsecured-outlook-credentials-access/</guid><description>An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.</description><content:encoded><![CDATA[<p>Attackers may attempt to access unsecured Outlook credentials stored within the Windows registry to compromise user email accounts. This involves leveraging tools or scripts to directly read sensitive registry keys containing password or authentication information. This activity often occurs after initial access has been gained through phishing, exploitation of vulnerabilities, or other means. Successful compromise of Outlook credentials can lead to significant data breaches, financial losses, and reputational damage. The credential access activity is detected via Windows Security Event logs, specifically Event ID 4663, focusing on registry paths associated with Outlook profiles. Multiple stealers and keyloggers have been observed utilizing this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via phishing, exploiting vulnerabilities, or other methods.</li>
<li>The attacker executes a malicious process (e.g., Snake Keylogger) on the compromised system.</li>
<li>The malicious process attempts to access the Windows registry using standard Windows APIs.</li>
<li>The process targets specific registry paths where Outlook stores profile information: <code>*\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676*</code> and <code>*\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676*</code>.</li>
<li>Windows Security Event logging generates Event ID 4663 when the registry object is accessed.</li>
<li>The attacker extracts the unsecured Outlook credentials from the registry.</li>
<li>The attacker uses the stolen credentials to access the victim&rsquo;s Outlook account.</li>
<li>The attacker exfiltrates sensitive information, sends malicious emails, or performs other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Outlook credentials can lead to unauthorized access to email accounts, enabling attackers to steal sensitive information, impersonate users, and conduct further malicious activities. This can result in significant financial losses, data breaches, and reputational damage. The impact ranges from individual user compromise to enterprise-wide breaches depending on the scope of the attack. Threat actors may use compromised accounts to launch further attacks, potentially impacting other systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy for Windows Security Event logs to track Event ID 4663 (per the &ldquo;how_to_implement&rdquo; section) and monitor registry access.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Outlook Registry Access</code> to identify unauthorized processes accessing Outlook credential registry paths.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Detect Suspicious Outlook Registry Access</code> to determine if credential theft occurred.</li>
<li>Monitor for processes other than <code>outlook.exe</code> accessing the specific registry paths outlined in the <code>search</code> field to identify potentially malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category></item></channel></rss>