<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cryptography — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cryptography/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 07:46:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cryptography/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</guid><description>CVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-1005 describes an integer underflow vulnerability within a Microsoft product&rsquo;s implementation of AES-GCM, CCM, and ARIA-GCM decryption algorithms. This flaw allows an attacker to trigger an out-of-bounds memory access. While the specific product affected is not detailed in the provided source, the vulnerability lies within the cryptographic functions used for data decryption, indicating a potential impact on confidentiality and integrity. Successful exploitation could allow an attacker to execute arbitrary code or disclose sensitive information. Given the widespread use of these encryption algorithms, this vulnerability poses a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system utilizing the vulnerable Microsoft product and its AES-GCM/CCM/ARIA-GCM decryption implementation.</li>
<li>Attacker crafts a malicious input designed to trigger the integer underflow during the decryption process.</li>
<li>The crafted input is sent to the vulnerable system for decryption. This could be via a network protocol, file processing, or other data ingestion method.</li>
<li>The vulnerable decryption routine processes the input, leading to an integer underflow.</li>
<li>The integer underflow results in an out-of-bounds memory access during the decryption operation.</li>
<li>This out-of-bounds memory access allows the attacker to read sensitive data from memory locations outside the intended buffer.</li>
<li>Alternatively, the attacker leverages the out-of-bounds write to overwrite critical data structures or executable code within the process&rsquo;s memory space.</li>
<li>If code is overwritten, the attacker gains arbitrary code execution within the context of the vulnerable process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-1005 could lead to unauthorized information disclosure, allowing attackers to steal sensitive data that was intended to be protected by encryption. In a more severe scenario, the vulnerability can be leveraged for arbitrary code execution, enabling attackers to gain control over the affected system. The lack of specific product information makes it difficult to quantify the exact number of potential victims, but the vulnerability&rsquo;s presence in widely used cryptographic functions implies a broad impact across various sectors and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected memory access patterns in processes performing AES-GCM/CCM/ARIA-GCM decryption, using a host-based intrusion detection system (HIDS).</li>
<li>Deploy the Sigma rule &ldquo;Detect Potential Exploitation of CVE-2026-1005&rdquo; to identify suspicious processes that might be exploiting the vulnerability.</li>
<li>Apply any available patches or updates released by Microsoft to address CVE-2026-1005 as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>cryptography</category><category>memory corruption</category><category>aes-gcm</category></item><item><title>Suspicious PowerShell Script Using Cryptography Namespace</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</guid><description>The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting suspicious PowerShell activity involving the System.Security.Cryptography namespace, excluding common hashing algorithms like SHA and MD5. The detection leverages Windows PowerShell Script Block Logging (EventCode 4104) to identify scripts using cryptographic functions. This is significant because malware often uses cryptography to decrypt or decode additional malicious payloads, which can lead to further code execution, privilege escalation, or persistence within the compromised environment. The technique is commonly used by malware families like AsyncRAT, XWorm, and VIP Keylogger. Defenders should investigate the parent process of such scripts, the decrypted data, network connections established by the script, and the user context in which the script is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system.</li>
<li>The PowerShell script utilizes the <code>System.Security.Cryptography</code> namespace to perform cryptographic operations.</li>
<li>The script decrypts or decodes a malicious payload (e.g., a second-stage executable or configuration file).</li>
<li>The decrypted payload is written to disk or loaded directly into memory.</li>
<li>The attacker executes the decrypted payload, potentially establishing persistence via registry keys or scheduled tasks.</li>
<li>The malware leverages the established persistence mechanism for long-term access.</li>
<li>The attacker performs malicious actions such as data exfiltration, lateral movement, or remote command execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security measures by hiding malicious code within encrypted payloads. This can lead to data theft, system compromise, and further propagation within the network. Malware families like AsyncRAT, XWorm, and VIP Keylogger use this technique to maintain persistence and perform malicious activities undetected. The impact can range from individual workstation compromise to large-scale data breaches depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to generate the necessary logs (EventCode 4104) for detection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> to your SIEM to detect the described activity.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, decrypted data, network connections, and the user executing the script.</li>
<li>Review and tune the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> based on your environment&rsquo;s specific needs and known-good PowerShell usage to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted PowerShell scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>cryptography</category><category>malware</category><category>asyncrat</category><category>xworm</category><category>vip keylogger</category></item><item><title>Heap/Stack Overflow in rust-openssl with OpenSSL 1.1.x</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-openssl-overflow/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-openssl-overflow/</guid><description>The rust-openssl crate's `Deriver::derive` and `PkeyCtxRef::derive` functions can cause heap/stack overflows when used with OpenSSL 1.1.x due to insufficient buffer length validation in X25519, X448, DH, and HKDF-extract, affecting rust-openssl versions &gt;= 0.9.27 and &lt; 0.10.78.</description><content:encoded><![CDATA[<p>The <code>rust-openssl</code> crate, specifically the <code>Deriver::derive</code> and <code>PkeyCtxRef::derive</code> functions, is vulnerable to a heap/stack overflow when used in conjunction with OpenSSL version 1.1.x. This occurs because the <code>EVP_PKEY_derive</code> function in OpenSSL 1.1.x fails to properly validate the input buffer length when used with X25519, X448, DH, and HKDF-extract. These key derivation functions unconditionally write the full shared secret (32/56/prime-size bytes) regardless of the buffer size provided by the caller, leading to a buffer overflow if the provided slice is too small. This vulnerability affects rust-openssl versions &gt;= 0.9.27 and &lt; 0.10.78. This vulnerability is mitigated in OpenSSL 3.x because the providers check buffer length.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious application using the <code>rust-openssl</code> crate.</li>
<li>The application uses <code>Deriver::derive</code> or <code>PkeyCtxRef::derive</code> with an X25519, X448, DH, or HKDF-extract key agreement algorithm.</li>
<li>The application provides a buffer smaller than the expected output size of the key derivation function (32 bytes for X25519, 56 bytes for X448, prime-size bytes for DH).</li>
<li>The <code>EVP_PKEY_derive</code> function in OpenSSL 1.1.x is called without proper buffer length validation.</li>
<li>The key derivation function writes the full shared secret to the undersized buffer.</li>
<li>A heap or stack buffer overflow occurs, overwriting adjacent memory.</li>
<li>The attacker gains control of the application&rsquo;s execution flow.</li>
<li>The attacker executes arbitrary code on the target system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary code execution within the context of the vulnerable application. This could allow an attacker to gain complete control of the affected system. The number of victims depends on the prevalence of vulnerable <code>rust-openssl</code> versions being used with OpenSSL 1.1.x. Sectors that rely on <code>rust-openssl</code> for cryptographic operations are at higher risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>rust-openssl</code> crate to version &gt;= 0.10.78 to patch the vulnerability (see Overview).</li>
<li>If upgrading <code>rust-openssl</code> is not immediately feasible, ensure that OpenSSL is upgraded to version 3.x, where the buffer length is checked (see Overview).</li>
<li>Implement runtime checks to validate buffer lengths before calling <code>Deriver::derive</code> and <code>PkeyCtxRef::derive</code> when using X25519, X448, DH, or HKDF-extract (see Attack Chain).</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts (see Rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openssl</category><category>buffer-overflow</category><category>rust</category><category>cryptography</category></item><item><title>CVE-2018-0735 ECDSA Signature Generation Timing Attack</title><link>https://feed.craftedsignal.io/briefs/2024-01-ecdsa-timing-attack/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ecdsa-timing-attack/</guid><description>CVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.</description><content:encoded><![CDATA[<p>CVE-2018-0735 describes a timing attack vulnerability affecting the Elliptic Curve Digital Signature Algorithm (ECDSA) implementation within certain Microsoft products. Successful exploitation of this vulnerability could allow a remote attacker to recover the private key used to generate digital signatures. The vulnerability stems from the time it takes to generate signatures, which varies in ways predictable to an attacker. ECDSA is commonly used for authentication and encryption, making this a serious concern. While the specific affected products are not detailed without enabling JavaScript on the source webpage, the vulnerability has the potential to impact various applications and services that rely on Microsoft&rsquo;s ECDSA implementation for cryptographic operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to limited information from the source, a detailed attack chain is not available. However, a general ECDSA timing attack would involve the following steps:</p>
<ol>
<li>The attacker identifies a target system or application utilizing a vulnerable ECDSA implementation from Microsoft.</li>
<li>The attacker initiates a series of signature requests, potentially through legitimate or malicious channels depending on the application.</li>
<li>The attacker measures the time taken to generate each signature with high precision.</li>
<li>The attacker performs statistical analysis on the timing data, looking for correlations between the timing and the secret nonce value used during signature generation.</li>
<li>Through repeated signature requests and timing analysis, the attacker reconstructs the secret nonce value used in multiple signature generations.</li>
<li>Once the attacker obtains sufficient nonce values and corresponding signatures, they can recover the private key used for signing.</li>
<li>With the private key, the attacker can forge signatures, impersonate the legitimate entity, and potentially gain unauthorized access to sensitive data or systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-0735 could allow an attacker to recover the private key used for ECDSA signature generation. This could lead to a complete compromise of trust, as the attacker can forge signatures and impersonate the legitimate entity. The impact would vary depending on the specific application, but potential consequences include unauthorized access to systems, data breaches, and the ability to install malware or conduct man-in-the-middle attacks. The number of affected systems would depend on the widespread use of the vulnerable ECDSA implementation within Microsoft products.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Consult Microsoft&rsquo;s Security Update Guide (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2018-0735">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2018-0735</a>) for specific affected products and available patches to mitigate CVE-2018-0735.</li>
<li>Although a specific network IOC is unavailable, monitor network traffic for unusual patterns or high volumes of signature requests originating from single sources to potentially detect reconnaissance activity related to timing attacks.</li>
<li>Enable detailed logging of cryptographic operations to enable investigation in case of suspicion of private key compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ecdsa</category><category>timing-attack</category><category>cryptography</category></item></channel></rss>