<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data-Loss — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/data-loss/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/data-loss/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item><item><title>Appsmith SQL Injection Vulnerability in FilterDataService</title><link>https://feed.craftedsignal.io/briefs/2024-01-appsmith-sql-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appsmith-sql-injection/</guid><description>A SQL injection vulnerability exists in Appsmith's FilterDataServiceCE.java in versions 1.98 and earlier where the dropTable method constructs a SQL DROP TABLE statement using string concatenation with the table name, allowing arbitrary SQL command execution, leading to potential data loss, exfiltration, or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in Appsmith&rsquo;s <code>FilterDataServiceCE.java</code>, specifically within the <code>dropTable</code> method. This flaw affects Appsmith server instances running versions 1.98 and earlier of the <code>interfaces</code> package. The vulnerability stems from the direct concatenation of user-supplied table names into a SQL <code>DROP TABLE</code> statement without proper sanitization or validation. If an attacker can control the <code>tableName</code> argument, they can inject arbitrary SQL commands, potentially leading to unauthorized data manipulation, exfiltration, or data loss. This is particularly concerning in scenarios where the <code>dropTable</code> function is exposed through an API or utility accessible to users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Appsmith instance running a vulnerable version (&lt;= 1.98) of the <code>interfaces</code> package.</li>
<li>The attacker discovers an endpoint or API that utilizes the <code>FilterDataServiceCE.java</code>&rsquo;s <code>dropTable</code> method.</li>
<li>The attacker crafts a malicious <code>tableName</code> input containing SQL injection payload. Example: <code>valid_table; DROP TABLE users; --</code>.</li>
<li>The malicious input is passed to the <code>dropTable</code> method within <code>FilterDataServiceCE.java</code>.</li>
<li>The <code>dropTable</code> method concatenates the unsanitized input into a SQL <code>DROP TABLE</code> statement.</li>
<li>The resulting SQL query, containing the injected commands, is executed against the database via the <code>executeDbQuery</code> method.</li>
<li>The injected SQL commands are executed, potentially dropping tables, modifying data, or exfiltrating sensitive information, depending on the attacker&rsquo;s payload and the database user&rsquo;s permissions.</li>
<li>The attacker achieves their objective, such as data loss through arbitrary table deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. The primary impact is data loss, as attackers can arbitrarily drop tables within the database. Depending on the database user&rsquo;s privileges, attackers may also be able to exfiltrate sensitive data or modify existing data. The vulnerability affects Appsmith server instances. The number of affected instances is currently unknown. However, the potential impact includes unauthorized access to and manipulation of sensitive data, impacting the confidentiality, integrity, and availability of the Appsmith application and its underlying database.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Appsmith <code>interfaces</code> package to a version greater than 1.98 to patch the SQL injection vulnerability in <code>FilterDataServiceCE.java</code>.</li>
<li>Implement input validation and sanitization on any endpoints or APIs that utilize the <code>dropTable</code> method to prevent SQL injection attacks.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit this SQL injection vulnerability by monitoring for suspicious table names in logs associated with database operations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>data-loss</category><category>appsmith</category></item><item><title>phpVMS Unauthenticated Access to Legacy Import Feature</title><link>https://feed.craftedsignal.io/briefs/2024-01-phpvms-auth-bypass/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-phpvms-auth-bypass/</guid><description>A critical vulnerability exists in phpVMS 7.x versions up to 7.0.5, allowing unauthenticated access to a legacy import feature, enabling a remote attacker to trigger internal processes that can modify or delete application data, potentially leading to data loss and service disruption.</description><content:encoded><![CDATA[<p>A critical vulnerability has been identified in phpVMS 7.x, specifically affecting versions up to 7.0.5. This vulnerability stems from a deprecated legacy import feature that, despite its intended obsolescence, remained partially accessible without authentication. A remote, unauthenticated attacker could exploit this flaw to interact with internal processes responsible for data manipulation within the application. The vulnerability was addressed in phpVMS version 7.0.6, which removes public access to the vulnerable feature, highlighting the importance of prompt patching to mitigate the risk of unauthorized data modification or deletion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the <code>/importer</code> endpoint.</li>
<li>The application fails to properly validate the request, granting access to the legacy import feature.</li>
<li>The attacker leverages the exposed import functionality to initiate a data manipulation process.</li>
<li>The application executes the attacker-initiated process without proper authorization checks.</li>
<li>The import process modifies or deletes data within the application&rsquo;s database.</li>
<li>The attacker repeats the process to maximize data corruption or deletion.</li>
<li>The application becomes unstable or unusable due to the corrupted database.</li>
<li>Service disruption occurs, impacting all users of the phpVMS system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The exploitation of this vulnerability in phpVMS can lead to significant data loss and service disruption. An attacker can remotely trigger the modification or deletion of critical application data without any authentication. This can result in a complete loss of data integrity, rendering the application unusable. The specific number of potential victims is dependent on the number of phpVMS instances running vulnerable versions (&lt;= 7.0.5). Successful exploitation can lead to extended downtime and significant recovery efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to phpVMS version 7.0.6 or later to remediate <strong>CVE-2026-42569</strong>.</li>
<li>If immediate upgrade is not feasible, follow the instructions provided in the release notes for version 7.0.6 to disable the vulnerable <code>/importer</code> routes.</li>
<li>Deploy the provided Sigma rule to monitor for suspicious requests to the <code>/importer</code> endpoint, indicative of attempted exploitation.</li>
<li>Enable web server access logging and review logs for unauthorized access attempts to the <code>/importer</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization-bypass</category><category>data-loss</category><category>phpvms</category></item></channel></rss>