<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Discovery — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/discovery/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:18:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/discovery/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Direct Kubelet API Access via Process Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</link><pubDate>Mon, 04 May 2026 21:18:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</guid><description>This rule detects potential direct Kubelet API access attempts on Linux by identifying process executions whose arguments contain URLs targeting Kubelet ports (10250/10255) enabling discovery and lateral movement in Kubernetes environments.</description><content:encoded><![CDATA[<p>This detection identifies potential direct Kubelet API access attempts on Linux systems. The Kubelet, acting as the primary node agent, exposes an API accessible via ports 10250 and 10255. Attackers may exploit this API to enumerate pods, fetch logs, or even attempt remote execution. This access can lead to significant breaches in Kubernetes environments, facilitating discovery, lateral movement, and ultimately, compromise of sensitive data or control over cluster resources. The detection focuses on identifying process executions where the command-line arguments contain URLs targeting these Kubelet ports, indicating a potential attempt to interact with the Kubelet API directly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the Kubernetes cluster or a host with network access to the Kubelet ports.</li>
<li>The attacker uses a utility like <code>curl</code>, <code>wget</code>, <code>python</code>, or similar tools to craft an HTTP request targeting the Kubelet API on ports 10250 or 10255.</li>
<li>The request includes a path like <code>/pods</code>, <code>/runningpods</code>, <code>/metrics</code>, <code>/exec</code>, or <code>/containerLogs</code> to gather information about the cluster&rsquo;s state and configuration.</li>
<li>The attacker examines the response to identify potential targets for lateral movement, such as specific pods or containers of interest.</li>
<li>The attacker attempts to execute commands within a container using the <code>/exec</code> endpoint, potentially leveraging exposed service account tokens or other credentials.</li>
<li>The attacker uses gathered information to move laterally to other pods or nodes within the cluster, escalating privileges as they go.</li>
<li>The attacker compromises sensitive data or critical applications running within the Kubernetes cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full cluster compromise. Attackers can gain unauthorized access to sensitive data, disrupt critical applications, and move laterally to other resources within the Kubernetes environment. This could lead to significant financial losses, reputational damage, and legal liabilities. The potential impact includes data breaches, denial of service, and complete control over the Kubernetes infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubelet API Access via Process Arguments</code> to your SIEM to detect suspicious process executions.</li>
<li>Restrict access to Kubelet ports 10250/10255 at the network layer to limit pod-to-node or host-to-node traffic as recommended in the overview section.</li>
<li>Harden Kubelet configuration by disabling anonymous authentication and enforcing webhook authentication/authorization as described in the overview section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>kubelet</category><category>lateral-movement</category><category>discovery</category><category>execution</category><category>linux</category></item><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>AWS EC2 Role GetCallerIdentity from New Source AS Organization</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-ec2-role-getcalleridentity/</guid><description>The rule detects when an EC2 instance role session calls AWS STS GetCallerIdentity from a new source autonomous system (AS) organization name, indicating potential credential theft and verification from outside expected egress paths.</description><content:encoded><![CDATA[<p>This detection identifies when an EC2 instance role session calls the AWS STS GetCallerIdentity API from a source Autonomous System (AS) Organization name that has not been previously observed. The GetCallerIdentity API is often used by adversaries to validate stolen instance role credentials from infrastructure outside the victim&rsquo;s normal egress points. By baselining the combination of identity and source network, the rule reduces noise associated with stable NAT or AWS-classified egress, focusing on truly novel access patterns. This detection is specifically designed to complement other rules that may detect general GetCallerIdentity calls, by excluding previously seen combinations of user identity and source AS organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an EC2 instance through methods like exploiting a Server-Side Request Forgery (SSRF) vulnerability, compromising application code or exploiting IMDS abuse.</li>
<li>The attacker leverages the instance&rsquo;s IAM role to obtain temporary AWS credentials.</li>
<li>The attacker attempts to validate the stolen credentials using the <code>GetCallerIdentity</code> API call.</li>
<li>The <code>GetCallerIdentity</code> API call originates from an IP address associated with a new and unexpected Autonomous System Organization (ASO).</li>
<li>The AWS CloudTrail logs record the <code>GetCallerIdentity</code> event, including the user identity ARN and the source AS organization name.</li>
<li>The detection rule triggers due to the new combination of user identity and source AS organization.</li>
<li>The attacker uses the validated credentials to perform reconnaissance and identify valuable resources within the AWS environment (e.g., S3 buckets, databases).</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy malicious workloads using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored within the AWS environment. The attacker may be able to escalate privileges, compromise other resources, and disrupt services. The potential impact includes data breaches, financial loss, and reputational damage. The lack of specific victim counts or sectors targeted suggests a broad applicability across various AWS users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 Role GetCallerIdentity from New Source AS Organization&rdquo; to your SIEM to detect suspicious activity.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on the <code>aws.cloudtrail.user_identity.arn</code> and <code>source.as.organization.name</code> fields.</li>
<li>Monitor AWS CloudTrail logs for <code>GetCallerIdentity</code> API calls, particularly those originating from unfamiliar source IP addresses and ASNs.</li>
<li>Revoke compromised IAM role sessions by stopping the affected EC2 instances or removing the role from the instance profile.</li>
<li>Rotate any long-lived secrets accessible by the EC2 instance, based on the <code>aws.cloudtrail.user_identity.access_key_id</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>getcalleridentity</category><category>ec2</category><category>discovery</category></item><item><title>AWS Discovery API Calls from VPN ASN by New Identity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</guid><description>This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.</description><content:encoded><![CDATA[<p>This detection identifies the first-time occurrence of an IAM principal invoking discovery APIs from a source IP address associated with a known VPN autonomous system number (ASN). The rule focuses on high-signal discovery actions, such as credential checks, account enumeration, bucket inventory, compute inventory, and logging introspection within AWS CloudTrail logs. The goal is to detect potential reconnaissance activities originating from anonymizing networks, which may indicate malicious intent. The rule specifically omits broad <code>List*</code> and <code>Describe*</code> patterns to reduce false positives, focusing instead on a curated list of ASNs commonly associated with VPN providers and hosting services. It&rsquo;s important to validate ASN data using local intelligence and tailor the <code>event.action</code> list based on your environment&rsquo;s baseline. Hosting ASNs are dual-use and require careful monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker initiates a VPN connection to mask their origin and evade geographic restrictions or monitoring. The VPN endpoint&rsquo;s ASN belongs to a known VPN provider.</li>
<li>Using the compromised credentials and VPN connection, the attacker calls the AWS API to execute <code>GetCallerIdentity</code> to validate access.</li>
<li>The attacker enumerates IAM users and roles using <code>ListUsers</code> and <code>ListRoles</code> to map out the AWS environment&rsquo;s identity landscape.</li>
<li>The attacker inventories S3 buckets using <code>ListBuckets</code> to identify potential targets for data exfiltration or manipulation.</li>
<li>The attacker gathers information about EC2 instances, VPCs, and security groups using <code>DescribeInstances</code>, <code>DescribeVpcs</code>, and <code>DescribeSecurityGroups</code> to understand the network infrastructure.</li>
<li>The attacker lists available Lambda functions using <code>ListFunctions</code> to discover potential code execution opportunities.</li>
<li>The attacker collects logging configurations by calling <code>DescribeTrails</code> to identify logging gaps.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging these discovery techniques can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the AWS environment. By mapping out the cloud infrastructure, attackers can identify vulnerabilities and misconfigurations to exploit. Compromised AWS environments can result in data breaches, service disruptions, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS Discovery API Calls from VPN ASN by New Identity</code> to detect anomalous discovery activity originating from VPN ASNs.</li>
<li>Review the curated list of VPN-oriented ASNs within the rule query and update it with local intelligence from sources like RIPE, BGPView, or PeeringDB.</li>
<li>Enable AWS CloudTrail logs to capture the necessary event data for the Sigma rule to function effectively.</li>
<li>Tune the Sigma rule&rsquo;s <code>event.action</code> filter to include additional discovery-related API calls relevant to your environment, based on baseline analysis.</li>
<li>Investigate alerts generated by the Sigma rule by examining <code>aws.cloudtrail.user_identity.arn</code>, <code>event.action</code>, <code>event.provider</code>, <code>source.ip</code>, and <code>source.as.organization.name</code>.</li>
<li>Implement automated response actions, such as revoking sessions or rotating keys, when unexpected discovery activity is detected from VPN ASNs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>discovery</category><category>vpn</category></item><item><title>Rapid Enumeration of AWS S3 Buckets</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</guid><description>An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.</description><content:encoded><![CDATA[<p>This threat brief covers suspicious activity related to the rapid enumeration of AWS S3 buckets. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs from the same source IP address within a short timeframe. This pattern is often associated with reconnaissance efforts, security scanning tools, or post-compromise enumeration activities. The behavior is similar to that observed with CSPM tools and by threat actors like Team PCP. The detection specifically excludes AWS service principals and requires programmatic-style sessions (i.e., not Management Console credentials). It focuses on scenarios where resource and identity fields are populated to avoid skewed results from null values. The detection threshold is set to greater than 15 distinct <code>aws.cloudtrail.resources.arn</code> values within a 10-second window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment using compromised credentials or through an exposed IAM role. (T1530)</li>
<li>The attacker authenticates to AWS using the obtained credentials, creating a programmatic session.</li>
<li>The attacker issues a series of <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code> API calls to S3.</li>
<li>These API calls are directed towards multiple distinct S3 buckets within a short timeframe (10 seconds).</li>
<li>The attacker collects information about the bucket&rsquo;s access control lists (ACLs), public access blocks, policies, versioning status, and other metadata. (T1526, T1580, T1619)</li>
<li>The collected information is analyzed to identify publicly accessible buckets, misconfigurations, or sensitive data storage locations.</li>
<li>The attacker uses identified vulnerabilities to exfiltrate data.</li>
<li>The attacker attempts lateral movement within the AWS environment, leveraging the discovered information to compromise other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of S3 buckets can lead to the discovery of sensitive data, misconfigurations, and publicly accessible resources. This can result in data breaches, unauthorized access, and further compromise of the AWS environment. The enumeration allows an attacker to map out the S3 storage landscape, identifying targets for data exfiltration or privilege escalation. The rapid nature of the enumeration suggests automated scanning or reconnaissance, potentially indicating a larger attack campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect rapid S3 bucket enumeration activity based on AWS CloudTrail logs, adjusting the threshold of 15 distinct buckets to suit your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address (<code>source.ip</code>), AWS principal ARN (<code>aws.cloudtrail.user_identity.arn</code>), and the list of accessed buckets (<code>aws.cloudtrail.resources.arn</code>).</li>
<li>Review IAM policies associated with the identified principal to ensure least privilege for S3 read APIs.</li>
<li>Monitor CloudTrail logs for related events, such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, <code>AssumeRole</code>, or IAM changes, occurring within ±30 minutes of the detected enumeration activity.</li>
<li>Implement network-level restrictions on the source IP address if it is not authorized to perform S3 enumeration.</li>
<li>Document approved scanning accounts and add user agent filters to the provided Sigma rule to reduce noise from those identities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>s3</category><category>cloudtrail</category><category>discovery</category><category>enumeration</category><category>reconnaissance</category></item><item><title>AWS Discovery API Calls via CLI from a Single Resource</title><link>https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-aws-discovery-api-calls/</guid><description>This rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious AWS reconnaissance activity originating from the AWS CLI. It triggers when a single AWS identity (IAM user, role, or service principal) makes more than five unique discovery-related API calls (such as <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, or <code>Generate*</code>) within a 10-second window. The rule is designed to detect adversaries attempting to map out an AWS environment after gaining unauthorized access through compromised credentials or a compromised EC2 instance. The tool focuses on API calls related to key AWS services like EC2, IAM, S3, and KMS. This rule helps defenders identify and respond to early-stage reconnaissance activity, preventing further exploitation or data exfiltration. The rule excludes activity from AWS service accounts and the AWS Management Console, and it requires a minimum stack version of 9.2.0 with AWS integration version 4.6.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains access to an AWS environment, potentially through compromised credentials or by compromising an EC2 instance.</li>
<li><strong>Credential Usage:</strong> The attacker leverages the AWS CLI to interact with the AWS environment using the compromised credentials.</li>
<li><strong>Reconnaissance:</strong> The attacker initiates a series of discovery API calls to gather information about the AWS infrastructure. This includes using <code>Describe*</code>, <code>List*</code>, <code>Get*</code>, and <code>Generate*</code> commands.</li>
<li><strong>Resource Enumeration:</strong> The attacker enumerates various AWS resources, including EC2 instances, IAM roles, S3 buckets, and KMS keys, by querying their respective APIs.</li>
<li><strong>Target Identification:</strong> The attacker analyzes the gathered information to identify potential targets for further exploitation, such as vulnerable EC2 instances or misconfigured S3 buckets.</li>
<li><strong>Privilege Escalation (Optional):</strong> If the compromised credentials have limited permissions, the attacker might attempt to escalate privileges to gain broader access to the AWS environment.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker might attempt to move laterally to other AWS accounts or services to expand their reach and impact.</li>
<li><strong>Data Exfiltration/Impact:</strong> Based on the attacker&rsquo;s goals, they may attempt to exfiltrate sensitive data or cause disruption by modifying or deleting resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to sensitive data, such as customer information, intellectual property, or financial records. The attacker could also disrupt business operations by modifying or deleting critical resources. Identifying and responding to such activity in a timely manner can help prevent significant damage and maintain the security and integrity of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to your SIEM and tune for your environment to detect the described reconnaissance activity.</li>
<li>Enable AWS CloudTrail logging for all AWS regions and accounts in your organization to ensure the required logs are available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the affected AWS identity, the source IP address, and the specific API calls made (as captured by the Sigma rule).</li>
<li>If suspicious activity is confirmed, follow AWS&rsquo;s incident-handling guidance, including disabling or rotating the access key used and restricting outbound connectivity from the source (reference the AWS Security Incident Response Guide).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>cloudtrail</category><category>discovery</category></item><item><title>AWS STS GetCallerIdentity API Called for the First Time</title><link>https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</link><pubDate>Fri, 10 Apr 2026 16:48:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-aws-sts-getcalleridentity/</guid><description>An adversary with access to compromised AWS credentials may attempt to verify their validity and determine the account they are using by calling the STS GetCallerIdentity API, potentially indicating credential compromise and unauthorized discovery activity.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetCallerIdentity API allows a user to retrieve information about the IAM user or role associated with the credentials being used. While a legitimate user should already know the account they are operating in, an attacker with compromised credentials may use this API to verify the validity of the credentials and enumerate account details. This activity, especially when observed for the first time from a particular user identity, can indicate malicious reconnaissance. This detection focuses on identifying the initial use of the GetCallerIdentity API, excluding instances where an assumed role is involved due to the common practice of using GetCallerIdentity after assuming a role. This event is flagged as anomalous, potentially signaling unauthorized access or credential misuse within an AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, either through phishing, credential stuffing, or compromised systems.</li>
<li>The attacker uses the compromised credentials to authenticate to the AWS environment.</li>
<li>The attacker executes the <code>sts:GetCallerIdentity</code> API call to identify the associated AWS account ID, IAM user, or role.</li>
<li>The AWS STS service processes the request and returns the identity information to the attacker.</li>
<li>The attacker analyzes the returned identity information to understand the scope and privileges of the compromised credentials.</li>
<li>The attacker uses the gathered information to perform further reconnaissance activities, such as identifying accessible resources and services.</li>
<li>Based on the discovered information, the attacker may attempt to escalate privileges or move laterally within the AWS environment.</li>
<li>The final objective could include data exfiltration, deployment of malicious workloads, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected reconnaissance can lead to significant damage, including unauthorized access to sensitive data, compromised workloads, and disruption of critical services. The impact can range from data breaches and financial losses to reputational damage and regulatory fines. Depending on the scope of the compromised credentials, the attacker may be able to access and control a large portion of the AWS environment. In the event of a breach, the organization may incur costs related to incident response, data recovery, and legal settlements.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetCallerIdentity API Called for the First Time by New Identity&rdquo; to your SIEM and tune for your environment to detect anomalous usage of the GetCallerIdentity API.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the source IP address, user agent, and the user identity associated with the API call.</li>
<li>Review IAM permission policies for the user identity associated with the GetCallerIdentity API call to ensure the least privilege principle is followed.</li>
<li>Enable AWS CloudTrail logging for all AWS regions in your account to ensure comprehensive event logging, as required by the detection rule.</li>
<li>Consider adding exceptions based on <code>user.id</code> or <code>aws.cloudtrail.user_identity.arn</code> values for automation workflows that legitimately rely on the GetCallerIdentity API, as mentioned in the overview.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise, as suggested in the documentation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>sts</category><category>discovery</category></item><item><title>Kubernetes Endpoint Permission Enumeration</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-kubernetes-enumeration/</link><pubDate>Thu, 05 Mar 2026 13:13:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-kubernetes-enumeration/</guid><description>A single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.</description><content:encoded><![CDATA[<p>This detection identifies potential endpoint enumeration attempts within a Kubernetes environment. An attacker, or a compromised account, may attempt to map accessible resources within the Kubernetes cluster by issuing a burst of API calls across multiple endpoints from a single user and source IP address. This is achieved through a combination of both successful and failed API requests.  The behavior is not typical of normal Kubernetes cluster operation. Attackers leverage this reconnaissance to identify high-value targets like secrets, pods, or nodes before attempting privilege escalation or lateral movement. The rule specifically looks for unusual patterns in Kubernetes audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Kubernetes cluster, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker uses <code>kubectl</code> or a similar tool to send a series of API requests.</li>
<li>The attacker attempts to enumerate Kubernetes API endpoints using &ldquo;get&rdquo;, &ldquo;list&rdquo;, &ldquo;watch&rdquo;, &ldquo;create&rdquo;, &ldquo;update&rdquo;, and &ldquo;patch&rdquo; verbs.</li>
<li>The requests target a variety of resources, including pods, services, deployments, secrets, and nodes.</li>
<li>The attacker analyzes the responses to identify endpoints and resources that are accessible with the current credentials. Successful and failed responses are both valuable for mapping permissions.</li>
<li>The attacker identifies valuable targets, such as secrets or sensitive data stored in configmaps.</li>
<li>The attacker attempts to escalate privileges by exploiting identified vulnerabilities or misconfigurations.</li>
<li>The attacker moves laterally within the cluster to gain access to other resources or workloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration can lead to privilege escalation, lateral movement, and data exfiltration within the Kubernetes cluster. Attackers can identify and compromise sensitive resources such as secrets, configmaps, and pods. The number of affected systems and the scope of the impact depend on the extent of the attacker&rsquo;s access and the sensitivity of the compromised resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Kubernetes audit logging to capture API server requests and responses, which is required for the provided rules and the original Elastic rule.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect enumeration attempts and tune them based on your environment.</li>
<li>Enforce the principle of least privilege by assigning appropriate RBAC roles to users and service accounts to limit potential enumeration damage.</li>
<li>Monitor Kubernetes audit logs for unusual API request patterns, specifically a high number of requests from a single user and IP address.</li>
<li>Review RBAC bindings for unexpected or overly broad access as mentioned in the overview.</li>
<li>Segment API access with network controls (private endpoint/VPN allowlists) as suggested in the response section of the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>enumeration</category><category>discovery</category></item><item><title>Potential Enumeration via Active Directory Web Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</guid><description>Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.</description><content:encoded><![CDATA[<p>The Active Directory Web Service (ADWS) facilitates querying Active Directory (AD) over a network, providing a web-based interface for directory services. Adversaries may exploit ADWS to enumerate network resources and user accounts, gaining insights into the environment. This attack involves loading Active Directory related modules and establishing network connections to the ADWS dedicated TCP port 9389. The goal is to gather information about the domain, user accounts, and permissions, which can be used for lateral movement, privilege escalation, and data exfiltration. Detection focuses on identifying suspicious processes loading <code>System.DirectoryServices*.dll</code> or <code>System.IdentityModel*.dll</code> and then connecting to the ADWS port.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target network.</li>
<li>The attacker executes a reconnaissance tool or script (e.g., PowerShell) on the compromised host.</li>
<li>The reconnaissance tool loads Active Directory related modules such as <code>System.DirectoryServices*.dll</code> and <code>System.IdentityModel*.dll</code>.</li>
<li>The reconnaissance tool attempts to establish a network connection to the ADWS service on TCP port 9389, the dedicated port for ADWS.</li>
<li>The tool queries ADWS to retrieve information about domain users (T1087.002), groups (T1069.002), systems (T1018), and permissions.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts and potential targets for lateral movement.</li>
<li>The attacker uses the discovered information to move laterally within the network.</li>
<li>The attacker escalates privileges, and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain detailed knowledge of the Active Directory environment. This information can be used to identify high-value targets, compromise privileged accounts, move laterally within the network, and ultimately achieve their objectives, which could include data theft, ransomware deployment, or disruption of services. The impact can range from data breaches to complete compromise of the Active Directory domain, depending on the attacker&rsquo;s goals and the level of access they achieve.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Suspicious Library Loading&rdquo; to detect processes loading AD-related DLLs (e.g., <code>System.DirectoryServices*.dll</code>, <code>System.IdentityModel*.dll</code>).</li>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Network Connection&rdquo; to monitor for network connections to destination port 9389 from unusual processes.</li>
<li>Review and whitelist legitimate administrative tools or scripts that load Active Directory-related modules and connect to the ADWS port as described in the &ldquo;False positive analysis&rdquo; section of the original rule documentation.</li>
<li>Implement network segmentation to limit access to the ADWS port (9389) to only trusted systems and users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>enumeration</category><category>adws</category><category>discovery</category><category>windows</category></item><item><title>Detection of Obfuscated IP Address Usage in Download Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</link><pubDate>Sat, 27 Jan 2024 18:29:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</guid><description>This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.</description><content:encoded><![CDATA[<p>Attackers are increasingly using obfuscated IP addresses (e.g., hexadecimal, octal, or other encoded representations) within download commands to bypass security measures that rely on simple IP address blacklisting or pattern matching. This technique makes it more difficult to identify malicious network connections based on simple string matching. The observed commands include <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code>. Defenders need to detect these obfuscated IPs to identify and block malicious download attempts. This technique has been observed across various attack campaigns and is a common tactic used to deliver malware while attempting to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker crafts a command containing an obfuscated IP address. This may involve converting a standard IP address into its hexadecimal, octal, or decimal representation.</li>
<li>The attacker utilizes a command-line tool such as <code>curl</code>, <code>wget</code>, or PowerShell&rsquo;s <code>Invoke-WebRequest</code> to initiate a download. The command includes the obfuscated IP within a URL.</li>
<li>The command interpreter resolves the obfuscated IP address back to its standard format before initiating the network connection.</li>
<li>The target host establishes a connection to the attacker&rsquo;s server at the resolved IP address.</li>
<li>The attacker&rsquo;s server delivers a malicious payload, such as a script, executable, or document containing macros.</li>
<li>The downloaded payload is executed on the target system, potentially leading to further compromise, such as privilege escalation or lateral movement.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the download and execution of malware, potentially compromising the targeted system. This can result in data breaches, system disruption, or financial loss. The use of obfuscation techniques makes it more difficult to detect and prevent these attacks, increasing the risk of successful compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Obfuscated IP Download Activity&rdquo; to your SIEM to detect the use of obfuscated IP addresses in download commands. Tune the rule for your environment to minimize false positives.</li>
<li>Investigate any process creation events that match the Sigma rule, paying close attention to the command-line arguments.</li>
<li>Consider implementing additional network-based detection mechanisms to identify connections to suspicious IP addresses, even if they are obfuscated.</li>
<li>Monitor process creation logs (Sysmon) for processes executing download commands like <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code> with suspicious arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>evasion</category><category>obfuscation</category></item><item><title>Group Policy Discovery via Microsoft GPResult Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</guid><description>Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>Attackers may leverage the <code>gpresult.exe</code> utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of <code>gpresult.exe</code> with specific command-line arguments (<code>/z</code>, <code>/v</code>, <code>/r</code>, <code>/x</code>) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li>The attacker executes <code>gpresult.exe</code> from the command line or through a script.</li>
<li>The attacker uses command-line arguments such as <code>/z</code>, <code>/v</code>, <code>/r</code>, or <code>/x</code> to request detailed information about Group Policy settings.</li>
<li><code>gpresult.exe</code> queries the Active Directory domain to retrieve GPO information applicable to the user or computer.</li>
<li>The attacker parses the output of <code>gpresult.exe</code> to identify security policies, user rights assignments, and other relevant configurations.</li>
<li>The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.</li>
<li>The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a comprehensive understanding of the target environment&rsquo;s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to your SIEM to detect the execution of <code>gpresult.exe</code> with suspicious parameters.</li>
<li>Enable Windows process creation logging to capture command-line arguments used with <code>gpresult.exe</code> and other executables.</li>
<li>Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to determine the context and intent of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>group_policy</category></item><item><title>NLTEST.EXE Used for Domain Trust Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</link><pubDate>Thu, 11 Jan 2024 17:49:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</guid><description>Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.</description><content:encoded><![CDATA[<p>The <code>nltest.exe</code> utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>nltest.exe</code> with specific arguments such as <code>/DOMAIN_TRUSTS</code>, <code>/DCLIST:*</code>, <code>/DCNAME:*</code>, <code>/DSGET*</code>, <code>/LSAQUERYFTI:*</code>, <code>/PARENTDOMAIN</code>, or <code>/BDC_QUERY:*</code> to enumerate domain trusts.</li>
<li>The <code>nltest.exe</code> utility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information.</li>
<li>The attacker parses the output of <code>nltest.exe</code> to identify trust relationships, domain controllers, and other relevant information about the domain infrastructure.</li>
<li>The attacker uses the gathered information to map out potential lateral movement paths within the environment.</li>
<li>The attacker leverages discovered trust relationships to authenticate to other domains or resources.</li>
<li>The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.</li>
<li>The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts via <code>nltest.exe</code> can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>nltest.exe</code> with command-line arguments indicative of domain trust discovery, using the provided Sigma rule.</li>
<li>Investigate any instances of <code>nltest.exe</code> execution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule.</li>
<li>Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.</li>
<li>Review and restrict the use of <code>nltest.exe</code> to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain trust</category><category>lateral movement</category><category>windows</category></item><item><title>PowerShell Share Enumeration via ShareFinder or Native APIs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</guid><description>Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts utilizing ShareFinder functions (Invoke-ShareFinder/Invoke-ShareFinderThreaded) or native Windows API calls for share enumeration. These techniques are commonly used by attackers to map accessible network shares within an environment. This reconnaissance is often a precursor to data collection, lateral movement, or the deployment of ransomware. The activity is detected via script block logging, and focuses on identifying specific function calls and API usage within the PowerShell script content. Defenders should be aware of this activity, particularly when performed by unexpected users or on unusual systems, as it may indicate malicious reconnaissance within the network. The references indicate that this activity can lead to corporate insurance policy exfiltration or Conti ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or compromised credentials.</li>
<li>The attacker executes a PowerShell script, either directly or through a fileless execution method.</li>
<li>The PowerShell script utilizes ShareFinder functions (Invoke-ShareFinder, Invoke-ShareFinderThreaded) or Windows share enumeration APIs (NetShareEnum, NetApiBufferFree) to discover network shares.</li>
<li>The script identifies accessible network shares by leveraging API calls and parsing the results for share names (shi1_netname) and remarks (shi1_remark).</li>
<li>The attacker analyzes the identified shares to determine those that are accessible and contain valuable data.</li>
<li>The attacker may then attempt to access these shares using compromised credentials or exploiting existing vulnerabilities.</li>
<li>Once access is gained, the attacker may collect sensitive data from the shares, move laterally to other systems, or deploy ransomware.</li>
<li>The ultimate goal is data exfiltration, system compromise, or financial gain through ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reconnaissance technique can lead to significant data breaches, lateral movement within the network, and potential ransomware deployment. Organizations that fail to detect and prevent share enumeration may suffer financial losses, reputational damage, and operational disruption. The referenced &ldquo;Stolen Images&rdquo; campaign led to Conti ransomware deployment, and the &ldquo;Hunting for corporate insurance policies&rdquo; post highlights data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell script block logging to capture the necessary events for detection (as referenced in the rule setup).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration Script via Invoke-ShareFinder&rdquo; to your SIEM and tune for your environment.</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration via NetShareEnum API&rdquo; to detect share enumeration using native Windows APIs.</li>
<li>Investigate any alerts generated by these rules, focusing on the PowerShell launch context and the scope of the share discovery (see triage steps in the original rule).</li>
<li>Review and restrict PowerShell execution policies to prevent unauthorized script execution, especially from user-writable locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>discovery</category><category>powershell</category><category>share-enumeration</category><category>lateral-movement</category><category>ransomware</category></item><item><title>Account Discovery Command via SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</guid><description>The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where the SYSTEM account is used to execute account discovery utilities, such as <code>whoami.exe</code> and <code>net1.exe</code>. This behavior is commonly observed after an attacker has successfully achieved privilege escalation within a Windows environment, or after exploiting a web application. The rule is designed to detect post-exploitation discovery activity where an adversary attempts to gain situational awareness by enumerating accounts and system information using the elevated SYSTEM context. The rule leverages data from Elastic Defend and Sysmon Event ID 1 to identify these behaviors, helping defenders spot potential privilege escalation and lateral movement attempts. The original rule was created 2020/03/18 and updated 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through exploiting a vulnerability in a web application or through phishing.</li>
<li>The attacker escalates privileges to the SYSTEM account, possibly by exploiting a local privilege escalation vulnerability.</li>
<li>The attacker executes <code>whoami.exe</code> or <code>net1.exe</code> via the SYSTEM account to enumerate user accounts and gather system information.</li>
<li>The <code>whoami.exe</code> or <code>net1.exe</code> process is spawned by a parent process such as a web server process (e.g., w3wp.exe) or a service process.</li>
<li>The attacker uses the discovered account information to plan further actions, such as lateral movement or credential theft.</li>
<li>The attacker may use <code>net1.exe</code> to query domain information.</li>
<li>The attacker leverages the gained information to identify valuable targets within the network.</li>
<li>The final objective is often data exfiltration, deployment of ransomware, or further compromise of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Although this rule has low severity, the execution of discovery commands by the SYSTEM account can be a critical indicator of compromise. Early detection of such activity can prevent more severe damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect account discovery commands executed via the SYSTEM account and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the necessary data is available for detection.</li>
<li>Investigate any alerts generated by these rules, focusing on the process execution chain to identify the source of the SYSTEM account usage.</li>
<li>If the process tree includes a web-application server process, investigate suspicious file creation or modification to assess for webshell backdoors.</li>
<li>Review and harden web application security to prevent initial access and privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>privilege-escalation</category><category>windows</category></item><item><title>Suspicious PDF Reader Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</link><pubDate>Thu, 04 Jan 2024 18:45:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</guid><description>Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging PDF reader applications as an initial access vector, exploiting vulnerabilities within these programs or using social engineering to trick users into opening malicious PDF documents. Upon successful exploitation, adversaries often spawn built-in Windows utilities from the compromised PDF reader process to perform reconnaissance, escalate privileges, or establish persistence. This activity is designed to blend in with normal system operations, making it difficult to detect without specific monitoring and detection rules. The targeted software commonly includes Adobe Acrobat, Adobe Reader, and Foxit Reader. Defenders should be vigilant for unexpected child processes of PDF readers, especially command-line interpreters and system administration tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious PDF document via phishing or other means.</li>
<li>The user opens the PDF document using a vulnerable PDF reader application (e.g., Adobe Acrobat, Foxit Reader).</li>
<li>The PDF document exploits a vulnerability or uses a malicious script to execute an arbitrary command.</li>
<li>The PDF reader application spawns a command-line interpreter (e.g., cmd.exe, powershell.exe) or a system administration tool (e.g., reg.exe, net.exe).</li>
<li>The spawned process executes commands to gather system information (e.g., ipconfig.exe, systeminfo.exe, whoami.exe).</li>
<li>The attacker may attempt to discover network configuration, user accounts, or running processes.</li>
<li>The attacker could leverage the spawned process to download and execute further payloads.</li>
<li>The attacker gains a foothold on the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PDF reader applications can lead to initial access, privilege escalation, and further compromise of the affected system. While individual incidents may have a low risk score, widespread exploitation can lead to significant data breaches, system downtime, and reputational damage. The use of legitimate system utilities for malicious purposes can make detection challenging, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of suspicious child processes (Sysmon Event ID 1, Windows Security Event Logs).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious PDF Reader Child Process&rdquo; to your SIEM and tune for your environment to detect the execution of suspicious processes spawned by PDF reader applications.</li>
<li>Monitor for network connections originating from PDF reader applications to unusual or external IP addresses.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>initial-access</category><category>defense-evasion</category><category>discovery</category></item><item><title>Windows Account Discovery of Administrator Accounts</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</link><pubDate>Wed, 03 Jan 2024 17:14:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</guid><description>Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance activities within a compromised environment to understand the available resources and potential targets. This reconnaissance helps them plan subsequent actions, such as privilege escalation and lateral movement. This activity involves using built-in Windows utilities like <code>net.exe</code> and <code>wmic.exe</code> to enumerate administrator-related user accounts and groups. This information can reveal potential targets for credential compromise or other post-exploitation activities. Lower privileged accounts commonly perform this enumeration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>net.exe</code> with arguments to list users and groups.</li>
<li>The attacker filters the output for administrator-related keywords like &ldquo;admin&rdquo;, &ldquo;Domain Admins&rdquo;, &ldquo;Enterprise Admins&rdquo;, &ldquo;Remote Desktop Users&rdquo;, or &ldquo;Organization Management&rdquo;.</li>
<li>Alternatively, the attacker executes <code>wmic.exe</code> to query user accounts.</li>
<li>The attacker parses the output from <code>wmic.exe</code> to identify administrator accounts.</li>
<li>The attacker identifies privileged accounts to target for credential theft or privilege escalation.</li>
<li>The attacker uses the identified accounts to perform lateral movement or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of administrator accounts allows an attacker to identify high-value targets within the environment. This can lead to credential theft, privilege escalation, lateral movement, and ultimately, unauthorized access to sensitive data or systems. While the risk score is low, this activity serves as a precursor to more serious compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>net.exe</code> and <code>wmic.exe</code> commands with arguments related to user and group enumeration using the Sigma rules provided.</li>
<li>Investigate any instances of lower-privileged accounts executing these commands and filter out authorized administrative accounts performing the same actions.</li>
<li>Enable Windows process creation logging to capture the necessary events.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>account-discovery</category><category>windows</category></item><item><title>Suspicious Enumeration Commands Spawned via WMIPrvSE</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</guid><description>This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the Windows Management Instrumentation (WMI) to execute commands for reconnaissance and enumeration within a compromised system. This involves spawning native Windows tools via the WMI Provider Service (WMIPrvSE). This activity is often used to gather system and network information in a stealthy manner, which could be part of a larger attack, such as lateral movement or privilege escalation. This behavior matters because it allows adversaries to gather information about the target environment without using easily detectable methods, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses WMI to execute a reconnaissance command.</li>
<li>WMIPrvSE.exe is invoked to execute the attacker&rsquo;s specified command.</li>
<li>The attacker executes commands such as <code>ipconfig.exe</code>, <code>net.exe</code>, or <code>systeminfo.exe</code> via WMIPrvSE.exe to gather network configuration details, user information, and system information.</li>
<li>The enumerated information is collected and potentially exfiltrated to a command and control server.</li>
<li>The attacker uses the gathered information to identify further targets within the network.</li>
<li>The attacker moves laterally to other systems using stolen credentials or exploited vulnerabilities.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of enumeration commands via WMIPrvSE allows attackers to gather sensitive information about the system and network environment. This information can be used to facilitate lateral movement, privilege escalation, and data theft, potentially leading to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the execution of enumeration commands (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Enumeration Command Spawned via WMIPrvSE&rdquo; to your SIEM to detect suspicious WMIPrvSE activity (Sigma rule).</li>
<li>Investigate any instances of WMIPrvSE spawning common enumeration tools such as <code>net.exe</code>, <code>ipconfig.exe</code>, or <code>systeminfo.exe</code> (Sigma rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following successful enumeration (Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>enumeration</category><category>wmi</category><category>discovery</category><category>execution</category><category>windows</category></item><item><title>AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</guid><description>This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.</description><content:encoded><![CDATA[<p>This detection rule identifies lateral movement in AWS environments stemming from Kubernetes service accounts utilizing <code>AssumeRoleWithWebIdentity</code>. It focuses on detecting instances where credentials obtained via this method are subsequently used to perform several distinct AWS control-plane actions within a single session. This behavior deviates from typical pod traffic and could signify unauthorized access or privilege escalation. The rule prioritizes the detection of sensitive API usage, including reconnaissance activities, access to secrets, IAM modifications, and compute creation events, while strategically excluding high-volume S3 data-plane operations to minimize false positives. The targeted environments are those leveraging EKS IAM Roles for Service Accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A Kubernetes service account projects a token.</li>
<li>The service account uses <code>AssumeRoleWithWebIdentity</code> to exchange the token for short-lived IAM credentials.</li>
<li>The attacker leverages the assumed role to perform reconnaissance activities such as <code>ListUsers</code>, <code>ListRoles</code>, and <code>DescribeInstances</code>.</li>
<li>The attacker attempts to access secrets using actions like <code>GetSecretValue</code> and <code>ListSecrets</code>.</li>
<li>The attacker escalates privileges by modifying IAM policies with actions like <code>AttachRolePolicy</code> and <code>PutRolePolicy</code>.</li>
<li>The attacker attempts to create new users or roles within the AWS environment using actions like <code>CreateUser</code> and <code>CreateRole</code>.</li>
<li>The attacker performs lateral movement using actions like <code>SendCommand</code> and <code>StartSession</code>.</li>
<li>The attacker attempts to evade detection by stopping logging with the <code>StopLogging</code> action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, privilege escalation, and the potential compromise of the entire AWS environment. Lateral movement within the AWS infrastructure allows attackers to gain access to critical systems and data, potentially leading to data breaches, service disruptions, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious activity related to <code>AssumeRoleWithWebIdentity</code> and tune for your environment.</li>
<li>Review and harden IAM role trust policies associated with Kubernetes service accounts, specifically focusing on OIDC trust conditions, as referenced in the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html">IAM OIDC identity provider</a> documentation.</li>
<li>Implement strict least privilege principles for Kubernetes service accounts, limiting their access to only the necessary AWS resources, as covered in <a href="https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html">EKS IAM roles for service accounts</a>.</li>
<li>Monitor CloudTrail logs for <code>AssumeRoleWithWebIdentity</code> events followed by suspicious API calls, focusing on the actions listed in the Sigma rule detection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kubernetes</category><category>lateral-movement</category><category>credential-access</category><category>discovery</category></item><item><title>MSIExec Spawning Discovery Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-msiexec-discovery/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msiexec-discovery/</guid><description>Detection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.</description><content:encoded><![CDATA[<p>This detection focuses on identifying suspicious behavior where <code>msiexec.exe</code>, a legitimate Windows utility for installing, uninstalling, and configuring software, is used to spawn multiple discovery commands. This activity is often associated with attackers attempting to gather system information, enumerate the network, and identify potential targets for lateral movement. The technique is typically observed post-compromise, after initial access has been achieved through other means. This behavior matters to defenders as it is a key indicator of malicious activity and potential privilege escalation or data exfiltration attempts. The detection leverages Endpoint Detection and Response (EDR) data, specifically process creation events, to identify instances where <code>msiexec.exe</code> is the parent process of common discovery tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a vulnerability, phishing, or other means.</li>
<li>The attacker leverages <code>msiexec.exe</code> to execute discovery commands.</li>
<li><code>msiexec.exe</code> spawns processes such as <code>ipconfig.exe</code>, <code>net.exe</code>, <code>systeminfo.exe</code>, or <code>wmic.exe</code> to gather network configuration, user information, and system details.</li>
<li>The attacker uses commands within <code>cmd.exe</code> or <code>powershell.exe</code> to execute the discovery commands. For example, <code>cmd.exe /c ipconfig /all</code> or <code>powershell.exe Get-NetIPConfiguration</code>.</li>
<li>The attacker filters the output of these commands to identify valuable information such as domain names, user accounts, and system architecture.</li>
<li>The attacker uses the gathered information to identify potential targets for lateral movement and privilege escalation.</li>
<li>The attacker attempts to move laterally to other systems using stolen credentials or exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to a comprehensive understanding of the compromised environment. Attackers can leverage gathered information to escalate privileges, move laterally to other systems, and ultimately exfiltrate sensitive data or deploy ransomware. The impact could range from a single compromised workstation to a complete network breach, depending on the scope of the attacker&rsquo;s activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process monitoring and command-line logging on all endpoints to capture the necessary data for detection.</li>
<li>Deploy the Sigma rule <code>MSIExec Spawning Discovery Commands</code> to your SIEM and tune it to your environment.</li>
<li>Investigate any instances of <code>msiexec.exe</code> spawning multiple discovery commands, as this behavior is unusual in normal system operations.</li>
<li>Implement least privilege principles to limit the impact of compromised accounts and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>msiexec</category><category>discovery</category><category>windows</category></item><item><title>Kubernetes Multi-Resource Discovery Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-multi-resource-discovery/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-multi-resource-discovery/</guid><description>Adversaries may perform reconnaissance in a Kubernetes environment by rapidly querying multiple resource types to map the environment and identify potential privilege escalation paths.</description><content:encoded><![CDATA[<p>After gaining initial access to a Kubernetes cluster, adversaries often conduct reconnaissance to understand the environment before further actions like exfiltration or privilege escalation. This involves mapping the cluster&rsquo;s structure, identifying workloads, and understanding role-based access control (RBAC) configurations. This reconnaissance is achieved by rapidly querying various API resources, including namespaces, pods, roles, ClusterRoles, ConfigMaps, and ServiceAccounts. The activity is characterized by a burst of <code>get</code> and <code>list</code> requests across multiple resource types within a short timeframe, which is atypical for normal cluster operations and may indicate malicious probing or permission reconnaissance. This detection focuses on identifying such cross-resource bursts from a single client to distinguish reconnaissance activities from routine automation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Kubernetes cluster using compromised credentials or by exploiting a vulnerability. (T1190, T1566)</li>
<li>The attacker authenticates to the Kubernetes API server using the compromised credentials or a valid service account token.</li>
<li>The attacker begins enumerating namespaces to understand the logical divisions within the cluster using <code>kubectl get namespaces</code> or equivalent API calls. (T1068)</li>
<li>The attacker queries pods within the discovered namespaces to identify running workloads and potential targets. (T1068)</li>
<li>The attacker lists roles and cluster roles to understand the existing RBAC configurations and identify potential privilege escalation opportunities. (T1069)</li>
<li>The attacker retrieves service accounts to identify applications and their associated permissions, potentially discovering more attack vectors.</li>
<li>The attacker analyzes the collected information to identify vulnerable services, misconfigured permissions, or sensitive data.</li>
<li>Based on the reconnaissance, the attacker proceeds with lateral movement, privilege escalation, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance allows attackers to gain a comprehensive understanding of the Kubernetes environment, facilitating further malicious activities such as lateral movement, privilege escalation, and data exfiltration. This can lead to the compromise of sensitive data, disruption of services, and unauthorized access to critical resources. The impact is magnified in clusters with weak RBAC policies or exposed sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Multi-Resource Discovery&rdquo; to your SIEM and tune for your environment to detect reconnaissance activities.</li>
<li>Investigate alerts generated by the Sigma rule by pivoting on <code>user.name</code>, <code>source.ip</code>, and <code>user_agent.original</code> to determine the sequence of API calls.</li>
<li>Correlate the identified activity with RBAC configurations to identify potential violations of the principle of least privilege as described in the rule&rsquo;s Triage and Analysis section.</li>
<li>Baseline automation by allowlisting known service accounts or source networks that legitimately span multiple resource types in a short window, as described in the rule&rsquo;s False Positive Analysis section.</li>
<li>Review and tighten RBAC configurations to minimize the impact of compromised credentials as described in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>discovery</category><category>reconnaissance</category></item><item><title>Windows Netsh Tool Used for Firewall Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</guid><description>The analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where the <code>netsh.exe</code> utility is used to query firewall configurations on a Windows system. While <code>netsh.exe</code> is a legitimate tool for network configuration, adversaries can leverage it to gather information about firewall rules and settings. This information can then be used to plan further attacks, such as bypassing firewall restrictions or identifying vulnerable network services. This activity is typically seen during the reconnaissance phase of an attack. The scope of this detection covers any Windows environment where Endpoint Detection and Response (EDR) logs are available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>netsh.exe</code> with specific commands to enumerate firewall rules and configurations (e.g., <code>netsh firewall show state</code>, <code>netsh firewall show config</code>).</li>
<li>The <code>netsh.exe</code> process retrieves the requested firewall information from the Windows operating system.</li>
<li>The collected firewall information is parsed to identify potential weaknesses or misconfigurations.</li>
<li>The attacker uses the gathered information to modify existing firewall rules or create new rules to allow unauthorized access.</li>
<li>The attacker leverages the modified firewall configuration to establish a covert communication channel or to move laterally within the network.</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized network access, data exfiltration, or the deployment of ransomware. The enumeration of firewall configurations can provide attackers with valuable insights into the network&rsquo;s security posture, enabling them to bypass security controls and compromise critical assets. This can result in significant financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Netsh Firewall Discovery</code> to your SIEM and tune for your environment to detect netsh.exe executions with firewall discovery commands.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to capture the necessary command-line details.</li>
<li>Investigate any identified instances of <code>netsh.exe</code> being used to query firewall settings, especially when initiated from unusual processes or user accounts.</li>
<li>Monitor parent-child process relationships to identify suspicious process spawning, as highlighted by the <code>Processes.parent_process_name</code> field.</li>
<li>Review firewall configurations regularly to identify and remediate any misconfigurations or overly permissive rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>netsh</category><category>firewall</category></item><item><title>Suspicious Whoami Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-whoami-discovery/</guid><description>This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.</description><content:encoded><![CDATA[<p>The <code>whoami</code> utility is commonly used by attackers post-compromise to gather information about the current user and their privileges on a compromised system. This information helps attackers assess their level of access and plan further actions within the environment, such as privilege escalation or lateral movement. This activity is most concerning when executed by SYSTEM accounts or from unusual parent processes. This detection identifies unusual or suspicious executions of <code>whoami.exe</code>, especially when associated with system privileges or specific parent processes known to be abused by attackers. The rule is designed to function across various Windows environments and considers potential false positives from legitimate administrative tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows system through an exploit or compromised credentials.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to elevate privileges to a higher level, potentially SYSTEM.</li>
<li>Discovery: The attacker executes <code>whoami.exe</code> to determine the current user and their privileges.</li>
<li>Information Gathering: The attacker analyzes the output of <code>whoami.exe</code> to understand the context of the compromised system.</li>
<li>Lateral Movement (Conditional): Based on the information gathered, the attacker may attempt to move laterally to other systems.</li>
<li>Further Exploitation: The attacker leverages the gathered information to further exploit the compromised system or network.</li>
<li>Persistence (Optional): The attacker may establish persistence to maintain access to the compromised system.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and reconnaissance can allow attackers to gain a deeper understanding of a compromised system. This may lead to further exploitation, lateral movement, and ultimately, the exfiltration of sensitive data or the disruption of critical services. While the <code>whoami</code> command itself is not inherently malicious, its suspicious usage often indicates malicious activity within a compromised environment. The severity is low because the execution of whoami by itself is not enough to confirm malicious activity, and further investigation is needed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>whoami.exe</code> executions (reference: logs-endpoint.events.process-*, logs-system.security*, logs-windows.forwarded*, logs-windows.sysmon_operational-*).</li>
<li>Deploy the Sigma rule &ldquo;Whoami Process Activity&rdquo; to your SIEM and tune for your environment (reference: rule).</li>
<li>Investigate parent processes of <code>whoami.exe</code> for any suspicious or unusual activity (reference: Attack Chain).</li>
<li>Monitor for other discovery commands executed around the same time as <code>whoami.exe</code> (reference: Related rules).</li>
<li>Review and tune the false positives outlined in the rule to minimize noise (reference: false_positives).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>threat-detection</category></item><item><title>Suspicious MS Office Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</guid><description>Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook), which are commonly targeted for initial access via malicious documents or macro exploitation. The rule focuses on identifying anomalous process executions originating from these applications, a tactic often employed to execute arbitrary code or download additional payloads. Attackers leverage Office applications due to their widespread use and inherent scripting capabilities. Successful exploitation can lead to arbitrary code execution, lateral movement, and data exfiltration. This detection helps defenders identify and respond to potential security breaches originating from Microsoft Office applications, reducing the attack surface and minimizing potential damage. The rule specifically looks for processes like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, <code>wscript.exe</code>, and others being spawned by Office applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious Microsoft Office document (e.g., Word, Excel) via email or downloads it from a compromised website.</li>
<li>The user opens the document, triggering the execution of a malicious macro or exploitation of a vulnerability within the Office application.</li>
<li>The Office application (e.g., <code>winword.exe</code>, <code>excel.exe</code>) spawns a suspicious child process such as <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The spawned process executes a command to download a malicious payload from a remote server using <code>bitsadmin.exe</code> or <code>certutil.exe</code>.</li>
<li>The downloaded payload is a reverse shell or a malware dropper, which establishes a connection to an attacker-controlled server.</li>
<li>The attacker gains initial access to the compromised system and attempts to escalate privileges and perform reconnaissance.</li>
<li>The attacker uses discovery commands with <code>net.exe</code>, <code>ipconfig.exe</code>, <code>tasklist.exe</code>, and <code>whoami.exe</code> to map the environment and identify valuable targets.</li>
<li>The attacker moves laterally to other systems within the network, aiming to compromise critical assets and achieve their objectives, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain initial access to the compromised system. This can result in data theft, installation of malware, lateral movement to other systems, and ultimately, significant disruption to business operations. The widespread use of Microsoft Office makes it a prime target, potentially affecting a large number of users and organizations. Failure to detect and respond to these attacks can result in significant financial losses, reputational damage, and compromise of sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Event Logs) to ensure the visibility required to detect suspicious child processes.</li>
<li>Deploy the Sigma rule <code>Suspicious MS Office Child Process</code> to your SIEM and tune the rule based on your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the <code>Suspicious MS Office Child Process</code> Sigma rule by examining the parent process tree and associated network connections.</li>
<li>Implement application control policies to restrict the execution of unauthorized processes from Microsoft Office applications.</li>
<li>Regularly update Microsoft Office applications to patch known vulnerabilities.</li>
<li>Block known malicious domains or IPs associated with malware delivery and command and control, based on threat intelligence feeds and IOCs from external sources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>discovery</category><category>windows</category></item><item><title>Enumeration of Privileged Local Groups Membership</title><link>https://feed.craftedsignal.io/briefs/2024-01-enumeration-privileged-local-groups/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-enumeration-privileged-local-groups/</guid><description>An unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance after compromising a system to plan their next steps. This includes enumerating network resources, users, connections, files, and installed security software. This activity allows attackers to identify high-value targets for lateral movement and credential theft. This detection identifies processes that are unusually enumerating the membership of privileged local groups on Windows systems, such as Administrators or Remote Desktop Users. It is based on Elastic detection rule &ldquo;Enumeration of Privileged Local Groups Membership&rdquo; (rule_id: &ldquo;291a0de9-937a-4189-94c0-3e847c8b13e4&rdquo;). The rule excludes common legitimate utilities to reduce false positives. The presence of such enumeration activity, especially by unknown or untrusted processes, should be investigated immediately to determine the scope and intent of the intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host through an initial access vector like phishing or exploitation.</li>
<li>The attacker executes a reconnaissance command or script to gather information about the system.</li>
<li>The command attempts to enumerate the members of privileged local groups, such as Administrators or Remote Desktop Users, using built-in Windows utilities or custom tools.</li>
<li>Windows Security Event Logs record the event of user-member enumeration with Event ID 4798 or similar events.</li>
<li>The attacker parses the output of the enumeration command to identify potential targets for credential theft or privilege escalation.</li>
<li>The attacker uses the gathered information to move laterally to other systems or escalate privileges on the compromised host.</li>
<li>The attacker compromises additional systems and continues to pursue their objectives, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of privileged local groups allows attackers to identify accounts with elevated privileges on the compromised system. This information is used to target those accounts for credential theft, enabling lateral movement and further compromise of the network. If successful, the attacker gains access to sensitive data, critical systems, or deploys ransomware, causing significant disruption and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Security Group Management to generate the necessary Windows Security Event Logs as described in the Elastic setup guide.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Enumeration of Privileged Local Groups Membership&rdquo; to detect unusual processes enumerating group memberships based on <code>CallerProcessName</code> and <code>TargetSid</code>.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing those involving unknown or untrusted processes.</li>
<li>Monitor process execution for command-line arguments and tools commonly used for enumeration, such as <code>net.exe</code>, <code>dsquery</code>, or PowerShell scripts.</li>
<li>Implement least privilege principles to minimize the number of accounts with membership in privileged local groups.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>privileged-access</category></item><item><title>Active Directory Discovery via ADExplorer Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</guid><description>Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.</description><content:encoded><![CDATA[<p>ADExplorer is an advanced Active Directory (AD) viewer and editor, it includes the ability to save snapshots of an AD database for offline viewing and comparisons. Adversaries may abuse this utility to perform domain reconnaissance, gather sensitive information about the AD structure, user accounts, and group memberships. The execution of ADExplorer is a potential indicator of malicious activity, especially when observed in environments where its use is not typical or when executed by unauthorized users. This activity can lead to further exploitation, such as privilege escalation and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker downloads the ADExplorer utility (ADExplorer.exe) to the compromised host.</li>
<li>The attacker executes ADExplorer.exe to begin enumeration of the Active Directory environment.</li>
<li>ADExplorer interacts with the Active Directory domain controllers, querying information about users, groups, computers, and organizational units.</li>
<li>The attacker may use ADExplorer to save snapshots of the AD database for offline analysis.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts, critical assets, and potential vulnerabilities within the AD environment.</li>
<li>The attacker uses the discovered information to plan further attacks, such as lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of ADExplorer by malicious actors can lead to the discovery of sensitive information about the Active Directory environment. This information can be leveraged to facilitate lateral movement, privilege escalation, and data exfiltration. While the initial risk score is low, the reconnaissance activity enables follow-on attacks that can have severe consequences, potentially leading to full domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Process Name</code> to detect the execution of ADExplorer based on process name.</li>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Original File Name</code> to detect the execution of ADExplorer based on the process&rsquo;s original file name.</li>
<li>Monitor process creation events on Windows endpoints for the execution of ADExplorer.exe or processes with an original file name of &ldquo;AdExp&rdquo; to detect potential reconnaissance activities.</li>
<li>Investigate and validate any execution of ADExplorer by non-administrator accounts.</li>
<li>Review ADExplorer use and restrict its usage to authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active-directory</category><category>discovery</category><category>reconnaissance</category><category>windows</category></item><item><title>Windows Peripheral Device Discovery via fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-peripheral-device-discovery/</guid><description>Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.</description><content:encoded><![CDATA[<p>Attackers may leverage native operating system tools like <code>fsutil.exe</code> to perform reconnaissance activities within a compromised environment. The <code>fsutil fsinfo drives</code> command provides information about connected drives, including removable media, mapped network drives, and backup locations. Discovery of these devices can help adversaries identify valuable data stores for exfiltration or encryption as part of a broader attack campaign. This command can be run interactively or via automated scripts, making it a versatile tool for post-exploitation activities. Defenders should monitor for unusual execution of <code>fsutil</code> with the <code>fsinfo drives</code> arguments, particularly when executed by non-administrative users or from unusual locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes <code>fsutil.exe</code> via command line or script.</li>
<li>The <code>fsutil</code> command uses the <code>fsinfo</code> subcommand.</li>
<li>The <code>fsinfo</code> subcommand uses the <code>drives</code> argument to list connected drives.</li>
<li>The system returns a list of attached drives and their types (e.g., local, network, removable).</li>
<li>The attacker analyzes the output to identify potentially valuable targets.</li>
<li>The attacker moves laterally to access identified drives.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware on the identified drives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful discovery of peripheral devices can lead to the identification of backup locations, mapped network drives, and removable media containing sensitive information. This information enables attackers to expand their reach within the compromised environment and increase the potential for data theft, encryption, or destruction. The low severity reflects the fact that this activity on its own is simply reconnaissance; the actual damage comes from subsequent actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious execution of <code>fsutil.exe</code> (see below).</li>
<li>Enable process creation logging with command line arguments to capture <code>fsutil</code> executions (see setup instructions in the Overview).</li>
<li>Investigate any process executions of <code>fsutil.exe</code> where the parent process is unexpected or the user context is unusual (see Triage and Analysis).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>fsutil</category></item><item><title>Suspicious Access to LDAP Attributes</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-ldap-attributes/</guid><description>The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.</description><content:encoded><![CDATA[<p>This rule identifies read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information. The rule focuses on event code 4662, filtering for &lsquo;Read Property&rsquo; access where the number of properties accessed is greater than or equal to 2000. The rule is designed to detect potential reconnaissance activities within an Active Directory environment, providing security teams with insights into unusual access patterns that may indicate malicious intent. This detection logic helps security teams proactively identify and respond to potential threats targeting Active Directory environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the target network, possibly through compromised credentials or a phishing attack (not directly covered in the provided source).</li>
<li>The attacker uses the compromised account to query Active Directory via LDAP.</li>
<li>The attacker issues a series of LDAP queries, requesting a large number of attributes for various Active Directory objects, triggering event ID 4662.</li>
<li>The event logs record the excessive number of read property accesses (winlog.event_data.Properties), exceeding the threshold of 2000.</li>
<li>The attacker analyzes the gathered information to identify potential targets, such as privileged accounts, sensitive data stores, or vulnerable systems.</li>
<li>The attacker attempts to elevate privileges by exploiting identified vulnerabilities or misconfigurations within Active Directory.</li>
<li>The attacker uses the elevated privileges to access sensitive information or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gather sensitive information about the Active Directory environment, identify potential vulnerabilities, elevate privileges, and move laterally within the network. This can lead to data breaches, system compromise, and significant disruption to business operations. The number of victims and sectors targeted are dependent on the scope and objectives of the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Access to generate the necessary events (event code 4662) as mentioned in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Access to LDAP Attributes&rdquo; to your SIEM and tune the threshold (length(winlog.event_data.Properties) &gt;= 2000) for your environment.</li>
<li>Review event logs for event code 4662, focusing on the <code>winlog.event_data.Properties</code> field, to understand which attributes were accessed.</li>
<li>Investigate the source machine from which the LDAP queries originated by examining the <code>winlog.event_data.SubjectUserSid</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active_directory</category><category>ldap</category><category>discovery</category><category>windows</category></item><item><title>Kubernetes Secrets Enumeration from Non-Loopback Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secrets-enumeration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-secrets-enumeration/</guid><description>Detection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.</description><content:encoded><![CDATA[<p>This detection identifies Kubernetes Secrets listing events originating from non-loopback clients. Attackers may attempt to enumerate Kubernetes Secrets to gain access to sensitive information such as credentials, API keys, and other confidential data stored within the cluster. The rule specifically focuses on requests targeting cluster-wide secrets or list operations under the <code>kube-system</code> or <code>default</code> namespaces, which are often targeted due to their high concentration of sensitive information. This activity is indicative of potential credential access or discovery attempts within the Kubernetes environment. This rule helps defenders identify and respond to potential reconnaissance or lateral movement activities within their Kubernetes clusters.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a node within the Kubernetes cluster or a system with access to the Kubernetes API.</li>
<li>The attacker authenticates to the Kubernetes API server using compromised credentials or by exploiting a vulnerability.</li>
<li>The attacker crafts a <code>list</code> request targeting the <code>/api/v1/secrets</code> endpoint to enumerate all secrets in the cluster.</li>
<li>Alternatively, the attacker targets secrets within the <code>kube-system</code> namespace using <code>/api/v1/namespaces/kube-system/secrets</code> or <code>default</code> namespace using <code>/api/v1/namespaces/default/secrets</code>.</li>
<li>The API server responds with a list of secrets, potentially including sensitive information.</li>
<li>The attacker analyzes the retrieved secrets to identify valuable credentials or configuration data.</li>
<li>The attacker uses the acquired credentials to escalate privileges, move laterally within the cluster, or access external resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of Kubernetes secrets can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and significant financial losses. The targeting of <code>kube-system</code> and <code>default</code> namespaces poses a particularly high risk due to the presence of core system components and sensitive configurations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Secrets List in Sensitive Namespaces</code> to your SIEM to detect suspicious secret enumeration activities based on <code>kubernetes.audit.requestURI</code>.</li>
<li>Monitor Kubernetes audit logs (<code>logs-kubernetes.audit_logs-*</code>) for <code>list</code> operations on the <code>secrets</code> resource, specifically targeting <code>/api/v1/secrets</code> and sensitive namespaces.</li>
<li>Implement network policies to restrict access to the Kubernetes API server from untrusted networks.</li>
<li>Review and harden the security configuration of the <code>kube-system</code> and <code>default</code> namespaces.</li>
<li>Enforce the principle of least privilege for service accounts and user access to minimize the impact of credential compromise.</li>
<li>Investigate any alerts generated by the Sigma rule and correlate with other security events to identify potential attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>credential-access</category><category>discovery</category><category>cloud</category></item></channel></rss>