<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Endpoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/endpoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 16:27:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/endpoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple External EDR Alerts by Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-edr-alerts/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-edr-alerts/</guid><description>This rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.</description><content:encoded><![CDATA[<p>This detection rule identifies hosts triggering multiple alerts from external Endpoint Detection and Response (EDR) solutions, indicating a potential compromise. It aggregates alert data from sources such as CrowdStrike, SentinelOne, and Microsoft 365 Defender to identify hosts exhibiting a high volume or diversity of security alerts. The rule aims to detect coordinated attacks across multiple hosts, warranting prioritized investigation and response. It prioritizes hosts that trigger a specific threshold of unique alert rules, different alert severities, or have repetitive patterns involving file paths, command lines, or processes. This approach allows security analysts to focus on systems with a higher likelihood of compromise, reducing the time to detect and respond to potential threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a host through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li><strong>Malware Deployment:</strong> The attacker deploys malware onto the compromised host. This could be achieved through techniques like phishing or exploiting software vulnerabilities.</li>
<li><strong>Execution:</strong> The malware executes on the host, initiating malicious activities. This may involve running malicious scripts or binaries.</li>
<li><strong>Persistence:</strong> The malware establishes persistence on the host to maintain access even after a reboot. This can be achieved by creating scheduled tasks or modifying registry keys.</li>
<li><strong>Lateral Movement:</strong> The attacker attempts to move laterally to other hosts on the network. This can involve using techniques like pass-the-hash or exploiting network vulnerabilities.</li>
<li><strong>Command and Control:</strong> The malware establishes communication with a command and control (C2) server to receive instructions and exfiltrate data.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges to gain higher-level access to the system.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, such as stealing sensitive data or disrupting system operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack resulting in multiple EDR alerts can lead to significant disruption and data loss. Depending on the attacker&rsquo;s objectives, this could include the exfiltration of sensitive data, ransomware deployment, or system downtime. The compromise of multiple hosts can indicate a widespread and coordinated attack, potentially affecting a large number of users and systems. Organizations may experience financial losses due to incident response costs, legal liabilities, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Multiple External EDR Alerts by Host</code> to your SIEM and tune for your environment.</li>
<li>Enable logging for CrowdStrike, SentinelOne, and M365 Defender to ensure the Sigma rule can ingest the appropriate logs, as outlined in the rule&rsquo;s query.</li>
<li>Prioritize investigation of hosts identified by the rule with high alert counts or diverse alert severities to minimize potential damage.</li>
<li>Review and exclude known benign activities from triggering the rule, as detailed in the false positive analysis section of the rule documentation.</li>
<li>Correlate alert data with other logs (process creation, network connections, file modifications) to provide better context for detected hosts.</li>
<li>Block the C2 domains/IP addresses if they are found to be related to the alerts from the affected hosts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>threat-detection</category><category>edr</category><category>endpoint</category></item><item><title>Suspicious MSIExec Remote Download</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</guid><description>The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.</description><content:encoded><![CDATA[<p>The detection focuses on identifying instances where <code>msiexec.exe</code> is used with an HTTP or HTTPS URL in the command line. This behavior is indicative of an attempt to download and execute potentially malicious software from a remote server. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on process execution logs that include command-line details. This activity is significant as it may indicate an attempt to download and execute potentially malicious software from a remote server. If confirmed malicious, this could lead to unauthorized code execution, system compromise, or further malware deployment within the network. The activity is often used to bypass traditional security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means, such as phishing or exploiting a software vulnerability.</li>
<li>The attacker leverages <code>msiexec.exe</code>, a legitimate Windows utility, to download a malicious MSI package from a remote HTTP or HTTPS server.</li>
<li>The command line includes a URL pointing to a malicious MSI file hosted on a compromised or attacker-controlled server.</li>
<li><code>msiexec.exe</code> downloads the MSI package to the victim&rsquo;s machine.</li>
<li>The MSI package is executed, potentially installing malware, creating new files, or modifying system settings.</li>
<li>The installed malware establishes persistence through registry keys or scheduled tasks.</li>
<li>The malware initiates command and control (C2) communication to receive further instructions.</li>
<li>The attacker performs actions on the objective such as data exfiltration or lateral movement within the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized code execution, system compromise, or further malware deployment within the network. The use of <code>msiexec.exe</code> for remote downloads can bypass traditional security controls, allowing attackers to deliver and execute malicious payloads undetected. The dfirreport.com article references data exfiltration following exploitation via MSIExec.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to activate the rules below, capturing command-line details (Sysmon EventID 1).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor network traffic for connections originating from <code>msiexec.exe</code> to external HTTP/HTTPS URLs (Network Visibility Module Flow Data).</li>
<li>Investigate any instances of <code>msiexec.exe</code> executing with command-line arguments containing HTTP or HTTPS URLs.</li>
<li>Filter false positives by destination or parent process as needed based on your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>endpoint</category><category>msiexec</category><category>remote-download</category><category>windows</category></item><item><title>Machine Learning Detects High Bytes Written to External Device</title><link>https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</guid><description>A machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.</description><content:encoded><![CDATA[<p>This brief addresses a machine learning detection identifying anomalous data transfer volumes to external devices. The Elastic Data Exfiltration Detection integration includes a prebuilt machine learning job, <code>ded_high_bytes_written_to_external_device_ea</code>, designed to detect spikes in data written to external devices. This behavior is considered anomalous because typical operational settings usually exhibit predictable patterns or ranges of data transfer to external storage. The detection is triggered when the amount of data written significantly deviates from the established baseline, potentially signaling unauthorized data copying or exfiltration attempts. This detection focuses on identifying abnormalities, providing an alert for investigation of possible illicit data transfer activities. The integration requires the Elastic Defend integration to collect file events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses their access to locate and stage sensitive data for exfiltration.</li>
<li>The attacker connects an external storage device, such as a USB drive, to the compromised system.</li>
<li>The attacker initiates a large data transfer operation, copying the staged data to the external device.</li>
<li>Elastic Defend monitors file events and detects a significant increase in bytes written to the external device.</li>
<li>The <code>ded_high_bytes_written_to_external_device_ea</code> machine learning job identifies the unusual data transfer volume.</li>
<li>An alert is triggered based on the anomaly threshold defined in the Data Exfiltration Detection rule.</li>
<li>The attacker removes the external device, completing the exfiltration of the sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of data to external devices can lead to significant data breaches. The impact varies depending on the sensitivity and volume of the data stolen. This activity can result in financial losses, reputational damage, legal repercussions, and compromise of intellectual property. While the specific number of affected organizations is unknown, any organization that allows the use of external storage devices is potentially vulnerable. This issue poses a risk across various sectors, particularly those handling sensitive data, such as finance, healthcare, and technology.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Data Exfiltration Detection integration and configure the preconfigured anomaly detection jobs as described in the rule&rsquo;s setup instructions.</li>
<li>Review and tune the <code>anomaly_threshold</code> (currently set to 75) based on your environment&rsquo;s baseline data transfer patterns to reduce false positives.</li>
<li>Deploy endpoint detection and response (EDR) solutions to enhance visibility and control over data movements to external devices as mentioned in the &ldquo;Response and remediation&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Create exceptions for known backup operations, software updates, and data archiving processes that may trigger false positives, referencing the &ldquo;False positive analysis&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Implement additional monitoring on similar devices and network segments to detect any further anomalous data transfer activities, based on the rule&rsquo;s description and &ldquo;Response and remediation&rdquo; section of the <code>note</code>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>endpoint</category></item><item><title>Unusual Process Spawned by a User Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</guid><description>A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.</description><content:encoded><![CDATA[<p>A machine learning (ML) rule has identified unusual process execution on a Windows endpoint. This detection leverages two ML models from the Elastic ProblemChild integration: a supervised model that predicts malicious processes and an unsupervised model that identifies processes anomalous to the user&rsquo;s typical behavior. The rule focuses on detecting defense evasion tactics, specifically the potential use of Living-off-the-Land Binaries (LOLbins) or masquerading techniques, which can be difficult to detect with traditional signature-based methods. This detection uses data from the Elastic Endpoint or Winlogbeat and requires the Living off the Land (LotL) Attack Detection integration assets to be installed. This rule was last updated April 1, 2026 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through an existing user account.</li>
<li>Execution: The attacker executes a standard Windows process (e.g., cmd.exe, powershell.exe).</li>
<li>Defense Evasion: The attacker leverages LOLbins to perform malicious actions, blending in with legitimate system activity.</li>
<li>Masquerading: The attacker renames or moves malicious tools to mimic legitimate system files.</li>
<li>Privilege Escalation (Optional): The attacker attempts to escalate privileges using the compromised process.</li>
<li>Lateral Movement (Optional): The attacker uses the compromised process to move laterally to other systems.</li>
<li>Command and Control (Optional): The process establishes a connection to a command and control server for further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, system compromise, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using these techniques can lead to a full system compromise, data theft, or the installation of persistent backdoors. The use of LOLbins makes detection difficult, potentially allowing attackers to operate undetected for extended periods. The impact is amplified by the potential for lateral movement to other systems within the network. While the severity is rated &ldquo;low&rdquo;, successful exploitation allows attackers to move laterally and establish persistence in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as detailed in the rule setup (Elastic Defend or Winlogbeat).</li>
<li>Investigate alerts generated by the &ldquo;Unusual Process Spawned by a User&rdquo; rule (rule_id: 40155ee4-1e6a-4e4d-a63b-e8ba16980cfb) to determine the legitimacy of the flagged process.</li>
<li>Tune the anomaly threshold (anomaly_threshold: 75) based on your environment to reduce false positives, as mentioned in the rule parameters.</li>
<li>Review the &ldquo;False positive analysis&rdquo; section in the rule&rsquo;s note for guidance on identifying and excluding legitimate processes.</li>
<li>Implement the provided Sigma rule to detect unusual command line arguments associated with LOLBins.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>endpoint</category><category>windows</category><category>defense evasion</category><category>machine learning</category><category>lolbins</category></item></channel></rss>