<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Enumeration — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/enumeration/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/enumeration/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>Rapid Enumeration of AWS S3 Buckets</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</guid><description>An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.</description><content:encoded><![CDATA[<p>This threat brief covers suspicious activity related to the rapid enumeration of AWS S3 buckets. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs from the same source IP address within a short timeframe. This pattern is often associated with reconnaissance efforts, security scanning tools, or post-compromise enumeration activities. The behavior is similar to that observed with CSPM tools and by threat actors like Team PCP. The detection specifically excludes AWS service principals and requires programmatic-style sessions (i.e., not Management Console credentials). It focuses on scenarios where resource and identity fields are populated to avoid skewed results from null values. The detection threshold is set to greater than 15 distinct <code>aws.cloudtrail.resources.arn</code> values within a 10-second window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment using compromised credentials or through an exposed IAM role. (T1530)</li>
<li>The attacker authenticates to AWS using the obtained credentials, creating a programmatic session.</li>
<li>The attacker issues a series of <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code> API calls to S3.</li>
<li>These API calls are directed towards multiple distinct S3 buckets within a short timeframe (10 seconds).</li>
<li>The attacker collects information about the bucket&rsquo;s access control lists (ACLs), public access blocks, policies, versioning status, and other metadata. (T1526, T1580, T1619)</li>
<li>The collected information is analyzed to identify publicly accessible buckets, misconfigurations, or sensitive data storage locations.</li>
<li>The attacker uses identified vulnerabilities to exfiltrate data.</li>
<li>The attacker attempts lateral movement within the AWS environment, leveraging the discovered information to compromise other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of S3 buckets can lead to the discovery of sensitive data, misconfigurations, and publicly accessible resources. This can result in data breaches, unauthorized access, and further compromise of the AWS environment. The enumeration allows an attacker to map out the S3 storage landscape, identifying targets for data exfiltration or privilege escalation. The rapid nature of the enumeration suggests automated scanning or reconnaissance, potentially indicating a larger attack campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect rapid S3 bucket enumeration activity based on AWS CloudTrail logs, adjusting the threshold of 15 distinct buckets to suit your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address (<code>source.ip</code>), AWS principal ARN (<code>aws.cloudtrail.user_identity.arn</code>), and the list of accessed buckets (<code>aws.cloudtrail.resources.arn</code>).</li>
<li>Review IAM policies associated with the identified principal to ensure least privilege for S3 read APIs.</li>
<li>Monitor CloudTrail logs for related events, such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, <code>AssumeRole</code>, or IAM changes, occurring within ±30 minutes of the detected enumeration activity.</li>
<li>Implement network-level restrictions on the source IP address if it is not authorized to perform S3 enumeration.</li>
<li>Document approved scanning accounts and add user agent filters to the provided Sigma rule to reduce noise from those identities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>s3</category><category>cloudtrail</category><category>discovery</category><category>enumeration</category><category>reconnaissance</category></item><item><title>Kubernetes Endpoint Permission Enumeration</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-kubernetes-enumeration/</link><pubDate>Thu, 05 Mar 2026 13:13:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-kubernetes-enumeration/</guid><description>A single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.</description><content:encoded><![CDATA[<p>This detection identifies potential endpoint enumeration attempts within a Kubernetes environment. An attacker, or a compromised account, may attempt to map accessible resources within the Kubernetes cluster by issuing a burst of API calls across multiple endpoints from a single user and source IP address. This is achieved through a combination of both successful and failed API requests.  The behavior is not typical of normal Kubernetes cluster operation. Attackers leverage this reconnaissance to identify high-value targets like secrets, pods, or nodes before attempting privilege escalation or lateral movement. The rule specifically looks for unusual patterns in Kubernetes audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Kubernetes cluster, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker uses <code>kubectl</code> or a similar tool to send a series of API requests.</li>
<li>The attacker attempts to enumerate Kubernetes API endpoints using &ldquo;get&rdquo;, &ldquo;list&rdquo;, &ldquo;watch&rdquo;, &ldquo;create&rdquo;, &ldquo;update&rdquo;, and &ldquo;patch&rdquo; verbs.</li>
<li>The requests target a variety of resources, including pods, services, deployments, secrets, and nodes.</li>
<li>The attacker analyzes the responses to identify endpoints and resources that are accessible with the current credentials. Successful and failed responses are both valuable for mapping permissions.</li>
<li>The attacker identifies valuable targets, such as secrets or sensitive data stored in configmaps.</li>
<li>The attacker attempts to escalate privileges by exploiting identified vulnerabilities or misconfigurations.</li>
<li>The attacker moves laterally within the cluster to gain access to other resources or workloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration can lead to privilege escalation, lateral movement, and data exfiltration within the Kubernetes cluster. Attackers can identify and compromise sensitive resources such as secrets, configmaps, and pods. The number of affected systems and the scope of the impact depend on the extent of the attacker&rsquo;s access and the sensitivity of the compromised resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Kubernetes audit logging to capture API server requests and responses, which is required for the provided rules and the original Elastic rule.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect enumeration attempts and tune them based on your environment.</li>
<li>Enforce the principle of least privilege by assigning appropriate RBAC roles to users and service accounts to limit potential enumeration damage.</li>
<li>Monitor Kubernetes audit logs for unusual API request patterns, specifically a high number of requests from a single user and IP address.</li>
<li>Review RBAC bindings for unexpected or overly broad access as mentioned in the overview.</li>
<li>Segment API access with network controls (private endpoint/VPN allowlists) as suggested in the response section of the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>enumeration</category><category>discovery</category></item><item><title>Potential Enumeration via Active Directory Web Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</guid><description>Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.</description><content:encoded><![CDATA[<p>The Active Directory Web Service (ADWS) facilitates querying Active Directory (AD) over a network, providing a web-based interface for directory services. Adversaries may exploit ADWS to enumerate network resources and user accounts, gaining insights into the environment. This attack involves loading Active Directory related modules and establishing network connections to the ADWS dedicated TCP port 9389. The goal is to gather information about the domain, user accounts, and permissions, which can be used for lateral movement, privilege escalation, and data exfiltration. Detection focuses on identifying suspicious processes loading <code>System.DirectoryServices*.dll</code> or <code>System.IdentityModel*.dll</code> and then connecting to the ADWS port.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target network.</li>
<li>The attacker executes a reconnaissance tool or script (e.g., PowerShell) on the compromised host.</li>
<li>The reconnaissance tool loads Active Directory related modules such as <code>System.DirectoryServices*.dll</code> and <code>System.IdentityModel*.dll</code>.</li>
<li>The reconnaissance tool attempts to establish a network connection to the ADWS service on TCP port 9389, the dedicated port for ADWS.</li>
<li>The tool queries ADWS to retrieve information about domain users (T1087.002), groups (T1069.002), systems (T1018), and permissions.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts and potential targets for lateral movement.</li>
<li>The attacker uses the discovered information to move laterally within the network.</li>
<li>The attacker escalates privileges, and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain detailed knowledge of the Active Directory environment. This information can be used to identify high-value targets, compromise privileged accounts, move laterally within the network, and ultimately achieve their objectives, which could include data theft, ransomware deployment, or disruption of services. The impact can range from data breaches to complete compromise of the Active Directory domain, depending on the attacker&rsquo;s goals and the level of access they achieve.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Suspicious Library Loading&rdquo; to detect processes loading AD-related DLLs (e.g., <code>System.DirectoryServices*.dll</code>, <code>System.IdentityModel*.dll</code>).</li>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Network Connection&rdquo; to monitor for network connections to destination port 9389 from unusual processes.</li>
<li>Review and whitelist legitimate administrative tools or scripts that load Active Directory-related modules and connect to the ADWS port as described in the &ldquo;False positive analysis&rdquo; section of the original rule documentation.</li>
<li>Implement network segmentation to limit access to the ADWS port (9389) to only trusted systems and users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>enumeration</category><category>adws</category><category>discovery</category><category>windows</category></item><item><title>Kubernetes Cluster Enumeration via Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-enumeration/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-enumeration/</guid><description>Attackers attempt to enumerate and discover sensitive information within a Kubernetes cluster by leveraging common shells, utilities, and specialized tools, as reflected in audit logs.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Kubernetes environments to gain unauthorized access and extract sensitive information. This activity often begins with enumeration and reconnaissance to map out the cluster&rsquo;s configuration, identify potential vulnerabilities, and locate valuable secrets. This involves the use of standard command-line tools and specialized Kubernetes utilities. Audit logs provide a valuable record of these enumeration attempts, particularly API requests containing shell commands, file transfer utilities, or tools like Rakkess and TruffleHog. This activity is typically aimed at reconnaissance, secret harvesting, or code execution within the cluster. Detecting these patterns in audit logs is critical for identifying and responding to potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with Kubernetes API access, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Kubernetes API server.</li>
<li>The attacker sends a request to the Kubernetes API to execute a shell within a pod, such as <code>/bin/bash</code> or <code>/bin/sh</code>, potentially URL-encoded.</li>
<li>The attacker uses <code>kubectl</code> within a pod to gather information about cluster resources, such as pods, services, and deployments.</li>
<li>The attacker attempts to download tools like <code>curl</code> or <code>wget</code> into a pod to facilitate further reconnaissance or lateral movement.</li>
<li>The attacker uses tools like <code>Rakkess</code> to enumerate role-based access control (RBAC) permissions to identify potential privilege escalation paths.</li>
<li>The attacker deploys <code>TruffleHog</code> to scan pod environments for exposed secrets, such as API keys and passwords.</li>
<li>The attacker exfiltrates gathered information and secrets or uses the gained access for lateral movement within the cluster or connected networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of a Kubernetes cluster can provide attackers with detailed information about the cluster&rsquo;s architecture, deployed applications, and security configurations. This allows attackers to identify vulnerabilities, escalate privileges, and gain access to sensitive data, such as API keys, passwords, and other secrets. This can lead to data breaches, service disruptions, and compromised infrastructure. The impact can range from a limited data exposure to a full-scale compromise of the entire Kubernetes environment and connected cloud resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kubernetes Potential Enumeration Activity&rdquo; Sigma rule to your SIEM to detect suspicious API requests containing shell commands, file transfer utilities, or specialized tools (Sigma rule).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the scope and impact of the potential enumeration activity.</li>
<li>Review and harden RBAC configurations to minimize the potential for privilege escalation (attack.t1609).</li>
<li>Implement strict network segmentation to limit lateral movement within the cluster and connected networks.</li>
<li>Regularly scan pods for exposed secrets using dedicated secret scanning tools and enforce secure secret management practices.</li>
<li>Monitor Kubernetes audit logs for unusual or unauthorized API activity (logsource: kubernetes, service: audit).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>enumeration</category><category>cloud</category></item><item><title>Suspicious Enumeration Commands Spawned via WMIPrvSE</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</guid><description>This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the Windows Management Instrumentation (WMI) to execute commands for reconnaissance and enumeration within a compromised system. This involves spawning native Windows tools via the WMI Provider Service (WMIPrvSE). This activity is often used to gather system and network information in a stealthy manner, which could be part of a larger attack, such as lateral movement or privilege escalation. This behavior matters because it allows adversaries to gather information about the target environment without using easily detectable methods, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses WMI to execute a reconnaissance command.</li>
<li>WMIPrvSE.exe is invoked to execute the attacker&rsquo;s specified command.</li>
<li>The attacker executes commands such as <code>ipconfig.exe</code>, <code>net.exe</code>, or <code>systeminfo.exe</code> via WMIPrvSE.exe to gather network configuration details, user information, and system information.</li>
<li>The enumerated information is collected and potentially exfiltrated to a command and control server.</li>
<li>The attacker uses the gathered information to identify further targets within the network.</li>
<li>The attacker moves laterally to other systems using stolen credentials or exploited vulnerabilities.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of enumeration commands via WMIPrvSE allows attackers to gather sensitive information about the system and network environment. This information can be used to facilitate lateral movement, privilege escalation, and data theft, potentially leading to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the execution of enumeration commands (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Enumeration Command Spawned via WMIPrvSE&rdquo; to your SIEM to detect suspicious WMIPrvSE activity (Sigma rule).</li>
<li>Investigate any instances of WMIPrvSE spawning common enumeration tools such as <code>net.exe</code>, <code>ipconfig.exe</code>, or <code>systeminfo.exe</code> (Sigma rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following successful enumeration (Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>enumeration</category><category>wmi</category><category>discovery</category><category>execution</category><category>windows</category></item></channel></rss>