<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exfiltration — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/exfiltration/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 11:28:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/exfiltration/feed.xml" rel="self" type="application/rss+xml"/><item><title>Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</link><pubDate>Mon, 04 May 2026 11:28:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</guid><description>A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.</description><content:encoded><![CDATA[<p>A compromised Bitwarden CLI npm package allows a remote, anonymous attacker to steal credentials and exfiltrate sensitive information. The specific version of the compromised package is not detailed in the advisory. This supply chain attack targets developers and users who rely on the Bitwarden CLI for managing their passwords and secrets. This attack has the potential to expose sensitive credentials, leading to unauthorized access to systems and data. Defenders need to monitor for unusual activity related to the Bitwarden CLI and its usage within their environments to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a Bitwarden CLI npm package through techniques such as typosquatting, account compromise, or dependency confusion.</li>
<li>Unsuspecting developers or users download and install the compromised package from the npm registry.</li>
<li>During installation, the malicious package executes malicious code injected by the attacker.</li>
<li>The malicious code collects Bitwarden credentials and other sensitive information stored in the CLI&rsquo;s configuration.</li>
<li>The compromised package establishes a covert communication channel (e.g., HTTPS) to an attacker-controlled server.</li>
<li>Stolen credentials and sensitive information are exfiltrated to the attacker&rsquo;s server.</li>
<li>The attacker uses the stolen credentials to access victim&rsquo;s Bitwarden vaults or other systems.</li>
<li>The attacker may further escalate privileges and compromise additional systems within the victim&rsquo;s environment using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of sensitive credentials and information stored within Bitwarden CLI. The number of victims is currently unknown. Organizations using the compromised package could experience unauthorized access to critical systems, data breaches, and potential financial losses. The targeted sectors are broad, encompassing any organization utilizing the Bitwarden CLI for password management and secret storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for unusual activity or unexpected dependencies using process creation logs and file integrity monitoring.</li>
<li>Implement strict code review processes for all third-party dependencies, especially those related to security tools like Bitwarden CLI.</li>
<li>Deploy the Sigma rule detecting suspicious network connections from the Bitwarden CLI executable to identify potential data exfiltration.</li>
<li>Enforce multi-factor authentication (MFA) on Bitwarden accounts to mitigate the impact of credential theft.</li>
<li>Regularly audit and review the permissions and access rights associated with Bitwarden CLI credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>exfiltration</category><category>npm</category></item><item><title>Malicious Chrome Extensions Stealing Data and Opening Backdoors</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</guid><description>A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.</description><content:encoded><![CDATA[<p>A coordinated campaign involving 108 malicious Chrome extensions has been discovered. These extensions, distributed through five accounts (GameGen, InterAlt, SideGames, Rodeo Games, and Yana Project), are designed to steal user data, inject ads, and create backdoors. Over 20,000 users have installed these extensions. The extensions provide expected functionality to avoid suspicion, but malicious code runs in the background, communicating with a shared C&amp;C infrastructure to perform nefarious activities. The extensions target various user types by masquerading as Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and page utility extensions. This campaign poses a significant threat to user privacy and system security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Users install malicious Chrome extensions from the Chrome Web Store, believing they are legitimate tools (e.g., Telegram clients, games, enhancers).</li>
<li>Upon installation, the extensions execute JavaScript code in the background.</li>
<li>Extensions designed for credential theft acquire Google OAuth2 Bearer tokens and exfiltrate user information (email, name, profile picture) to a remote server.</li>
<li>Extensions targeting Telegram steal the active Telegram Web session by overwriting local storage with attacker-supplied data and force-reloading Telegram.</li>
<li>Some extensions contain a backdoor that opens an arbitrary URL received from the C&amp;C server in a new tab upon browser start.</li>
<li>Other malicious activities include injecting ads into YouTube and TikTok pages, injecting content scripts into all visited pages, or proxying translation requests through attacker-controlled servers.</li>
<li>The attacker gains access to user accounts (Google, Telegram) and can inject malicious content, redirect traffic, and steal sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Over 20,000 users have been affected by these malicious extensions. The campaign targets a broad range of users by using different categories of extensions. Successful exploitation can lead to stolen credentials, account takeover, data exfiltration, ad fraud, and the ability to inject arbitrary content into visited websites. The compromised systems could be used for further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections originating from Chrome extensions for connections to unusual or suspicious domains using a network connection rule (see example rule below).</li>
<li>Implement strict policies for Chrome extension installations, including whitelisting approved extensions and blocking installation from untrusted sources.</li>
<li>Deploy the Sigma rule to detect the execution of scripts from the malicious extensions to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome-extension</category><category>credential-theft</category><category>backdoor</category><category>ad-injection</category><category>exfiltration</category></item><item><title>GitHub Exfiltration via High Number of Repository Clones</title><link>https://feed.craftedsignal.io/briefs/2026-06-github-exfiltration/</link><pubDate>Fri, 10 Apr 2026 17:40:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-github-exfiltration/</guid><description>A single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.</description><content:encoded><![CDATA[<p>This alert identifies potential data exfiltration from GitHub via rapid repository cloning. Attackers often target code repositories to steal proprietary code, embedded secrets, and build artifacts. This activity can be indicative of a compromised personal access token (PAT) being used in a script to enumerate and clone repositories from a CI runner or cloud VM. Private and internal repositories are particularly attractive targets, as they often contain sensitive information. The alert focuses on detecting unusual patterns of bulk cloning within a short timeframe, allowing defenders to respond quickly before significant data loss occurs. The original rule was created on 2025/12/16 and updated on 2026/04/10. This activity is often associated with supply chain attacks and the compromise of CI/CD pipelines, similar to the Shai Hulud attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to a GitHub account or obtains a valid, but misused, Personal Access Token (PAT).</li>
<li>The attacker uses the compromised credentials to authenticate to the GitHub API.</li>
<li>The attacker script enumerates accessible repositories within the organization, identifying potential targets.</li>
<li>A script is executed to initiate a high volume of <code>git clone</code> operations against the targeted repositories.</li>
<li>Repositories, including private and internal ones, are cloned to a staging area, often a CI runner or cloud VM.</li>
<li>The cloned data is compressed and staged for exfiltration, potentially involving archiving or large outbound transfers.</li>
<li>The attacker exfiltrates the cloned data to an external location, potentially via a web service or other covert channel.</li>
<li>The exfiltrated data is used for malicious purposes, such as reverse engineering, finding vulnerabilities, or selling sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of GitHub repositories can lead to the exposure of sensitive source code, trade secrets, and proprietary algorithms. This can result in significant financial losses, reputational damage, and competitive disadvantage. In the event of secrets exposure (API keys, passwords, etc.), downstream systems and services may also be compromised. Depending on the nature of the exfiltrated code, legal and regulatory repercussions are also possible. Mass cloning of dozens of repositories can quickly siphon proprietary code, embedded secrets, and build artifacts across teams before defenses can respond.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github Exfiltration via High Number of Clones in Short Time</code> to your SIEM and tune the threshold (event_count &gt;= 25) for your environment to reduce false positives based on legitimate automated activity.</li>
<li>Monitor GitHub audit logs for <code>git.clone</code> events, focusing on users with a high number of clones within a short timeframe to catch suspicious activity.</li>
<li>Revoke any GitHub tokens identified as being used for mass cloning, and force password resets and 2FA re-verification for the associated user accounts.</li>
<li>Investigate the originating host (identified by the <code>agent.id</code> or <code>user_agent</code> fields) for signs of compromise and block/quarantine it to prevent further exfiltration.</li>
<li>Implement organization-wide SAML SSO, disallow classic PATs, and enforce IP allowlisting for PAT use to enhance security posture.</li>
<li>Enable secret scanning with push protection on all repositories to prevent accidental or intentional exposure of credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>exfiltration</category><category>code_repository</category></item><item><title>Kimsuky Malware Using Dropbox API for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</link><pubDate>Thu, 19 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kimsuky-dropbox-api/</guid><description>Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.</description><content:encoded><![CDATA[<p>Kimsuky, a North Korean APT group, has been observed utilizing malware that leverages the Dropbox API for command and control (C2). This allows the malware to blend in with legitimate network traffic, making detection more challenging. The malware uses the Dropbox API to upload stolen data and download commands from the attackers. This method provides a covert channel for exfiltration and control, bypassing traditional network-based security measures. The group has been known to target South Korean entities, but the scope of targeting may extend beyond this region. This technique has been observed starting in early 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unconfirmed vector, such as spear phishing or watering hole attacks, delivering an initial downloader.</li>
<li>The downloader executes and establishes persistence, potentially by creating scheduled tasks or modifying registry keys.</li>
<li>The malware initializes the Dropbox API, authenticating with stolen or embedded API keys.</li>
<li>The malware enumerates files on the compromised system, targeting documents, credentials, and other sensitive data.</li>
<li>Stolen data is compressed and encrypted before being uploaded to a designated Dropbox folder controlled by the attacker, using the Dropbox API.</li>
<li>The malware periodically checks the attacker&rsquo;s Dropbox folder for new commands, also using the Dropbox API.</li>
<li>Downloaded commands are decrypted and executed on the compromised system, enabling actions such as remote code execution or further data exfiltration.</li>
<li>The cycle of data exfiltration and command execution continues, allowing the attacker to maintain persistent access and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to significant data breaches, intellectual property theft, and espionage. Kimsuky&rsquo;s targeting of South Korean entities suggests a focus on political and strategic intelligence gathering. The use of Dropbox as a C2 channel allows the attackers to remain undetected for extended periods, maximizing the impact of the compromise. The number of victims is currently unknown, but the potential for widespread compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual API calls to Dropbox, especially from unknown or suspicious processes (see: &ldquo;Detect Suspicious Dropbox API Usage&rdquo; Sigma rule).</li>
<li>Implement strict access controls and monitoring for Dropbox API usage within the organization.</li>
<li>Investigate and block any suspicious processes attempting to access Dropbox API endpoints.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>kimsuky</category><category>dropbox</category><category>api</category><category>command-and-control</category><category>exfiltration</category></item><item><title>Potential Abuse of Certreq for File Transfer via HTTP POST</title><link>https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</link><pubDate>Sun, 28 Jan 2024 20:47:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</guid><description>Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.</description><content:encoded><![CDATA[<p>The Windows Certreq utility is a command-line tool used for managing certificates. Adversaries may abuse Certreq to download files from or upload data to a remote server by initiating an HTTP POST request. This behavior can be used for command and control (C2) or exfiltration. This technique leverages a legitimate system binary (LOLBin) to evade detection. Elastic has observed this behavior being detected through multiple data sources including Elastic Defend, Microsoft Defender XDR, Sysmon, SentinelOne, and Crowdstrike. This is a cross-industry threat that can affect any organization using Windows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Certreq.exe with the <code>-Post</code> argument to initiate an HTTP POST request.</li>
<li>The Certreq process attempts to connect to a remote server to send or receive data.</li>
<li>The remote server responds to the Certreq request, potentially delivering a file or receiving exfiltrated data.</li>
<li>The downloaded file is saved to disk (if applicable).</li>
<li>The attacker may execute the downloaded file or further process the exfiltrated data.</li>
<li>The attacker may attempt to clean up the Certreq command from command history or logs to evade detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the download and execution of malicious payloads, potentially compromising the affected system and network. Alternatively, sensitive data could be exfiltrated from the target environment. The impact can range from data theft and system compromise to full network intrusion, depending on the attacker&rsquo;s objectives and the data accessed. The severity is medium because Certreq is a legitimate tool, and its abuse requires specific command-line arguments and network activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Certreq HTTP Post Request&rdquo; to your SIEM to identify potential abuse of Certreq for file transfer.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of Certreq.exe and its command-line arguments, enabling detections.</li>
<li>Monitor network connections originating from Certreq.exe for unusual destinations or data transfer patterns using network connection logs.</li>
<li>Investigate any instances of Certreq.exe executing with the <code>-Post</code> argument, as this is not typical usage of the utility.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbin</category><category>command-and-control</category><category>exfiltration</category><category>certreq</category></item><item><title>Detecting Rare SMB Connections for Potential NTLM Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</guid><description>This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying unusual Server Message Block (SMB) traffic that originates from internal IP addresses and connects to external networks. The SMB protocol, commonly used for file and printer sharing within a network, can be exploited to exfiltrate data by injecting rogue UNC paths to capture NTLM credentials. This activity is often associated with threat actors attempting to steal credentials for lateral movement or data exfiltration. Defenders should be aware of this technique as it allows adversaries to bypass traditional security controls by leveraging a legitimate protocol for malicious purposes. This detection is relevant for environments utilizing Windows operating systems and SMB for internal network communications. The goal is to identify and alert on SMB connections to external IPs, excluding known safe ranges and legitimate business applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an internal system via phishing or other means (not detailed in source).</li>
<li>The attacker injects a rogue UNC path into a document, email, or other medium.</li>
<li>A user opens the malicious document or clicks the injected link, triggering an SMB connection to a malicious external server.</li>
<li>The SMB connection attempts to authenticate with the user&rsquo;s NTLM credentials.</li>
<li>The attacker captures the NTLM hash from the authentication attempt.</li>
<li>The attacker attempts to crack the NTLM hash to obtain the user&rsquo;s password.</li>
<li>Using the cracked password, the attacker gains unauthorized access to other systems and resources on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential theft, allowing attackers to gain unauthorized access to sensitive data and systems within the organization. This can result in data breaches, financial losses, and reputational damage. The impact is significant because SMB is a common protocol within many Windows environments, making this technique highly effective if not properly monitored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect SMB Connection to External IP&rdquo; to your SIEM to identify potentially malicious SMB connections to the internet. Tune the rule by excluding known good external IPs used by legitimate services.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) with proper filtering to capture SMB traffic details as recommended in the linked setup guide, to enhance the fidelity of the detection.</li>
<li>Implement network segmentation to restrict SMB traffic to only necessary internal communications, reducing the attack surface and mitigating the risk of external exposure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exfiltration</category><category>credential-access</category><category>windows</category><category>smb</category><category>ntlm</category></item><item><title>Suspicious SMTP Activity on Port 26/TCP</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</guid><description>This rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious SMTP activity occurring over TCP port 26. While standard SMTP traffic typically uses port 25, port 26 is sometimes used as an alternative to avoid conflicts or restrictions. The BadPatch malware family has been known to leverage port 26 for command and control (C2) communications with compromised Windows systems. This activity is considered suspicious because legitimate uses of SMTP on port 26 are less common and can indicate malicious activity, such as covert C2 channels used by malware like BadPatch. The rule analyzes network traffic to detect SMTP communication occurring on this non-standard port, helping to identify potential infections or unauthorized network activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial infection occurs via an unspecified method (e.g., phishing, exploit).</li>
<li>Malware establishes a foothold on the compromised system.</li>
<li>Malware configures itself to use SMTP on port 26 for C2 communications.</li>
<li>The infected host initiates a TCP connection to a remote server on port 26.</li>
<li>The malware sends commands to the infected host over the SMTP connection on port 26.</li>
<li>The infected host executes the received commands.</li>
<li>The malware may exfiltrate data to the remote server over the SMTP connection on port 26.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems may be remotely controlled by attackers, leading to data theft, malware propagation, or further malicious activities. The use of non-standard ports like 26 can help attackers evade detection. If successful, an attacker can maintain persistence and control over the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SMTP Traffic on TCP Port 26</code> to your SIEM and tune for your environment to detect potential command and control activity.</li>
<li>Investigate any network connections on TCP port 26 to identify potentially malicious SMTP traffic.</li>
<li>Review network traffic logs focusing on <code>network_traffic.flow</code> or <code>zeek.smtp</code> events to detect unusual patterns associated with TCP port 26.</li>
<li>Implement firewall rules to block unauthorized SMTP traffic on port 26.</li>
<li>Examine source and destination IP addresses of traffic on port 26, and correlate with threat intelligence sources to identify known malicious actors as per the references.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>command-and-control</category><category>exfiltration</category><category>network-traffic</category></item><item><title>Detection of Encrypted Archive Creation with WinRAR or 7-Zip</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</guid><description>Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.</description><content:encoded><![CDATA[<p>Attackers frequently compress and encrypt data before exfiltration to reduce the amount of data being sent over the network and to obfuscate the contents. This behavior often indicates a later stage of intrusion where the attacker has already collected sensitive data and is preparing to move it out of the environment. The use of archiving tools like WinRAR and 7-Zip with encryption flags can help attackers to hide their activities, making it more difficult for defenders to identify and respond to data theft. This technique has been observed in multiple threat actors including Turla as documented by WeLiveSecurity. This brief focuses on detecting command-line activity indicative of archive creation with encryption using WinRAR or 7-Zip on Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Credential Access:</strong> The attacker attempts to obtain credentials using techniques such as Mimikatz or credential dumping.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify sensitive data and systems of interest.</li>
<li><strong>Data Collection:</strong> The attacker gathers sensitive data from various locations on the compromised system or network.</li>
<li><strong>Archive Creation:</strong> The attacker uses WinRAR or 7-Zip to create an encrypted archive of the collected data using command-line arguments like <code>-hp</code>, <code>-p</code>, <code>/hp</code>, or <code>/p</code> with <code>rar.exe</code> or <code>WinRAR.exe</code> or <code>-p*</code> with <code>7z.exe</code> or <code>7za.exe</code>.</li>
<li><strong>Data Staging:</strong> The encrypted archive is moved to a staging location, such as a temporary directory or removable media.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the encrypted archive from the network using various methods, such as FTP, SCP, or cloud storage services.</li>
<li><strong>Covering Tracks:</strong> The attacker deletes the archive from the staging location to remove evidence of the activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including personally identifiable information (PII), financial records, intellectual property, and other confidential information. This can result in significant financial losses, reputational damage, legal liabilities, and regulatory fines for the victim organization. The number of victims and specific sectors targeted will vary depending on the attacker&rsquo;s objectives and the nature of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Encrypting Files with WinRar or 7z - CommandLine&rdquo; to your SIEM to detect the execution of WinRAR or 7-Zip with encryption parameters (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Enable process creation logging with command line arguments in Sysmon to ensure the necessary data is available for detection (Data Source: Sysmon).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the scope and impact of the potential data exfiltration attempt (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Monitor network traffic for unusual outbound connections, particularly to cloud storage services or other external destinations, that may indicate data exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>archive</category><category>exfiltration</category><category>windows</category></item><item><title>SMB (Windows File Sharing) Activity to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</link><pubDate>Tue, 02 Jan 2024 14:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</guid><description>This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.</description><content:encoded><![CDATA[<p>The provided Elastic rule identifies instances of Server Message Block (SMB), also known as Windows File Sharing, being transmitted to external IP addresses. SMB is intended for internal network communication for file, printer, and resource sharing. Exposing SMB to the internet presents a significant security risk. Threat actors frequently target and exploit SMB for initial access, deploying backdoors, or exfiltrating sensitive data. This activity warrants immediate investigation as it violates best practices and poses a direct threat to network security. The rule focuses on traffic on TCP ports 139 and 445, originating from internal IP ranges and destined for external IPs, excluding known safe IP ranges, as defined by IANA. The rule was last updated April 24, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised, often through phishing or other social engineering techniques.</li>
<li>The compromised host attempts to establish an SMB connection to an external IP address on TCP ports 139 or 445.</li>
<li>The attacker leverages the SMB protocol to attempt authentication, potentially exploiting vulnerabilities like credential stuffing or known SMB exploits.</li>
<li>Upon successful authentication or exploitation, the attacker gains unauthorized access to shared resources or system services on the external system.</li>
<li>The attacker may upload malicious payloads, such as malware or backdoors, via the SMB connection to the external host.</li>
<li>The attacker uses the SMB protocol to exfiltrate sensitive data from the internal network to the external system.</li>
<li>The attacker maintains persistence on the compromised internal host, using SMB for command and control or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising SMB services can lead to significant data breaches, system compromise, and potential ransomware deployment. Exposed SMB services allow attackers to gain unauthorized access to sensitive files, critical infrastructure, and internal network resources. Successful exploitation can result in complete system takeover, data exfiltration, and disruption of business operations. While the exact number of victims is unknown, the prevalence of SMB vulnerabilities and misconfigurations suggests a widespread risk across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect SMB traffic to the internet and tune for your environment.</li>
<li>Review firewall and network configurations to ensure SMB traffic is not allowed to the Internet, and block any unauthorized outbound SMB traffic on ports 139 and 445, as identified by the rule description.</li>
<li>Investigate the source IP addresses triggering the rule, identifying internal systems initiating SMB traffic and determining if they belong to known devices or users within the organization, as described in the provided investigation guide.</li>
<li>Regularly audit network configurations and update the rule exceptions to include any legitimate device IPs to prevent false positives, as mentioned in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>network</category></item><item><title>First Time Seen Removable Device Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</guid><description>Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.</description><content:encoded><![CDATA[<p>This detection identifies the first-time appearance of removable devices on a Windows system by monitoring registry modifications. While not inherently malicious, the activity can indicate potential data exfiltration over removable media or initial access attempts using malware delivered via USB. The rule specifically looks for registry events with the &ldquo;FriendlyName&rdquo; value associated with USB storage devices (&ldquo;USBSTOR&rdquo;). This helps in identifying potentially unauthorized devices connected to the system. The detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user connects a removable device (e.g., USB drive) to a Windows system.</li>
<li>The operating system detects the new device and attempts to enumerate its properties.</li>
<li>The system queries the registry for device-specific settings, including the &ldquo;FriendlyName,&rdquo; under the <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR</code> key.</li>
<li>If the device is new to the system, the registry is modified to record the device&rsquo;s information, including its friendly name.</li>
<li>The event generates a registry modification event, which is logged by Sysmon, Elastic Defend, Microsoft Defender XDR, or SentinelOne.</li>
<li>An attacker may use the USB device to deploy malware or exfiltrate sensitive data.</li>
<li>The attacker copies files to the USB device.</li>
<li>The attacker removes the USB device, completing the exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and data exfiltration via USB can lead to the loss of sensitive information, intellectual property theft, or the introduction of malware into the network. Although this alert is low severity, multiple alerts across the environment may indicate an active campaign. The detection focuses on registry modifications, which are early indicators of device connection, allowing for proactive monitoring and response.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect registry modifications related to USB devices and activate the Sigma rules below.</li>
<li>Deploy the Sigma rules provided to your SIEM to detect and monitor first-time seen USB devices.</li>
<li>Investigate any alerts generated by the Sigma rules, correlating with user activity and file access events.</li>
<li>Maintain a list of approved USB devices and create exceptions for them in the monitoring system to reduce false positives as described in the rule documentation.</li>
<li>Monitor for subsequent file access or transfer events involving the new device as described in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>windows</category><category>registry</category><category>usb</category></item><item><title>SMB Registry Hive Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2024-01-smb-registry-exfiltration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smb-registry-exfiltration/</guid><description>Detection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential exfiltration of Windows registry hives via SMB shares, a tactic often employed after credential dumping. Attackers target sensitive hives like the Security Account Manager (SAM) to extract cached credentials. By copying these hives to an attacker-controlled system, they evade local host-based detection and facilitate offline credential decryption. The Elastic detection rule <code>a4c7473a-5cb4-4bc1-9d06-e4a75adbc494</code> identifies the creation or modification of registry hive files (identified by the &ldquo;regf&rdquo; header) exceeding 30KB on SMB shares, specifically when performed by the SYSTEM process (PID 4) under a user context associated with system accounts (S-1-5-21 or S-1-12-1). This behavior raises suspicion, particularly when observed outside expected file paths. Defenders should monitor for this activity as it often precedes lateral movement and further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Windows system.</li>
<li>The attacker elevates privileges to SYSTEM or a similar high-privilege account.</li>
<li>The attacker executes a credential dumping tool (e.g., <code>reg save HKLM\SAM sam.hive</code>) to extract the SAM registry hive.</li>
<li>The attacker executes <code>reg save HKLM\SYSTEM system.hive</code> to extract the SYSTEM registry hive, enabling decryption of SAM secrets.</li>
<li>The attacker connects to a remote SMB share (e.g., <code>\\attacker.example.com\share</code>) from the compromised host.</li>
<li>The SYSTEM process (PID 4) creates or modifies a file on the SMB share, identified as a registry hive by its header (&ldquo;regf&rdquo;).</li>
<li>The exfiltrated registry hive file is larger than 30KB, bypassing size-based filtering.</li>
<li>The attacker utilizes the exfiltrated SAM and SYSTEM hives to extract user credentials offline, facilitating lateral movement or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of registry hives can lead to widespread credential compromise, enabling attackers to move laterally within the network, access sensitive data, and potentially achieve domain dominance. The impact includes unauthorized access to critical systems, data breaches, and significant disruption of business operations. The number of affected systems directly correlates with the scope of credential access achieved by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Elastic detection rule <code>a4c7473a-5cb4-4bc1-9d06-e4a75adbc494</code> or the Sigma rules provided in this brief to your SIEM and tune for your environment to detect registry hive exfiltration attempts.</li>
<li>Enable file creation and modification logging on SMB shares, specifically focusing on events associated with the SYSTEM process and registry hive file signatures, to increase visibility.</li>
<li>Review and harden SMB share permissions to restrict unauthorized access and prevent credential dumping from remote systems.</li>
<li>Investigate any alerts generated by these rules promptly, focusing on identifying the source host, the user account involved, and the destination SMB share.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to mitigate the impact of credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>exfiltration</category><category>windows</category></item></channel></rss>