<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exploitation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/exploitation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/exploitation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Democratization of Business Email Compromise (BEC) Attacks</title><link>https://feed.craftedsignal.io/briefs/2026-04-democratized-bec/</link><pubDate>Fri, 03 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-democratized-bec/</guid><description>Attackers are leveraging AI to rapidly reconnoiter and tailor content for smaller organizations, making it easier to execute business email compromise (BEC) scams and scam smaller sums from many victims, as demonstrated by a recent attack targeting a small community organization.</description><content:encoded><![CDATA[<p>Business Email Compromise (BEC) attacks have historically targeted large organizations with significant payouts justifying the required time investment. However, recent trends indicate a democratization of BEC, with smaller organizations becoming increasingly targeted. This shift is largely driven by the adoption of AI, enabling attackers to rapidly reconnoiter and tailor content for smaller organizations at scale. Attackers are now targeting smaller community associations, charities, and businesses, recognizing that scamming smaller sums from many victims can be as profitable as scamming large sums from a few. These organizations are often less aware of the threat and thus more vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> Attackers use AI-powered tools to gather information about target organizations and key personnel (e.g., community associations, small businesses).</li>
<li><strong>Impersonation:</strong> Attackers craft emails impersonating trusted individuals within the organization (e.g., the chair of the association).</li>
<li><strong>Request Initiation:</strong> The attacker sends an email requesting a fund transfer to an account they control, relying on social engineering to trick someone with payment authority.</li>
<li><strong>Evasion:</strong> The initial email is often sent from a plausible email address or a compromised genuine account.</li>
<li><strong>Account Compromise</strong>: Exploit React2Shell vulnerability (CVE-2025-55182) in Next.js applications to gain access to sensitive data, including cloud tokens, database credentials, and SSH keys, which are used for lateral movement.</li>
<li><strong>Data Exfiltration</strong>: Sensitive data, including cloud tokens, database credentials, and SSH keys, is exfiltrated using custom framework called &ldquo;NEXUS Listener&rdquo;.</li>
<li><strong>Obfuscation:</strong> Once received, funds typically pass through money mules or compromised personal accounts before being rapidly shuffled through multiple transfers, obscuring the trail.</li>
<li><strong>Financial Gain:</strong> The attacker successfully initiates the fund transfer and receives the money.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The democratization of BEC attacks expands the threat landscape to include vulnerable small organizations. While the individual sums may be smaller, the cumulative impact of successful attacks can be significant. If successful, organizations suffer financial losses, potential data breaches through stolen credentials (related to CVE-2025-55182), and reputational damage. The European Commission investigated a breach after an Amazon cloud account hack, highlighting the potential for data leaks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate employees, especially those with payment authority, about the signs of BEC scams, emphasizing unexpected requests for payment and the importance of verifying requests through separate channels (reference: Overview section).</li>
<li>Implement and enforce strict procurement rules that prevent any last-minute urgent payments (reference: Overview section).</li>
<li>Patch Next.js applications against React2Shell vulnerability (CVE-2025-55182) immediately and rotate potentially compromised credentials including API keys and SSH keys (reference: &ldquo;The one big thing&rdquo; section).</li>
<li>Deploy the following Sigma rule to detect suspicious process creation activity (reference: rules section).</li>
<li>Monitor for the presence of the malware files identified in the report using the provided SHA256 hashes (reference: IOCs section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>business-email-compromise</category><category>bec</category><category>ai</category><category>social-engineering</category><category>credential-harvesting</category><category>exploitation</category></item><item><title>Potential JAVA/JNDI Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</link><pubDate>Wed, 01 Apr 2026 14:24:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/</guid><description>This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies potential exploitation attempts targeting Java Naming and Directory Interface (JNDI) vulnerabilities. These vulnerabilities, exemplified by CVE-2021-45046, allow attackers to perform remote code execution by injecting malicious payloads through directory services like LDAP. The rule focuses on detecting suspicious outbound network connections from Java processes to standard ports associated with LDAP (389, 1389), RMI (1099), and DNS (53, 5353), followed by the execution of suspicious child processes indicative of command execution such as shell interpreters (sh, bash, zsh) or scripting languages (python, perl). The rule aims to identify exploitation attempts similar to those seen with Log4Shell and related vulnerabilities, which have been actively exploited since late 2021. It covers Linux and macOS environments and provides a mechanism to detect ongoing exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A vulnerable Java application receives malicious input containing a JNDI lookup string.</li>
<li>The Java application attempts to resolve the JNDI name, initiating an outbound network connection to an LDAP, RMI, or DNS server on ports 389, 1389, 1099, 53, or 5353.</li>
<li>The malicious LDAP/RMI/DNS server, controlled by the attacker, responds with a payload referencing a malicious Java class or remote code.</li>
<li>The Java application loads and executes the malicious code.</li>
<li>As a result of the executed code, a shell interpreter (sh, bash, zsh, etc.) or scripting language (python, perl, ruby, php, wget) is spawned as a child process of the Java application.</li>
<li>The spawned shell/script executes attacker-controlled commands for reconnaissance, privilege escalation, or lateral movement.</li>
<li>The attacker gains a foothold on the system.</li>
<li>The attacker performs actions such as data exfiltration or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of JNDI vulnerabilities can lead to remote code execution, allowing attackers to gain complete control over affected systems. This can result in data breaches, system compromise, and further propagation of attacks within the network. The impact can range from service disruption to complete system takeover. Public exploits for vulnerabilities such as Log4Shell have been widely available, leading to widespread scanning and exploitation attempts across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential JAVA/JNDI Exploitation Attempt&rdquo; to your SIEM to detect suspicious Java processes initiating network connections to LDAP, RMI, or DNS ports followed by suspicious child processes.</li>
<li>Enable process creation and network connection logging on Linux and macOS endpoints to provide the necessary data for the Sigma rules to function correctly.</li>
<li>Review and whitelist legitimate Java applications that may trigger false positives due to legitimate network connections (see the &ldquo;False positive analysis&rdquo; section in the original rule&rsquo;s <code>note</code> field).</li>
<li>Implement network segmentation to limit the impact of successful exploitation by restricting lateral movement.</li>
<li>Patch vulnerable Java applications and libraries, such as Log4j, to prevent exploitation of known vulnerabilities like CVE-2021-45046.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>jndi</category><category>java</category><category>log4shell</category><category>rce</category><category>exploitation</category></item><item><title>Ongoing Exploitation of Cisco SD-WAN Systems</title><link>https://feed.craftedsignal.io/briefs/2026-02-cisco-sdwan-vulns/</link><pubDate>Wed, 25 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-cisco-sdwan-vulns/</guid><description>Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.</description><content:encoded>&lt;p>CISA and its partners have observed malicious cyber actors targeting and compromising Cisco SD-WAN systems across various organizations globally. The attackers are leveraging CVE-2026-20127, an authentication bypass vulnerability, for initial access. Following successful exploitation of CVE-2026-20127, the attackers escalate privileges and establish long-term persistence within the compromised SD-WAN systems using CVE-2022-20775. In response to this active exploitation, CISA issued Emergency…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco-sdwan</category><category>vulnerability</category><category>exploitation</category><category>network</category></item></channel></rss>