<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 16:34:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</link><pubDate>Wed, 22 Apr 2026 16:34:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</guid><description>This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.</description><content:encoded><![CDATA[<p>Attackers are increasingly exploiting GenAI tools to automate the discovery and exfiltration of sensitive information from compromised systems. This involves using GenAI agents to systematically scan file systems for credentials, API keys, tokens, and other secrets. Access to credential stores (.aws/credentials, .ssh/id_*) indicates credential harvesting, while modifications to shell configuration files (.bashrc, .zshrc) point to persistence attempts.  The observed activity leverages legitimate GenAI tool functionality, making it difficult to distinguish between benign use and malicious intent.  This technique has become more prevalent since late 2025, with attackers refining methods to instruct GenAI agents to specifically target and exfiltrate sensitive files. Defenders must monitor for unusual file access patterns by GenAI processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system via phishing or exploiting a software vulnerability.</li>
<li>Attacker installs or deploys a GenAI tool (e.g., LM Studio, Claude, Copilot) on the compromised system.</li>
<li>The attacker configures the GenAI tool to scan the file system for specific file names and patterns associated with sensitive data (credentials, keys, cookies).</li>
<li>The GenAI tool accesses files such as <code>.aws/credentials</code>, <code>.ssh/id_rsa</code>, browser login databases (e.g., <code>Login Data</code>, <code>logins.json</code>, <code>Cookies</code>), and other credential stores.</li>
<li>The GenAI tool may modify shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>The GenAI tool stages the collected data for exfiltration.</li>
<li>The attacker exfiltrates the harvested credentials and data to an external server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread credential compromise, allowing attackers to move laterally within a network, access sensitive data, and potentially disrupt critical business operations. A single compromised developer workstation could expose cloud infrastructure credentials, impacting hundreds of systems and services. The use of GenAI tools allows for rapid and automated credential harvesting, significantly increasing the scale and speed of potential breaches. Sectors at high risk include software development, cloud computing, and any organization that relies heavily on API keys and secrets for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>GenAI Process Accessing Sensitive Files</code> to your SIEM to detect GenAI tools accessing sensitive files. Tune for your environment to reduce false positives.</li>
<li>Monitor file access events, specifically looking for GenAI processes (ollama, lmstudio, claude) accessing files with names like <code>credentials</code>, <code>id_rsa</code>, <code>logins.json</code>, and <code>.bashrc</code>, as outlined in the Sigma rule.</li>
<li>Implement stricter access controls and monitoring for sensitive directories like <code>.aws</code>, <code>.ssh</code>, and browser profile directories.</li>
<li>Regularly audit and rotate credentials, API keys, and tokens, especially those stored in files.</li>
<li>Educate developers and users about the risks of using GenAI tools to handle sensitive data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>genai</category><category>file-access</category><category>persistence</category></item><item><title>WWBN AVideo Unauthorized File Access and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-avideo-file-access/</link><pubDate>Mon, 23 Mar 2026 16:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-avideo-file-access/</guid><description>WWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to unauthorized file access and deletion in versions up to and including 26.0. The vulnerability resides in the <code>objects/import.json.php</code> endpoint, which lacks proper directory restriction on the user-controlled <code>fileURI</code> POST parameter. This allows an authenticated user with upload permissions to bypass intended security measures and access or delete files outside of their authorized scope. The vulnerability was addressed in commit e110ff542acdd7e3b81bdd02b8402b9f6a61ad78. This vulnerability allows for the potential compromise of sensitive video content and adjacent data. Exploitation can lead to data theft and potential data loss. Defenders should prioritize patching and monitoring for suspicious activity targeting this endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the AVideo platform with a valid user account that possesses upload permissions.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>objects/import.json.php</code> endpoint.</li>
<li>The POST request includes the <code>fileURI</code> parameter, which is set to a path pointing to a target video file or adjacent text file outside the user&rsquo;s designated directory.</li>
<li>The server-side code processes the request without performing adequate directory restriction checks on the <code>fileURI</code> parameter.</li>
<li>If the target is a video file, the server imports the video file into the attacker&rsquo;s account, allowing the attacker to steal private video files.</li>
<li>If the target is a readable text file adjacent to a video, the attacker can access its contents via the import mechanism.</li>
<li>If the targeted file (either video or adjacent text file) is writable by the web server process, the attacker can trigger its deletion by including the appropriate parameters in the crafted request.</li>
<li>The attacker successfully exfiltrates the stolen video data or sensitive information from accessed files, or causes data loss due to file deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical consequences. An attacker can steal private video files belonging to other users, resulting in a breach of confidentiality and potential reputational damage. The ability to read adjacent <code>.txt</code>/<code>.html</code>/<code>.htm</code> files can expose sensitive information, such as configuration files or credentials. Furthermore, the capability to delete <code>.mp4</code> files and adjacent text files can cause data loss and disruption of service. The number of affected users depends on the specific deployment and the number of users with private video content.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from commit e110ff542acdd7e3b81bdd02b8402b9f6a61ad78 to remediate CVE-2026-33493.</li>
<li>Deploy the Sigma rule to your web server logs to detect attempts to access arbitrary files using the <code>fileURI</code> parameter in requests to <code>objects/import.json.php</code>.</li>
<li>Monitor web server logs for unusual file access patterns, particularly requests to <code>objects/import.json.php</code> with <code>fileURI</code> parameters containing directory traversal sequences like &ldquo;../&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>avideo</category><category>file-access</category><category>vulnerability</category></item></channel></rss>