<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Genai — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/genai/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 22:46:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/genai/feed.xml" rel="self" type="application/rss+xml"/><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</link><pubDate>Wed, 22 Apr 2026 16:34:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</guid><description>This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.</description><content:encoded><![CDATA[<p>Attackers are increasingly exploiting GenAI tools to automate the discovery and exfiltration of sensitive information from compromised systems. This involves using GenAI agents to systematically scan file systems for credentials, API keys, tokens, and other secrets. Access to credential stores (.aws/credentials, .ssh/id_*) indicates credential harvesting, while modifications to shell configuration files (.bashrc, .zshrc) point to persistence attempts.  The observed activity leverages legitimate GenAI tool functionality, making it difficult to distinguish between benign use and malicious intent.  This technique has become more prevalent since late 2025, with attackers refining methods to instruct GenAI agents to specifically target and exfiltrate sensitive files. Defenders must monitor for unusual file access patterns by GenAI processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system via phishing or exploiting a software vulnerability.</li>
<li>Attacker installs or deploys a GenAI tool (e.g., LM Studio, Claude, Copilot) on the compromised system.</li>
<li>The attacker configures the GenAI tool to scan the file system for specific file names and patterns associated with sensitive data (credentials, keys, cookies).</li>
<li>The GenAI tool accesses files such as <code>.aws/credentials</code>, <code>.ssh/id_rsa</code>, browser login databases (e.g., <code>Login Data</code>, <code>logins.json</code>, <code>Cookies</code>), and other credential stores.</li>
<li>The GenAI tool may modify shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>The GenAI tool stages the collected data for exfiltration.</li>
<li>The attacker exfiltrates the harvested credentials and data to an external server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread credential compromise, allowing attackers to move laterally within a network, access sensitive data, and potentially disrupt critical business operations. A single compromised developer workstation could expose cloud infrastructure credentials, impacting hundreds of systems and services. The use of GenAI tools allows for rapid and automated credential harvesting, significantly increasing the scale and speed of potential breaches. Sectors at high risk include software development, cloud computing, and any organization that relies heavily on API keys and secrets for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>GenAI Process Accessing Sensitive Files</code> to your SIEM to detect GenAI tools accessing sensitive files. Tune for your environment to reduce false positives.</li>
<li>Monitor file access events, specifically looking for GenAI processes (ollama, lmstudio, claude) accessing files with names like <code>credentials</code>, <code>id_rsa</code>, <code>logins.json</code>, and <code>.bashrc</code>, as outlined in the Sigma rule.</li>
<li>Implement stricter access controls and monitoring for sensitive directories like <code>.aws</code>, <code>.ssh</code>, and browser profile directories.</li>
<li>Regularly audit and rotate credentials, API keys, and tokens, especially those stored in files.</li>
<li>Educate developers and users about the risks of using GenAI tools to handle sensitive data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>genai</category><category>file-access</category><category>persistence</category></item><item><title>GenAI Process Connection to Unusual Domain on macOS</title><link>https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</link><pubDate>Thu, 02 May 2024 14:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</guid><description>This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of GenAI tools on macOS connecting to unusual domains, which may indicate a compromised state. Attackers can exploit GenAI tools through prompt injection, malicious MCP (Model Context Protocol) servers, or poisoned plugins to establish command-and-control (C2) channels or exfiltrate sensitive data. Given the network access capabilities of AI agents, adversaries may manipulate them to beacon to external servers, download malicious payloads, or transmit harvested credentials and documents. The Elastic detection rule <code>9050506c-df6d-4bdf-bc82-fcad0ef1e8c1</code> focuses on identifying such anomalous network connections originating from a predefined list of GenAI processes, excluding known legitimate domains. The rule has been actively maintained since its creation on December 4, 2025, with its latest update on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary compromises a GenAI tool on a macOS system through prompt injection, malicious MCP servers, or poisoned plugins.</li>
<li>The compromised GenAI tool is configured to connect to an attacker-controlled domain for C2.</li>
<li>The GenAI process initiates a network connection attempt to the unusual domain using standard web protocols (HTTP/HTTPS).</li>
<li>The macOS system&rsquo;s network stack resolves the attacker&rsquo;s domain to its corresponding IP address.</li>
<li>The GenAI process sends data to the attacker-controlled domain, potentially including sensitive information.</li>
<li>The attacker uses the C2 channel to send commands to the compromised GenAI tool.</li>
<li>The GenAI tool executes the commands, potentially leading to further compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised GenAI tools can lead to data exfiltration, unauthorized access to sensitive information, and the establishment of persistent C2 channels within an organization&rsquo;s network. The impact ranges from the loss of intellectual property and customer data to the potential disruption of business operations. The risk is amplified if the GenAI tool has access to internal systems or sensitive data stores, allowing attackers to pivot and escalate their attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Connecting to Unusual Domain&rdquo; to your SIEM and tune for your environment (see rule below).</li>
<li>Enable process creation and network connection logging on macOS endpoints to collect the data required for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the domain and the GenAI process&rsquo;s behavior.</li>
<li>Block any identified malicious domains at the network level (see query in the provided source).</li>
<li>Review the GenAI tool&rsquo;s configuration for unauthorized MCP servers, plugins, or extensions that initiated the connection.</li>
<li>Regularly update the list of allowed domains in the Sigma rule&rsquo;s filter to account for legitimate updates to GenAI tool infrastructure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>genai</category><category>command and control</category><category>macos</category><category>network connection</category></item></channel></rss>