<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Impact — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/impact/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/impact/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item><item><title>Multiple Vulnerabilities in Dell PowerProtect Data Domain OS</title><link>https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</link><pubDate>Tue, 21 Apr 2026 08:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</guid><description>Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within Dell PowerProtect Data Domain OS, potentially enabling a malicious actor to compromise systems. Successful exploitation could lead to arbitrary code execution with root privileges, privilege escalation to administrator level, circumvention of security mechanisms, data manipulation, sensitive information disclosure, and the execution of other unspecified malicious activities. The vulnerabilities could be exploited to gain complete control over the affected systems, leading to significant data loss, disruption of services, or other severe consequences. The full scope of affected versions and the specific vulnerabilities involved are not detailed in the source information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad nature of the advisory, the following attack chain is constructed based on the potential capabilities granted by exploiting the vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> An attacker exploits a remote code execution vulnerability in Dell PowerProtect Data Domain OS, potentially through a network service or web interface.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages an additional vulnerability to escalate privileges from an initial low-privilege shell to root access.</li>
<li><strong>Defense Evasion:</strong> With root privileges, the attacker disables or bypasses security measures, such as intrusion detection systems or anti-malware software.</li>
<li><strong>Credential Access:</strong> The attacker gains access to stored credentials, such as those used for backups or system administration, by dumping the system&rsquo;s credential store.</li>
<li><strong>Data Manipulation:</strong> The attacker modifies data stored within the Dell PowerProtect Data Domain system, potentially corrupting backups or injecting malicious code into stored files.</li>
<li><strong>Information Disclosure:</strong> The attacker extracts sensitive information, such as customer data, internal documents, or system configurations.</li>
<li><strong>Lateral Movement:</strong> Using the compromised Data Domain OS, the attacker can pivot to other systems within the network leveraging the credentials obtained or the trust relationships established.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, which may include data exfiltration, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage to organizations utilizing Dell PowerProtect Data Domain OS. This could include data loss due to corruption or deletion, financial losses from service disruption, reputational damage, and legal repercussions from the disclosure of sensitive information. The absence of specific victim counts or sector targeting makes quantifying the impact difficult, but the potential for widespread disruption and data compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Dell&rsquo;s security advisories and apply the necessary patches to address the vulnerabilities in PowerProtect Data Domain OS as soon as they become available.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Data Domain OS on other systems.</li>
<li>Enable logging on Dell PowerProtect Data Domain OS, including process creation and network connection logs, to detect potential exploitation attempts and investigate suspicious activity, allowing the deployment of the Sigma rules below.</li>
<li>Monitor for unauthorized access attempts to Dell PowerProtect Data Domain OS through webserver logs, specifically looking for suspicious cs-uri-query strings (see rule &ldquo;Detect Web Request for Potential Dell PowerProtect Exploit&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dell</category><category>powerprotect</category><category>datadomain</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category><category>credential-access</category><category>impact</category></item><item><title>AWS SAML Provider Deletion Activity</title><link>https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-19-aws-saml-provider-deletion/</guid><description>An adversary may delete an AWS SAML provider to disrupt administrative access, hindering incident response and potentially escalating privileges within the AWS environment.</description><content:encoded><![CDATA[<p>The deletion of a SAML provider in AWS can be a significant indicator of malicious activity. An attacker who has gained initial access to an AWS environment may attempt to remove the SAML provider used by the information security team or system administrators. This action can severely impede the team&rsquo;s ability to investigate and respond to ongoing attacks. By disrupting access, the attacker gains a window of opportunity to further escalate privileges, move laterally within the environment, and achieve their objectives without immediate detection or intervention. This activity directly impacts the availability and integrity of resources within the AWS cloud environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained to an AWS account through compromised credentials or other means (T1078.004).</li>
<li>The attacker enumerates existing IAM resources, including SAML providers, using AWS CLI or API calls.</li>
<li>The attacker identifies the SAML provider used by administrative or security teams.</li>
<li>The attacker executes the <code>DeleteSAMLProvider</code> API call via the AWS CLI, API, or AWS Management Console (T1531).</li>
<li>The <code>DeleteSAMLProvider</code> event is logged in AWS CloudTrail with a &ldquo;success&rdquo; status.</li>
<li>Administrative and security teams lose access to AWS resources that require SAML authentication.</li>
<li>The attacker leverages the compromised account to escalate privileges, create new IAM users, or modify existing policies.</li>
<li>The attacker persists in the environment, potentially exfiltrating data or deploying malicious workloads (T1485).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an AWS SAML provider can have serious consequences. It disrupts access for administrators and security personnel, delaying incident response and potentially allowing attackers to further compromise the environment. This can lead to data breaches, service disruptions, and financial losses. The severity of the impact depends on the criticality of the affected AWS resources and the speed of detection and recovery.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS SAML Provider Deletion Activity&rdquo; to your SIEM and tune for your environment to detect this specific event.</li>
<li>Investigate any <code>DeleteSAMLProvider</code> events in AWS CloudTrail, focusing on the user identity, user agent, and source IP address (logsource: aws/cloudtrail).</li>
<li>Implement multi-factor authentication (MFA) for all IAM users, especially those with administrative privileges, to reduce the risk of credential compromise (T1110).</li>
<li>Review and enforce the principle of least privilege for all IAM roles and users to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>saml</category><category>iam</category><category>deletion</category><category>impact</category></item><item><title>Okta Network Zone Deactivation or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-okta-network-zone-changes/</link><pubDate>Fri, 26 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-okta-network-zone-changes/</guid><description>An Okta network zone was deactivated or deleted, potentially indicating malicious activity aimed at bypassing security controls.</description><content:encoded><![CDATA[<p>Okta network zones define trusted network boundaries for user access. These zones are configured with specific IP address ranges and can be used to restrict access to applications and resources. When an Okta network zone is deactivated or deleted, it can indicate a malicious actor attempting to weaken security policies, potentially allowing unauthorized access from untrusted locations. This activity is relevant for defenders because it may signal a breach in progress or preparation for future attacks. Compromised administrator accounts are often used to make unauthorized configuration changes in SaaS platforms. This alert focuses on activity within the Okta platform itself.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to an Okta administrator account, potentially through credential theft or phishing.</li>
<li>The attacker authenticates to the Okta administrative console.</li>
<li>The attacker navigates to the network zone configuration within the Okta admin console.</li>
<li>The attacker identifies a target network zone that restricts access to critical resources.</li>
<li>The attacker deactivates the target network zone, effectively disabling its restrictions. Alternatively, the attacker deletes the network zone.</li>
<li>The attacker may modify other security settings, such as MFA policies, to further weaken the security posture.</li>
<li>The attacker leverages the relaxed network restrictions to access sensitive applications or data from previously unauthorized locations.</li>
<li>The attacker performs malicious actions, such as data exfiltration or lateral movement, using the compromised Okta session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deactivation or deletion of an Okta network zone can have serious consequences. It can lead to unauthorized access to sensitive applications and data, potentially resulting in data breaches, financial loss, and reputational damage. The impact is especially high if the affected network zone was protecting critical infrastructure or sensitive customer data. Depending on the scope of access granted, a single deactivated zone could expose data belonging to thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Okta Network Zone Deactivated or Deleted&rdquo; Sigma rule to your SIEM to detect this activity (logsource: okta, service: okta, eventType: zone.deactivate/zone.delete).</li>
<li>Investigate any detected instances of network zone deactivation or deletion to determine if they were authorized changes.</li>
<li>Review Okta administrator account activity for signs of compromise, such as login attempts from unusual locations.</li>
<li>Enforce multi-factor authentication (MFA) for all Okta administrator accounts to prevent unauthorized access.</li>
<li>Monitor the Okta system logs for other suspicious configuration changes, such as modifications to MFA policies or application assignments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>network-zone</category><category>impact</category></item><item><title>Potential Ransomware Behavior - Note Files Dropped via SMB</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</guid><description>This rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.</description><content:encoded><![CDATA[<p>This detection identifies potential ransomware activity through the rapid creation of ransom notes via SMB shares. The rule focuses on file creation events originating from the SYSTEM account (PID 4), targeting common ransom note file extensions like .txt, .html, .pdf, and image files. This activity suggests an attacker has achieved lateral movement and is deploying ransom notes across multiple systems. The rule aggregates events within a 60-second window to reduce false positives and focus on high-frequency creation patterns indicative of automated ransomware deployment. Successful detection can help defenders quickly identify and contain ransomware outbreaks before widespread encryption occurs. The original Elastic detection rule was published on 2024-05-03 and updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit or compromised credentials.</li>
<li>The attacker moves laterally to other systems on the network using valid accounts or exploits. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The attacker uses a tool to remotely create files over SMB. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The SYSTEM account (PID 4) on a compromised host is used to create multiple files with the same name but different paths (C:*) over SMB.</li>
<li>The created files have file extensions commonly associated with ransom notes: .txt, .htm, .html, .hta, .pdf, .jpg, .bmp, .png.</li>
<li>The files are dropped into at least 3 unique paths within a short time frame (60 seconds).</li>
<li>The attacker encrypts data and leaves the ransom notes to instruct victims on how to pay the ransom. (T1486 - Data Encrypted for Impact)</li>
<li>The organization experiences data loss, financial damage, and reputational harm.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful ransomware attacks can lead to significant data loss, financial costs associated with ransom payments, recovery efforts, and reputational damage. Organizations may experience business disruption, regulatory fines, and legal liabilities. The Akira ransomware group, referenced in the original rule&rsquo;s documentation, has been known to target various sectors, demanding substantial ransoms from victims. The widespread distribution of ransom notes indicates an advanced stage of the ransomware attack, necessitating immediate containment to prevent further data encryption and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Ransomware Note File Dropped via SMB</code> to your SIEM to detect suspicious file creation activity indicative of ransomware deployment.</li>
<li>Enable Elastic Defend for enhanced endpoint detection and response capabilities, as recommended in the rule&rsquo;s setup instructions.</li>
<li>Monitor incoming network connections to port 445 (SMB) on critical assets, as suggested in the rule&rsquo;s triage analysis.</li>
<li>Investigate file names with unusual extensions to identify potential ransom notes, as mentioned in the triage analysis.</li>
<li>Isolate any hosts identified as creating multiple note files over SMB to prevent further lateral movement and data encryption, as described in the rule&rsquo;s response and remediation steps.</li>
<li>Review and enforce network segmentation policies to limit lateral movement and reduce the impact of potential ransomware attacks (TA0008).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ransomware</category><category>impact</category><category>lateral-movement</category><category>windows</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>Third-party Backup Files Deleted via Unexpected Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 18:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</guid><description>This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.</description><content:encoded><![CDATA[<p>This rule identifies the deletion of backup files, specifically those created by Veeam and Veritas Backup Exec, through unexpected processes on Windows systems. The rule aims to detect potential attempts to inhibit system recovery by adversaries, particularly in the context of ransomware attacks. Attackers often target backup files to eliminate recovery options for victims. This detection focuses on identifying file deletion events where the process responsible for the deletion does not belong to the trusted backup software suite. The rule excludes known legitimate processes and directories like Trend Micro&rsquo;s, Microsoft Exchange Mailbox Assistants, and the Recycle Bin to minimize false positives. The original Elastic detection rule was created in October 2021 and last updated May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to the target Windows system.</li>
<li>The attacker performs reconnaissance to identify backup file locations.</li>
<li>The attacker uses a non-backup related process (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to delete backup files.</li>
<li>The attacker targets Veeam backup files with extensions <code>VBK</code>, <code>VIB</code>, and <code>VBM</code>.</li>
<li>The attacker targets Veritas Backup Exec files with the <code>BKF</code> extension.</li>
<li>The deletion events are logged by the endpoint detection system.</li>
<li>The detection rule triggers, identifying the anomalous deletion activity based on file extension and process context.</li>
<li>Successful deletion of backups impairs the victim&rsquo;s ability to recover from ransomware or other destructive attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup files can severely impact an organization&rsquo;s ability to recover from a ransomware attack or other data loss events. Without viable backups, the victim organization may be forced to pay a ransom or face significant data loss and business disruption. This tactic directly increases the attacker&rsquo;s leverage and potential financial gain. The rule&rsquo;s documentation cites a report from AdvIntel detailing backup removal solutions seen with Conti ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unexpected Veeam Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veeam backup files.</li>
<li>Deploy the Sigma rule <code>Unexpected Veritas Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veritas Backup Exec files.</li>
<li>Investigate any alerts generated by these rules to determine the source of the deletion and assess potential impact.</li>
<li>Enable endpoint file event logging to capture file deletion events, which are crucial for the Sigma rules.</li>
<li>Review process execution chains (parent process tree) for unknown processes to identify the root cause of unexpected file deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup deletion</category><category>ransomware</category></item><item><title>Detection of Bcdedit Boot Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-bcdedit-boot-config-modification/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bcdedit-boot-config-modification/</guid><description>This rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of <code>bcdedit.exe</code> with specific arguments that modify the boot configuration data (BCD) store in Windows systems. Attackers or malware may use this technique to disable Windows Error Recovery (<code>recoveryenabled</code>) or to ignore errors during the boot process (<code>bootstatuspolicy ignoreallfailures</code>). These modifications are often performed to prevent systems from recovering properly after an attack, particularly in ransomware scenarios. The rule is designed to work with data from Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. The detection logic focuses on process execution events that include the relevant <code>bcdedit.exe</code> command-line arguments. Defenders should be aware of legitimate uses of <code>bcdedit.exe</code> by administrators for troubleshooting or data recovery purposes, so context is crucial.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through various means, such as phishing or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain administrative access, required to modify boot configuration settings.</li>
<li>Reconnaissance: The attacker performs reconnaissance to identify the system&rsquo;s configuration and identify appropriate targets for modification.</li>
<li>Disable Recovery: The attacker uses <code>bcdedit.exe</code> to disable Windows Error Recovery using the <code>/set {default} recoveryenabled No</code> command.</li>
<li>Ignore Boot Failures: The attacker uses <code>bcdedit.exe</code> to set the boot status policy to ignore all failures using the <code>/set {default} bootstatuspolicy ignoreallfailures</code> command.</li>
<li>System Impact: By modifying the boot configuration, the attacker inhibits system recovery, making it harder for the system to recover from errors or malicious activity.</li>
<li>Payload Execution: The attacker deploys and executes the primary malicious payload, such as ransomware, leveraging the modified boot configuration to maximize impact.</li>
<li>Final Objective: The attacker achieves their final objective, which could include data encryption, data theft, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of boot configuration data can lead to significant system instability and data loss. In ransomware attacks, this technique prevents the system from recovering, increasing the likelihood of the victim paying the ransom. While the exact number of affected organizations is unknown, this technique is widely used in ransomware campaigns and can affect any Windows system if successfully executed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Modification of Boot Configuration&rdquo; Sigma rule to your SIEM and tune for your environment to detect the malicious use of <code>bcdedit.exe</code> described in this brief.</li>
<li>Enable Sysmon process creation logging to capture <code>bcdedit.exe</code> executions and their command-line arguments (Sysmon Event ID 1).</li>
<li>Investigate any detected instances of <code>bcdedit.exe</code> modifying boot configuration settings to determine legitimacy, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
<li>Monitor process execution logs for unexpected processes running <code>bcdedit.exe</code> with arguments related to disabling recovery or ignoring boot failures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>boot-configuration</category><category>bcdedit</category><category>impact</category><category>windows</category></item><item><title>Detection of Azure Application Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</link><pubDate>Wed, 03 Jan 2024 15:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-app-deletion/</guid><description>This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where an application is deleted within an Azure environment. While legitimate application deletions occur as part of IT administration, malicious actors might delete applications to disrupt services, remove evidence of their presence, or prepare for a larger attack by removing security controls or access points. This activity is logged within Azure Activity Logs and includes events such as &ldquo;Delete application&rdquo; and &ldquo;Hard Delete application&rdquo;. Monitoring these events can provide early warning of potential security incidents or compliance violations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to an Azure account, potentially through compromised credentials or exploiting a vulnerability in an application.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates their privileges within the Azure environment to gain sufficient permissions to manage and delete applications.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies target applications for deletion, potentially those critical for business operations or those used for security controls.</li>
<li><strong>Disable Monitoring (Optional):</strong> The attacker attempts to disable logging or monitoring related to application management to avoid detection.</li>
<li><strong>Application Deletion:</strong> The attacker initiates the deletion of the targeted application using the Azure portal, Azure CLI, or PowerShell.</li>
<li><strong>Confirmation/Hard Delete:</strong> Depending on the application&rsquo;s configuration and Azure policies, the attacker may need to confirm the deletion or perform a &ldquo;hard delete&rdquo; to permanently remove the application.</li>
<li><strong>Cover Tracks:</strong> The attacker attempts to remove any remaining logs or traces of their activity to hinder forensic investigation.</li>
<li><strong>Impact:</strong> Service disruption or data loss due to the deleted application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of an Azure application can lead to significant service disruption, data loss, and potential financial damages. The impact depends on the criticality of the deleted application and the organization&rsquo;s disaster recovery capabilities. Successful deletion can interrupt business processes, impacting both internal users and external customers. It may also lead to reputational damage and compliance violations if the application handled sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect application deletion events in Azure Activity Logs.</li>
<li>Review user roles and permissions in Azure Active Directory (Entra ID) and enforce the principle of least privilege.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges.</li>
<li>Enable auditing and logging for all Azure resources, including application management activities.</li>
<li>Investigate any detected application deletion events promptly to determine the root cause and potential impact.</li>
<li>Establish a process for reviewing and approving application deletion requests to prevent accidental or malicious deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>application</category><category>deletion</category><category>impact</category><category>t1489</category></item><item><title>Windows Backup Deletion via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</guid><description>Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.</description><content:encoded><![CDATA[<p>Attackers, including ransomware groups, often attempt to remove or impair an organization&rsquo;s ability to recover from an attack. One method to achieve this is by deleting Windows backup catalogs and system state backups using the <code>wbadmin.exe</code> utility. Windows Server Backup stores details about backups (what volumes are backed up and where the backups are located) in a backup catalog. Removing these catalogs renders backups unusable for recovery, increasing the impact of the attack. This technique is frequently observed in ransomware playbooks and other destructive attacks targeting Windows environments. This activity can be detected using endpoint detection and response (EDR) solutions, Windows Security Event Logs, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li>The attacker escalates privileges to administrator level to execute wbadmin.exe.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete catalog</code> command to remove backup catalogs.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete systemstatebackup</code> command to remove system state backups.</li>
<li>The attacker may also delete shadow copies using <code>vssadmin.exe</code> or <code>wmic.exe</code> to further hinder recovery.</li>
<li>The attacker deploys ransomware or initiates other destructive actions.</li>
<li>The attacker encrypts or destroys data on the system and connected network shares.</li>
<li>The attacker demands a ransom payment for data recovery, which is complicated by the deleted backups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup catalogs and system state backups significantly impairs an organization&rsquo;s ability to recover from a ransomware attack or other destructive event. This can lead to prolonged downtime, data loss, and financial losses associated with incident response and recovery efforts. While the number of direct victims of this specific technique is difficult to quantify, the impact is typically observed in conjunction with broader ransomware campaigns affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging with Event ID 1 to capture <code>wbadmin.exe</code> executions and activate the first Sigma rule.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor Windows Security Event Logs for process creation events related to <code>wbadmin.exe</code>.</li>
<li>Investigate any instances of <code>wbadmin.exe</code> executing with <code>delete</code> arguments.</li>
<li>Review and harden account access controls to prevent unauthorized use of <code>wbadmin.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup-deletion</category><category>windows</category></item><item><title>Windows System Restore Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</guid><description>Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.</description><content:encoded><![CDATA[<p>Attackers may disable the Windows System Restore feature to prevent victims from easily reverting their systems to a clean state after an infection or other malicious activity. This action complicates incident response and remediation efforts, forcing more complex and time-consuming recovery procedures. Disabling system restore is often performed post-compromise to ensure persistence and hinder forensic analysis. This technique can be implemented manually through the registry editor or via automated scripts, making it accessible to a wide range of threat actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through various methods (e.g., phishing, exploitation).</li>
<li>The attacker escalates privileges to Administrator or SYSTEM.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify registry keys.</li>
<li>The attacker targets the <code>HKLM\Software\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig</code> registry key.</li>
<li>Alternatively, the attacker targets the <code>HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore\DisableSR</code> registry key.</li>
<li>The attacker sets the value of the targeted registry key to <code>DWORD:00000001</code>.</li>
<li>The attacker confirms the System Restore feature is disabled.</li>
<li>The attacker proceeds with further malicious activities, knowing that recovery is hindered.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling System Restore can significantly impede recovery efforts following a cyber incident. Organizations may face longer downtimes and increased costs associated with manual system reimaging or advanced forensic analysis. The absence of readily available restore points can also lead to data loss if systems are severely damaged or encrypted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Disable System Restore</code> to your SIEM to detect malicious attempts to disable System Restore via registry modification.</li>
<li>Monitor registry modifications related to System Restore configurations, focusing on the keys <code>\Policies\Microsoft\Windows NT\SystemRestore</code> and <code>\Microsoft\Windows NT\CurrentVersion\SystemRestore</code>, and values set to <code>DWORD (0x00000001)</code>.</li>
<li>Implement strict access controls to prevent unauthorized modification of registry settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>t1490</category><category>persistence</category></item><item><title>Account Password Reset Remotely</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-password-reset/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-password-reset/</guid><description>The rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious remote password resets targeting potentially privileged accounts on Windows systems. Attackers may attempt to reset passwords to maintain unauthorized access, evade password duration policies, or preserve compromised credentials. The rule focuses on network logins followed by password reset actions, specifically targeting privileged accounts to reduce false positives. The rule leverages Windows Security Event Logs to detect successful network logins and subsequent password reset events. The goal is to detect anomalous password reset activities that could indicate malicious activity. The rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the network (e.g., through credential theft or phishing).</li>
<li>The attacker attempts a network login to a Windows system, generating a 4624 event with logon type &ldquo;Network&rdquo;.</li>
<li>The system logs a successful authentication event (event ID 4624) with a network logon type.</li>
<li>The attacker identifies a privileged account, such as an administrator account or a service account with elevated permissions.</li>
<li>The attacker initiates a password reset for the privileged account.</li>
<li>A password reset event (event ID 4724) is triggered, indicating that a password has been reset.</li>
<li>The attacker leverages the reset password to maintain persistent access to the compromised account.</li>
<li>The attacker performs malicious actions using the compromised privileged account, potentially leading to data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets of privileged accounts can lead to significant security breaches. Attackers can maintain persistent access, escalate privileges, and move laterally within the network. This can result in data theft, system compromise, and disruption of services. If successful, attackers can potentially gain control over critical systems and data, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the Windows audit policies for &ldquo;Audit Logon&rdquo; and &ldquo;Audit User Account Management&rdquo; to generate the necessary events for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Detect Remote Password Reset of Privileged Account&rdquo; to your SIEM and tune it to your environment, excluding legitimate administrative accounts and processes.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the source IP address and the target account to determine if the password reset was authorized.</li>
<li>Monitor for Event ID 4724 (Account Password Reset) in conjunction with network login events to identify suspicious password reset activity.</li>
<li>Review and update access controls and privileged account management policies to prevent similar incidents in the future, as mentioned in the overview section.</li>
<li>Create exceptions for known IT personnel or service accounts that legitimately perform remote password resets, as detailed in the false positive analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>impact</category><category>windows</category></item><item><title>High Number of Process and/or Service Terminations Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-process-termination/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-process-termination/</guid><description>A high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.</description><content:encoded><![CDATA[<p>This detection identifies a suspicious pattern of rapid process and service terminations on a Windows host. Attackers commonly stop services and kill processes to disable security tools, release file locks for encryption, or disrupt normal system operations. The rule specifically looks for multiple instances of termination-related commands executed via <code>net.exe</code>, <code>sc.exe</code>, or <code>taskkill.exe</code> within a short timeframe. This activity can be indicative of an attacker preparing a system for ransomware deployment or attempting to evade defenses. The detection focuses on Windows systems, leveraging process monitoring logs. This behavior aligns with tactics used to impair defenses and achieve significant impact on compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Windows host (e.g., through phishing or exploitation).</li>
<li>The attacker escalates privileges to obtain necessary permissions to terminate processes and services.</li>
<li>The attacker uses <code>net.exe</code> to stop specific services, such as backup solutions or security software.</li>
<li>The attacker employs <code>sc.exe</code> to delete services, preventing them from restarting automatically.</li>
<li>The attacker utilizes <code>taskkill.exe</code> with flags like <code>/F</code>, <code>/IM</code>, or <code>/PID</code> to forcefully terminate processes.</li>
<li>The attacker repeats these steps, rapidly terminating multiple processes and services.</li>
<li>The attacker prepares the system for ransomware deployment by disabling security measures.</li>
<li>The attacker deploys ransomware, encrypting data and demanding a ransom for its recovery.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to disruption of critical services, disabling of security controls, and potential data loss. If an attacker successfully terminates security solutions, they can significantly increase the likelihood of successful ransomware deployment or data exfiltration. The impact can range from temporary service outages to complete system compromise and data encryption, resulting in financial losses, reputational damage, and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>High Number of Process Terminations via Taskkill</code> and <code>High Number of Service Terminations via SC</code> Sigma rules to your SIEM and tune for your environment.</li>
<li>Investigate any alerts triggered by the rules, focusing on the processes terminated and the user accounts involved.</li>
<li>Enable process creation logging with command-line arguments to ensure the rules have sufficient data to function effectively.</li>
<li>Review the references provided to understand attacker techniques and improve detection strategies.</li>
<li>Implement network segmentation to limit the lateral movement of attackers.</li>
<li>Regularly review and update security policies to prevent unauthorized process termination.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>defense-evasion</category><category>windows</category></item></channel></rss>