<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Infrastructure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/infrastructure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 15 Mar 2026 13:51:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/infrastructure/feed.xml" rel="self" type="application/rss+xml"/><item><title>GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</link><pubDate>Sun, 15 Mar 2026 13:51:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</guid><description>Analysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.</description><content:encoded><![CDATA[<p>This threat brief summarizes an analysis of GlassWorm V2, focusing on its infrastructure rotation and GitHub injection techniques. While specific details regarding the threat actor and initial attack vectors are not provided in this analysis, the report highlights the malware&rsquo;s ability to dynamically change its command and control (C2) infrastructure and potentially leverage GitHub for code injection or storage. Understanding these techniques is crucial for defenders to develop robust detection and mitigation strategies against this evolving threat. The full analysis is available on Codeberg.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: Specific initial access vector is unknown.</li>
<li>GitHub Injection: The malware leverages GitHub to host malicious code or configurations, potentially obfuscating its activities within legitimate traffic.</li>
<li>Infrastructure Rotation: GlassWorm V2 employs techniques to rotate its C2 infrastructure, making it more difficult to track and block.</li>
<li>Communication: The malware establishes communication with its C2 server using the dynamically updated infrastructure.</li>
<li>Command Execution: The C2 server issues commands to the infected host.</li>
<li>Persistence: Unknown persistence mechanism is used.</li>
<li>Data Exfiltration/Lateral Movement/Impact: The ultimate goal is currently unknown.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of a successful GlassWorm V2 infection could range from data theft and system compromise to disruption of services, depending on the specific objectives of the attacker. The use of infrastructure rotation makes it harder to block attacker infrastructure. The GitHub injection may also lead to supply chain concerns.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to unusual or newly registered domains, even if they initially appear benign.</li>
<li>Implement file integrity monitoring on systems to detect unauthorized modifications to critical system files.</li>
<li>Consider using tools that specifically analyze and detect malicious use of GitHub repositories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>malware</category><category>github</category><category>infrastructure</category></item></channel></rss>