<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Initial-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/initial-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/initial-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Potential Remote File Execution via MSIEXEC</title><link>https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</guid><description>The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a built-in Windows component used for installing, modifying, and removing software. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files, bypassing security controls and potentially leading to initial access or defense evasion. This activity is often part of a broader attack chain, used to deliver and execute malicious payloads. The detection rule provided by Elastic identifies suspicious msiexec.exe activity by monitoring process starts, network connections, and child processes. It filters out known benign signatures and paths to highlight potential misuse. This detection is designed to work with Elastic Defend data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means to execute commands on the target system.</li>
<li>The attacker uses msiexec.exe with the <code>/V</code> parameter to initiate the installation of a remote MSI package. This allows the attacker to bypass typical execution restrictions.</li>
<li>Msiexec.exe attempts a network connection (T1105) to retrieve the remote MSI package from a malicious server.</li>
<li>Msiexec.exe spawns a child process to handle the installation of the downloaded MSI package.</li>
<li>The spawned child process executes malicious code embedded within the MSI package.</li>
<li>The malicious code performs actions such as installing malware, modifying system settings, or establishing persistence.</li>
<li>The attacker leverages the compromised system for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system and network. While this specific rule has a low risk score, it can be an early indicator of more serious attacks. It is crucial to investigate any alerts generated by this rule to determine the full scope and impact of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM to detect suspicious usage of <code>msiexec.exe</code> to install remote packages. Tune the rule for your environment by adding exceptions for legitimate software installation processes.</li>
<li>Enable process monitoring and network connection logging on Windows endpoints to provide the necessary data for the Sigma rule to function effectively (Data Source: Elastic Defend).</li>
<li>Review the &ldquo;Possible investigation steps&rdquo; section in the Elastic rule&rsquo;s documentation to investigate potential false positives and legitimate uses of <code>msiexec.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications, including potentially malicious MSI packages.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>msiexec</category><category>remote-file-execution</category><category>initial-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Google Workspace Login Attempt with Government Attack Warning</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</link><pubDate>Tue, 28 Apr 2026 00:48:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</guid><description>A Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.</description><content:encoded><![CDATA[<p>This alert focuses on identifying potentially malicious login attempts within Google Workspace environments. The detection is based on Google&rsquo;s own flagging of a login as a potential &ldquo;gov_attack_warning,&rdquo; suggesting that Google&rsquo;s threat intelligence attributes the activity to a government-backed actor. While specific targeting information is unavailable, this alert highlights a critical area for investigation within organizations utilizing Google Workspace, especially those handling sensitive data or operating in sectors of interest to nation-state actors. This detection provides an early warning of potential compromise or data exfiltration attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker attempts to log into a Google Workspace account using compromised or brute-forced credentials.</li>
<li><strong>Login Attempt:</strong> The login attempt triggers a &ldquo;gov_attack_warning&rdquo; within Google Workspace, indicating a potential government-backed threat actor.</li>
<li><strong>Privilege Escalation (Potential):</strong> If the compromised account has elevated privileges, the attacker may attempt to escalate privileges within the Google Workspace environment.</li>
<li><strong>Defense Evasion (Potential):</strong> The attacker may attempt to disable security features or modify audit logs to evade detection.</li>
<li><strong>Persistence (Potential):</strong> The attacker may establish persistent access through methods such as creating rogue apps or modifying account settings.</li>
<li><strong>Data Access:</strong> The attacker gains access to sensitive data stored within Google Workspace, such as documents, emails, and files.</li>
<li><strong>Exfiltration (Potential):</strong> The attacker exfiltrates the stolen data to an external location.</li>
<li><strong>Impact:</strong> The organization suffers a data breach, reputational damage, and potential financial losses.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to the compromise of sensitive data within the Google Workspace environment, including confidential documents, emails, and other business-critical information. The potential consequences range from reputational damage and legal liabilities to financial losses and disruption of business operations. The number of affected users and the severity of the impact will depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;gov_attack_warning&rdquo; events in Google Workspace logs.</li>
<li>Investigate any triggered alerts promptly, focusing on the affected user account and associated activity.</li>
<li>Review the Google Workspace audit logs for any suspicious activity leading up to the &ldquo;gov_attack_warning&rdquo; event.</li>
<li>Implement multi-factor authentication (MFA) for all Google Workspace accounts, especially those with elevated privileges.</li>
<li>Monitor Google Workspace activity logs for suspicious patterns, such as unusual login locations, failed login attempts, and changes to account settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>googleworkspace</category><category>intrusion</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026</title><link>https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</link><pubDate>Fri, 24 Apr 2026 19:52:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</guid><description>In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.</description><content:encoded><![CDATA[<p>In early April 2026, Arctic Wolf observed a widespread phishing campaign that abused the OAuth device code flow. This campaign targeted organizations across multiple regions and sectors, mirroring the &ldquo;Riding the Rails&rdquo; campaign observed by Huntress in late March. The attackers exploited the device code grant type in the OAuth 2.0 authorization framework to obtain access tokens. By tricking users into entering a code on a legitimate Microsoft login page, attackers bypassed traditional MFA controls. Defenders should be aware of this evolving technique and implement detection strategies focused on anomalous application registrations and device code flow activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email to the victim, impersonating a legitimate service.</li>
<li>The email contains a link that redirects the victim to a fake application authorization page.</li>
<li>The fake page prompts the victim to enter a device code.</li>
<li>Unbeknownst to the victim, the device code is associated with a malicious OAuth application controlled by the attacker.</li>
<li>The victim is redirected to a legitimate Microsoft login page, where they enter the provided code and authenticate.</li>
<li>Upon successful authentication, the malicious application receives an access token.</li>
<li>The attacker uses the access token to access the victim&rsquo;s account and sensitive data.</li>
<li>The attacker may then perform actions such as reading emails, accessing files, or initiating further malicious activity within the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This OAuth device code phishing campaign affected numerous organizations across multiple sectors and regions in early April 2026. Successful attacks grant threat actors unauthorized access to user accounts, potentially leading to data exfiltration, financial fraud, and further compromise of internal systems. Due to the nature of OAuth, attackers can maintain persistent access even after password changes, posing a significant long-term risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Azure AD sign-in logs for device code flow usage to identify suspicious authentications (logsource: azuread, category: authentication).</li>
<li>Implement the Sigma rule provided below to detect suspicious application registrations in Azure AD (logsource: o365, category: configuration).</li>
<li>Educate users on the risks of device code phishing and how to identify malicious authorization requests.</li>
<li>Regularly audit OAuth applications authorized within your environment and revoke access for any suspicious or unused applications.</li>
<li>Investigate any alerts related to anomalous OAuth application activity promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>device-code</category><category>phishing</category><category>initial-access</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>Suspicious RDP File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-11-suspicious-rdp/</link><pubDate>Mon, 20 Apr 2026 21:38:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suspicious-rdp/</guid><description>This rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>mstsc.exe</code> (Remote Desktop Connection) with an RDP file located in suspicious directories on Windows systems. Adversaries may use malicious RDP files delivered via phishing campaigns as an initial access vector. These files, containing connection settings, can be placed in locations such as the Downloads folder, temporary directories, or Outlook&rsquo;s content cache. The rule focuses on detecting RDP files opened from unusual paths, which can signal unauthorized access or malicious activity. The behavior was observed in conjunction with the Midnight Blizzard campaign in October 2024. This detection helps defenders identify potential RDP-based attacks and investigate suspicious user behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email with a malicious RDP file attachment (T1566.001).</li>
<li>The victim receives the email and downloads the RDP file to a common location such as the Downloads folder.</li>
<li>The user executes the downloaded RDP file, initiating the <code>mstsc.exe</code> process (T1204.002).</li>
<li>The <code>mstsc.exe</code> process attempts to establish a remote connection to a malicious server controlled by the attacker.</li>
<li>The attacker may exploit vulnerabilities in the RDP service or use credential harvesting techniques to gain access to the remote system.</li>
<li>Upon successful connection, the attacker performs reconnaissance activities, such as network scanning and user enumeration.</li>
<li>The attacker moves laterally within the network, exploiting additional vulnerabilities or using stolen credentials.</li>
<li>The attacker achieves their objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via malicious RDP files can lead to unauthorized access to internal systems, data breaches, and potential ransomware deployment. While the number of victims and targeted sectors is unspecified, the impact can be significant, especially if the compromised systems have access to sensitive data or critical infrastructure. This can result in financial losses, reputational damage, and operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to detect the execution of <code>mstsc.exe</code> and capture the command-line arguments used to launch the process.</li>
<li>Deploy the Sigma rule &ldquo;Remote Desktop File Opened from Suspicious Path&rdquo; to your SIEM to detect RDP files opened from suspicious locations.</li>
<li>Educate users about the risks of opening RDP files from untrusted sources, especially those received via email.</li>
<li>Implement application control policies to restrict the execution of <code>mstsc.exe</code> from untrusted directories.</li>
<li>Monitor network connections originating from systems where <code>mstsc.exe</code> has been executed to identify suspicious remote connections.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rdp</category><category>phishing</category><category>initial-access</category><category>windows</category></item><item><title>Elastic Defend Alert from Package Manager Install Ancestry</title><link>https://feed.craftedsignal.io/briefs/2026-04-package-manager-ancestry/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-package-manager-ancestry/</guid><description>This rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.</description><content:encoded><![CDATA[<p>This detection rule identifies Elastic Defend alerts triggered by processes with a package manager installation context in their ancestry. This includes package managers such as npm (Node.js), PyPI (pip / Python / uv), and cargo (Rust). The rule is designed to detect supply chain attacks and post-install abuse, where malicious scripts are executed during or after package installation. The rule leverages Elastic Defend alerts to identify suspicious activity within the process tree of package manager installations. This is crucial for defenders because install-time spawn chains are a common attack vector for injecting malicious code into systems. The rule is implemented as an ESQL query and is intended to be used with Elastic Stack version 9.3.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer or system administrator initiates a package installation using a package manager like npm, pip, or cargo.</li>
<li>The package manager downloads and installs the requested package and its dependencies.</li>
<li>The installed package contains malicious code embedded within a post-install script or a dependency.</li>
<li>The package manager executes the malicious post-install script (e.g., using <code>node</code>, <code>python</code>, or <code>cargo</code>).</li>
<li>The malicious script executes arbitrary commands, such as downloading and executing a payload from a remote server.</li>
<li>The downloaded payload establishes persistence on the system, potentially through scheduled tasks or registry keys.</li>
<li>The attacker gains initial access to the system and begins lateral movement and privilege escalation.</li>
<li>The attacker achieves their objective, such as data exfiltration, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete system compromise, data breaches, and supply chain contamination. The compromised system could be used to spread malware to other systems within the network or to external customers through poisoned software packages. The severity is critical due to the potential for widespread impact and the difficulty in detecting and mitigating supply chain attacks. The financial and reputational damage to the organization could be substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rules to your SIEM to detect malicious activity related to package manager installations.</li>
<li>Review and tune the Sigma rules for your specific environment to reduce false positives.</li>
<li>Implement strict code review and dependency management practices to prevent the introduction of malicious packages.</li>
<li>Monitor Elastic Defend alerts for suspicious activity in the process tree of package manager installations, as surfaced by this detection rule.</li>
<li>Investigate any alerts related to package manager install ancestry to identify and remediate potential supply chain attacks.</li>
<li>Enable process monitoring with command-line logging to capture the full context of package manager installations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>initial-access</category><category>package-manager</category><category>elastic-defend</category><category>post-install</category></item><item><title>Azure Service Principal Sign-In Followed by Arc Cluster Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-11-24-azure-arc-credential-access/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-24-azure-arc-credential-access/</guid><description>Detects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.</description><content:encoded><![CDATA[<p>This detection identifies a specific attack sequence targeting Azure Arc-connected Kubernetes clusters. It focuses on the scenario where a service principal authenticates to Microsoft Entra ID and subsequently requests credentials for an Azure Arc-connected Kubernetes cluster. The <code>listClusterUserCredential</code> action is used to retrieve tokens that enable kubectl access through the Arc Cluster Connect proxy. This sequence is particularly concerning when the service principal authenticates externally and immediately accesses Arc cluster credentials, especially from unexpected locations or Autonomous System Numbers (ASNs). This behavior, observed in attacks like those described by IBM X-Force in 2025, can lead to attackers gaining unauthorized access to and control over Kubernetes clusters. Defenders should investigate such events, particularly when the sign-in originates from an unexpected location or ASN.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains unauthorized access to a service principal&rsquo;s credentials (e.g., through credential stuffing, phishing, or exposed secrets).</li>
<li><strong>Service Principal Authentication:</strong> The attacker uses the compromised service principal credentials to authenticate to Microsoft Entra ID (Azure AD) using the <code>ServicePrincipalSignInLogs</code>.</li>
<li><strong>Credential Listing Request:</strong> Immediately following successful authentication, the attacker leverages the service principal to initiate a request to list the cluster user credentials for an Azure Arc-connected Kubernetes cluster, triggering the <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code> in the Activity Logs.</li>
<li><strong>Credential Retrieval:</strong> The attacker retrieves the Arc cluster credentials.</li>
<li><strong>Proxy Tunnel Establishment:</strong> The attacker uses the retrieved credentials to establish a proxy tunnel into the Kubernetes cluster via the Arc Cluster Connect proxy.</li>
<li><strong>Kubernetes Access:</strong> With the tunnel established, the attacker can now execute kubectl commands, perform unauthorized actions within the cluster, such as creating, reading, updating, and deleting (CRUD) secrets and configmaps.</li>
<li><strong>Lateral Movement &amp; Privilege Escalation:</strong> The attacker exploits vulnerabilities or misconfigurations within the Kubernetes cluster to move laterally to other resources, escalate privileges, and gain further control.</li>
<li><strong>Data Exfiltration or Ransomware Deployment:</strong> The attacker exfiltrates sensitive data from the Kubernetes cluster or deploys ransomware to encrypt critical data, impacting business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this attack chain can lead to complete compromise of Azure Arc-connected Kubernetes clusters. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and potentially deploy ransomware. The IBM X-Force team has documented cases of attackers using similar techniques for hybrid escalation and persistence. This can impact organizations across all sectors utilizing Azure Arc for managing Kubernetes clusters, potentially affecting dozens or hundreds of clusters per victim organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect the sequence of service principal sign-in followed by Arc cluster credential access.</li>
<li>Review Azure AD Audit Logs for recent changes to service principals, focusing on new credentials, federated identities, and owner changes, based on the investigation steps outlined in the rule&rsquo;s note.</li>
<li>Enable conditional access policies to restrict service principal authentication by location to prevent logins from unexpected regions, as suggested in the rule&rsquo;s note.</li>
<li>Monitor Azure Activity Logs for <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code> events to identify potential unauthorized access attempts.</li>
<li>Rotate service principal credentials regularly and revoke active sessions and tokens for the SP as outlined in the rule&rsquo;s response and remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>azure</category><category>azure-arc</category><category>credential-access</category><category>initial-access</category></item><item><title>AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts</title><link>https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</link><pubDate>Mon, 06 Apr 2026 14:37:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-aws-iam-access-key-correlation/</guid><description>This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.</description><content:encoded><![CDATA[<p>This detection rule, published by Elastic, is designed to correlate AWS security alerts and prioritize investigations related to potentially compromised IAM access keys. Specifically, it focuses on scenarios where a long-term IAM access key is observed originating from a new source IP address (detected by the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule, rule ID 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) and is also associated with other open alerts of medium, high, or critical severity. This correlation aims to surface instances where a newly exposed or compromised access key is actively being used for malicious activities, enabling security teams to respond more effectively to potential credential access incidents and initial access attempts. The rule is a higher-order rule that analyzes existing security alerts within an Elastic Security deployment and leverages the <code>kibana.alert</code> fields to identify related events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a valid AWS IAM Long-Term Access Key. This could be through phishing, credential stuffing, or exposed credentials in source code.</li>
<li>The attacker uses the compromised access key to interact with AWS services from a new and previously unseen IP address. This triggers the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule ID: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f).</li>
<li>The attacker leverages the compromised credentials to perform reconnaissance activities within the AWS environment, such as listing resources or querying IAM configurations.</li>
<li>The attacker attempts to escalate privileges by exploiting misconfigurations or vulnerabilities in IAM policies.</li>
<li>The attacker performs actions indicating lateral movement within the AWS environment, such as accessing or modifying resources in different AWS accounts.</li>
<li>The attacker compromises additional AWS resources or services, such as EC2 instances or S3 buckets. These activities trigger medium, high, or critical severity alerts.</li>
<li>The correlation rule identifies the co-occurrence of the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; alert and other elevated severity alerts associated with the same access key ID.</li>
<li>The security team investigates the correlated alerts and takes appropriate remediation steps, such as rotating the compromised access key and reviewing IAM policies.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging compromised AWS IAM credentials can lead to significant data breaches, service disruption, and financial losses. Attackers can gain unauthorized access to sensitive data stored in S3 buckets, compromise EC2 instances, and disrupt critical AWS services. The correlation rule aims to reduce the dwell time of attackers by prioritizing the investigation of compromised credentials associated with ongoing malicious activity. This can prevent attackers from further escalating their attacks and minimizing the overall impact of the breach. Failure to detect and respond to these attacks can result in regulatory fines, reputational damage, and loss of customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts&rdquo; rule (rule ID 98cfaa44-83f0-4aba-90c4-363fb9d51a75) in your Elastic Security environment to identify potentially compromised IAM access keys.</li>
<li>Investigate alerts triggered by the rule by pivoting on the <code>aws.cloudtrail.user_identity.access_key_id</code> in CloudTrail and IAM to understand the context of the access key usage.</li>
<li>Review the sibling alerts identified by the rule using <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_id_values</code> to understand the scope and impact of the potential compromise.</li>
<li>Configure your Elastic Security deployment to properly map risk scores to severity levels, ensuring that <code>kibana.alert.risk_score &gt;= 47</code> corresponds to medium or higher severity alerts.</li>
<li>Rotate or disable any IAM access keys identified as compromised by the rule to prevent further unauthorized access.</li>
<li>Enable AWS CloudTrail logging to capture detailed information about API calls made within your AWS environment, providing valuable context for investigating security alerts.</li>
<li>Implement the &ldquo;AWS Long-Term Access Key First Seen from Source IP&rdquo; rule (rule_id: 9f8e3c5e-f72e-4e91-93f6-e98a4fae3e4f) if not already enabled, as it is a pre-requisite for this correlation rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>credential-access</category><category>initial-access</category></item><item><title>Unsecured Zoom Meeting Creation</title><link>https://feed.craftedsignal.io/briefs/2026-06-19-zoom-meeting-no-passcode/</link><pubDate>Wed, 01 Apr 2026 15:53:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-19-zoom-meeting-no-passcode/</guid><description>The creation of Zoom meetings without passcodes allows unauthorized access and disruption, known as Zoombombing, potentially leading to the exposure of sensitive information or reputational damage.</description><content:encoded><![CDATA[<p>The absence of passcodes on Zoom meetings creates a significant vulnerability, allowing malicious actors to engage in &ldquo;Zoombombing.&rdquo; This involves unauthorized individuals disrupting meetings with offensive content or potentially gaining access to sensitive information discussed during the session. The Elastic detection rule, published initially in 2020 and updated in March 2026, aims to identify these unsecured meetings by monitoring Zoom event logs. This is especially relevant given the increased reliance on teleconferencing platforms and the potential for reputational and data security incidents arising from such breaches. The scope includes all Zoom meetings created where event logs are collected by Filebeat or a similar data collection method.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Zoom meeting ID without a passcode, often through social media or shared links.</li>
<li>The attacker joins the meeting using the Zoom client or web interface.</li>
<li>Once inside, the attacker disrupts the meeting by sharing offensive content (images, videos, audio) via screen sharing or chat.</li>
<li>The attacker may attempt to gather sensitive information shared during the meeting, such as personal data or confidential business details.</li>
<li>Participants react to the disruption, causing further chaos and potentially escalating the situation.</li>
<li>The meeting host is forced to end the meeting abruptly to stop the disruption, impacting productivity.</li>
<li>The incident may lead to reputational damage for the organization hosting the meeting.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Unsecured Zoom meetings can lead to significant disruptions and potential data breaches. A single Zoombombing incident can affect dozens to hundreds of participants, leading to wasted time, emotional distress, and potential exposure of sensitive information. Organizations can suffer reputational damage if such incidents become public. The financial impact includes lost productivity and potential legal liabilities if personal data is compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Zoom Meeting with no Passcode&rdquo; to detect the creation of meetings without passcodes in your environment.</li>
<li>Review Zoom account settings to enforce mandatory passcodes for all new meetings.</li>
<li>Enable the Zoom Filebeat module or similar structured data collection for comprehensive Zoom event logging.</li>
<li>Educate meeting hosts about the risks of unsecured meetings and best practices for securing their sessions.</li>
<li>Implement enhanced monitoring and alerting for Zoom meeting creation events to quickly detect and respond to any future instances of meetings being set up without passcodes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>zoom</category><category>zoombombing</category><category>initial-access</category></item><item><title>Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</link><pubDate>Mon, 30 Mar 2026 10:27:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</guid><description>Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute within Active Directory via PowerShell scripts. This activity is flagged as potentially malicious because it could be indicative of an attempt to exploit the &lsquo;BadSuccessor&rsquo; privilege escalation vulnerability in Windows Server 2025. The vulnerability, as outlined in Akamai&rsquo;s research, allows attackers to manipulate managed service account (dMSA) links to gain elevated privileges. The detection is based on identifying specific PowerShell script patterns that include <code>.Put(&quot;msDS-ManagedAccountPrecededByLink'</code> and <code>CN=</code>, which are used to modify these critical AD attributes. Defenders should be aware that legitimate administrative tasks might also trigger this detection, so careful tuning and validation are necessary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a system with sufficient privileges to execute PowerShell scripts, possibly through compromised credentials or other initial access vectors (T1078.002).</li>
<li><strong>Discovery:</strong> The attacker uses PowerShell to enumerate existing dMSAs and their associated <code>msDS-ManagedAccountPrecededByLink</code> attributes.</li>
<li><strong>Attribute Modification:</strong> The attacker crafts a PowerShell script to modify the <code>msDS-ManagedAccountPrecededByLink</code> attribute of a target dMSA. This involves using the <code>.Put(&quot;msDS-ManagedAccountPrecededByLink&quot;</code> command and specifying a new distinguished name (<code>CN=</code>) for the preceding account.</li>
<li><strong>Persistence:</strong> The attacker leverages the modified dMSA link to establish a persistent foothold in the environment by gaining control over the targeted dMSA.</li>
<li><strong>Privilege Escalation:</strong> By manipulating the dMSA links, the attacker effectively inherits the permissions and privileges associated with the compromised dMSA, thereby escalating their own privileges.</li>
<li><strong>Defense Evasion:</strong> The attacker may attempt to evade detection by obfuscating the PowerShell script or using other techniques to hide their activity.</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker can move laterally within the network, accessing sensitive resources and systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability through modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute can lead to complete domain compromise. An attacker can gain control over critical services and data, potentially resulting in data breaches, service disruptions, and significant financial losses. The impact is amplified in environments heavily reliant on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect potentially malicious modifications to dMSA link attributes via PowerShell (logsource: ps_script, product: windows).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if the activity is legitimate or indicative of an attempted exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability.</li>
<li>Implement strict access controls and monitoring for systems and accounts with the ability to modify Active Directory attributes.</li>
<li>Review and harden Active Directory security configurations to prevent unauthorized modification of sensitive attributes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>initial-access</category><category>active-directory</category></item><item><title>Device Code Phishing Campaign Targeting Cloud Platforms</title><link>https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-device-code-phishing/</guid><description>A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.</description><content:encoded><![CDATA[<p>An active phishing campaign is leveraging Microsoft&rsquo;s Device Code OAuth flow to target users of cloud-based file storage and document workflow platforms. Unlike traditional phishing attacks that aim to steal usernames and passwords directly, this campaign exploits a legitimate authentication mechanism to gain unauthorized access. The campaign impersonates popular cloud services, enticing users to enter a provided device code on a Microsoft login page. By doing so, victims inadvertently grant the attacker access to their accounts on the targeted platforms. This campaign highlights the evolving tactics of phishing actors and the need for robust detection mechanisms beyond simple credential harvesting alerts. The scope and scale of the campaign are currently unknown.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email impersonating a cloud-based file storage or document workflow service.</li>
<li>The email contains a message prompting the user to &ldquo;activate&rdquo; or &ldquo;authenticate&rdquo; their account.</li>
<li>The email includes a device code and instructs the user to visit a Microsoft login page (e.g., microsoft.com/devicelogin).</li>
<li>The user, believing the request is legitimate, enters the provided device code on the Microsoft login page.</li>
<li>The Microsoft login page prompts the user to grant permissions to an application controlled by the attacker.</li>
<li>If the user approves the permissions, the attacker gains OAuth tokens that allow access to the user&rsquo;s account on the targeted cloud platform.</li>
<li>The attacker can then access, modify, or exfiltrate data stored on the compromised account.</li>
<li>The attacker may use the compromised account to further propagate the phishing campaign to other users within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to unauthorized access to sensitive data stored in cloud-based file storage and document workflow platforms. This can result in data breaches, financial loss, and reputational damage for affected organizations. The use of a legitimate Microsoft authentication flow makes this campaign difficult to detect with traditional phishing detection methods. The lack of credential harvesting may also bypass security controls focused on monitoring password theft. The specific number of victims and sectors targeted remains unknown, but the potential impact is significant given the widespread use of cloud services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement user awareness training to educate employees about device code phishing and the risks of entering unknown codes on login pages.</li>
<li>Monitor Microsoft Entra ID (Azure AD) logs for unusual device code authentication patterns, focusing on applications requesting broad permissions (reference: Attack Chain steps 5 and 6). Deploy the &ldquo;Detect Suspicious Device Code Authentication&rdquo; Sigma rule to identify anomalous activity.</li>
<li>Implement Conditional Access policies in Microsoft Entra ID to restrict device code authentication to trusted devices and locations.</li>
<li>Investigate any successful device code authentications where the application requesting permissions is not recognized or approved by the organization.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>initial-access</category><category>phishing</category><category>oauth</category></item><item><title>Azure Service Principal Sign-In Followed by Arc Cluster Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azure-arc-credential-access/</link><pubDate>Tue, 17 Mar 2026 15:06:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azure-arc-credential-access/</guid><description>Detects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.</description><content:encoded><![CDATA[<p>This detection rule identifies a specific attack chain targeting Azure Arc-connected Kubernetes clusters. The attack begins with a service principal authenticating to Microsoft Entra ID and immediately requesting credentials for an Azure Arc-connected Kubernetes cluster. This <code>listClusterUserCredential</code> action retrieves tokens enabling <code>kubectl</code> access via the Arc Cluster Connect proxy. This behavior is indicative of adversaries using stolen service principal secrets to gain unauthorized access and establish a proxy tunnel into Kubernetes environments. The rule prioritizes external service principal authentications (excluding managed identities) followed by Arc cluster credential access, particularly when sign-in origins are from unexpected locations or Autonomous System Numbers (ASNs). This activity was observed in attacks documented by IBM X-Force and Microsoft, as referenced below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or obtains valid credentials for an Azure Service Principal.</li>
<li>The attacker authenticates to Microsoft Entra ID using the compromised service principal credentials, generating a ServicePrincipalSignInLogs event in Azure.</li>
<li>The attacker attempts to list cluster user credentials for a connected Kubernetes cluster using the compromised service principal. This generates an Azure Activity Log event: <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/LISTCLUSTERUSERCREDENTIAL/ACTION</code>.</li>
<li>If successful, the <code>listClusterUserCredential</code> action provides the attacker with tokens to access the Kubernetes cluster through the Arc Cluster Connect proxy.</li>
<li>The attacker uses the acquired credentials to interact with the Kubernetes cluster via <code>kubectl</code> proxied through Azure Arc.</li>
<li>The attacker performs reconnaissance within the Kubernetes cluster to identify valuable targets.</li>
<li>The attacker attempts to create, read, update, or delete (CRUD) sensitive Kubernetes resources, such as secrets or configmaps.</li>
<li>The attacker may attempt to escalate privileges within the cluster or pivot to other resources within the Azure environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of service principal credentials and subsequent access to Azure Arc-connected Kubernetes clusters can lead to significant data breaches, service disruption, and unauthorized resource access. Successful exploitation allows attackers to gain control over Kubernetes clusters, potentially leading to lateral movement within the environment, exfiltration of sensitive data, and deployment of malicious workloads. The number of victims and specific sectors targeted vary based on the attacker&rsquo;s objectives and the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the described attack chain, tuning the <code>maxspan</code> value based on observed authentication patterns and network latency.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on unexpected sign-in locations or ASNs for the service principal (refer to the investigation fields in the rule definition).</li>
<li>Implement regular rotation of service principal credentials and enforce multi-factor authentication where possible (refer to Microsoft Entra ID documentation).</li>
<li>Review and restrict Azure role assignments for service principals on Arc-connected clusters to minimize potential impact from compromised credentials (refer to Azure RBAC documentation).</li>
<li>Enable logging for Azure sign-in logs and activity logs to ensure the data sources are available for the detection rule (refer to Azure Monitor documentation).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>azure-arc</category><category>credential-access</category><category>initial-access</category></item><item><title>Fortigate VPN CVE-2023-27997 Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</link><pubDate>Sat, 28 Feb 2026 00:46:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</guid><description>IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.</description><content:encoded>&lt;p>On February 28, 2026, network intrusion detection systems (IDS) flagged suspicious activity indicative of a potential exploit targeting Fortigate VPN servers. The activity involves a series of repeated GET requests directed towards the &lt;code>/remote/logincheck&lt;/code> endpoint, a known attack vector associated with CVE-2023-27997. This vulnerability allows unauthenticated attackers to execute arbitrary code via specially crafted requests. The observed traffic originates from the IPv6 address…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>initial-access</category></item><item><title>Suspicious AWS EC2 Key Pair Import Activity</title><link>https://feed.craftedsignal.io/briefs/2024-12-aws-key-pair-import/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-aws-key-pair-import/</guid><description>The import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.</description><content:encoded><![CDATA[<p>The unauthorized import of SSH key pairs into Amazon Elastic Compute Cloud (EC2) is a technique that malicious actors can leverage to gain unauthorized access to EC2 instances. By importing their own key pairs, attackers can bypass existing security measures and gain persistent access to compromised systems. This activity is often part of a broader attack campaign aimed at compromising sensitive data, disrupting services, or establishing a foothold within an organization&rsquo;s cloud infrastructure. The initial publication of the detection rule was in December 2024, highlighting the ongoing relevance of this technique in cloud security. Monitoring for this activity can help defenders identify and respond to potential security breaches in a timely manner.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a misconfigured IAM role.</li>
<li>The attacker attempts to enumerate existing EC2 instances to identify potential targets.</li>
<li>The attacker generates or obtains an SSH key pair, which they intend to use for unauthorized access.</li>
<li>The attacker uses the <code>ImportKeyPair</code> API call within the EC2 service to import the generated or obtained SSH key pair.</li>
<li>The attacker modifies the EC2 instance&rsquo;s configuration to associate the newly imported key pair with the instance. This might involve stopping and restarting the instance.</li>
<li>The attacker uses the imported SSH key pair to gain SSH access to the EC2 instance.</li>
<li>Once inside the instance, the attacker attempts to escalate privileges and move laterally within the AWS environment.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or disrupts critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful key pair import can lead to complete compromise of the affected EC2 instances, potentially impacting dozens of servers depending on the environment. Sensitive data stored on or accessible from these instances could be exfiltrated, leading to financial loss, reputational damage, and regulatory fines. Furthermore, compromised instances can be used as a launchpad for further attacks within the AWS environment, leading to a wider breach. The financial impact can range from tens of thousands to millions of dollars, depending on the scale of the breach and the sensitivity of the data compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>ImportKeyPair</code> events in CloudTrail logs (logsource: aws, service: cloudtrail).</li>
<li>Review IAM policies to ensure that only authorized users and roles have the necessary permissions to import key pairs (eventSource: &rsquo;ec2.amazonaws.com&rsquo;, eventName: &lsquo;ImportKeyPair&rsquo;).</li>
<li>Investigate any detected <code>ImportKeyPair</code> events, validating the user identity, user agent, and source IP address to ensure they are expected (detection block).</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>ec2</category><category>keypair</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>Suspicious Child Processes Spawned by JetBrains TeamCity</title><link>https://feed.craftedsignal.io/briefs/2024-05-jetbrains-teamcity-suspicious-child-process/</link><pubDate>Wed, 15 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-jetbrains-teamcity-suspicious-child-process/</guid><description>Detection of suspicious processes spawned by JetBrains TeamCity indicates potential exploitation of remote code execution vulnerabilities, with attackers using command interpreters and system binaries for malicious purposes.</description><content:encoded><![CDATA[<p>JetBrains TeamCity is a continuous integration and deployment server, making it a high-value target for attackers. Exploitation of TeamCity vulnerabilities can lead to remote code execution, enabling adversaries to compromise the software development pipeline. This activity is detected by monitoring for suspicious child processes initiated by the TeamCity Java executable, focusing on executables like <code>cmd.exe</code>, <code>powershell.exe</code>, and <code>msiexec.exe</code>. The detection logic excludes legitimate operations to reduce false positives. This activity can lead to complete compromise of the build environment, allowing attackers to inject malicious code into software builds.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker exploits a vulnerability (e.g., CVE-2023-42793) in the TeamCity server to gain initial access.</li>
<li><strong>Code Execution:</strong> The attacker leverages the vulnerability to execute arbitrary code on the TeamCity server.</li>
<li><strong>Process Spawning:</strong> The attacker spawns a command interpreter, such as <code>cmd.exe</code> or <code>powershell.exe</code>, from the TeamCity Java process (<code>java.exe</code>).</li>
<li><strong>Discovery:</strong> The attacker uses discovery commands via the spawned shell to enumerate users, network configuration, and running processes using tools like <code>whoami.exe</code>, <code>ipconfig.exe</code>, and <code>tasklist.exe</code>.</li>
<li><strong>Defense Evasion:</strong> The attacker leverages system binary proxy execution using tools like <code>mshta.exe</code> or <code>regsvr32.exe</code> to evade detection.</li>
<li><strong>Persistence:</strong> While not explicitly mentioned, the attacker could establish persistence by creating scheduled tasks or modifying registry keys via spawned processes.</li>
<li><strong>Lateral Movement:</strong> The attacker uses discovered credentials to move laterally to other systems within the network.</li>
<li><strong>Impact:</strong> The attacker injects malicious code into software builds, compromises sensitive data, or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of JetBrains TeamCity can lead to a full compromise of the software development lifecycle, resulting in supply chain attacks. Attackers can inject malicious code into software builds, leading to widespread distribution of compromised software. While specific victim counts are unavailable, this type of attack has the potential to affect numerous organizations relying on the compromised software. The Trend Micro research indicates that TeamCity vulnerability exploits can lead to Jasmin ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Suspicious JetBrains TeamCity Child Process&rdquo; rule to your SIEM to detect potential exploitation attempts.</li>
<li>Enable Sysmon process creation logging to capture process execution events, which are essential for triggering the detection rule.</li>
<li>Review and patch any known vulnerabilities in JetBrains TeamCity, focusing on remote code execution flaws as described in the referenced Trend Micro report.</li>
<li>Implement network segmentation to limit the impact of a compromised TeamCity server and prevent lateral movement.</li>
<li>Continuously monitor TeamCity server logs for any unusual activity or unauthorized access attempts.</li>
<li>Tune the &ldquo;Suspicious JetBrains TeamCity Child Process&rdquo; rule by creating exceptions for legitimate build scripts that invoke command-line utilities to reduce false positives, as mentioned in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>teamcity</category><category>supply-chain</category><category>initial-access</category></item><item><title>OpenCanary SSH Login Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-login/</link><pubDate>Thu, 02 May 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-login/</guid><description>Detects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.</description><content:encoded><![CDATA[<p>OpenCanary is a low-interaction honeypot designed to detect attackers on a network. This brief focuses on detecting SSH login attempts on OpenCanary nodes, which are designed to mimic real SSH servers but log any interaction. While the OpenCanary project itself has been around for several years, its integration with modern detection strategies makes it a valuable tool for defenders. An SSH login attempt against an OpenCanary instance signifies that an attacker is actively scanning or attempting to compromise systems within the network. This activity might be part of a broader campaign, including lateral movement, privilege escalation, or data exfiltration. The detection of such attempts allows for timely incident response and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the network, possibly through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker performs network scanning to identify potential targets, including the OpenCanary node masquerading as a legitimate SSH server.</li>
<li>The attacker attempts to establish an SSH connection to the OpenCanary node, attempting to authenticate using various usernames and passwords.</li>
<li>The OpenCanary service logs the failed SSH login attempt, recording the source IP address and attempted credentials.</li>
<li>Security monitoring tools ingest the OpenCanary logs and trigger an alert based on the detected SSH login attempt.</li>
<li>Security analysts investigate the alert, analyzing the source IP address and other relevant information to determine the scope and severity of the potential breach.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful SSH login attempt on a real server could lead to complete system compromise, data exfiltration, and disruption of services. While OpenCanary is designed to be a honeypot, detecting login attempts early allows for proactive measures to prevent attackers from reaching critical assets. Identifying the attacker&rsquo;s source IP address and attempted usernames can provide valuable insights into their tactics and objectives, preventing damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;OpenCanary - SSH Login Attempt&rdquo; to your SIEM to detect unauthorized SSH login attempts on OpenCanary nodes.</li>
<li>Investigate and block any identified malicious source IP addresses from network access using firewall rules.</li>
<li>Review OpenCanary configuration to ensure it is deployed in strategically valuable network segments (references: OpenCanary documentation).</li>
<li>Correlate OpenCanary alerts with other security events to identify potential broader attack campaigns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>ssh</category><category>initial-access</category></item><item><title>Okta Admin Console Unusual Behavior Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</guid><description>This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unusual behaviors within the Okta Admin Console, as identified by Okta&rsquo;s heuristics. While the specific campaign details are unknown, identifying anomalous access patterns to the Admin Console is crucial for detecting various malicious activities. This includes potential privilege escalation by compromised accounts or insider threats attempting to gain elevated permissions, establishing persistence through unauthorized modifications, evading existing security controls, or gaining initial access through account compromise. The detection relies on Okta&rsquo;s system logs which can signal unusual administrative activity. Defenders should prioritize monitoring and alerting on these events to quickly identify and respond to potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta account, possibly through credential phishing or brute-force attacks.</li>
<li>The attacker attempts to log in to the Okta Admin Console.</li>
<li>Okta&rsquo;s behavior detection engine analyzes the login attempt, considering factors like the user&rsquo;s location, device, and time of day.</li>
<li>The system logs record a <code>policy.evaluate_sign_on</code> event when a sign-on policy is evaluated.</li>
<li>The <code>target.displayName</code> field within the log specifies &ldquo;Okta Admin Console&rdquo; indicating the user is attempting to access the administrative interface.</li>
<li>If Okta identifies the behavior as unusual, the <code>debugContext.debugData.behaviors</code> or <code>debugContext.debugData.logOnlySecurityData</code> fields will contain &ldquo;POSITIVE&rdquo;.</li>
<li>An alert is triggered based on the identified unusual behavior.</li>
<li>The attacker, if successful in bypassing initial checks, may proceed to create new admin accounts, modify existing policies, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the Okta Admin Console can lead to significant damage, including unauthorized access to sensitive data, modification of security policies, creation of rogue administrator accounts, and ultimately, a complete takeover of the Okta environment. This can impact all applications and services integrated with Okta, potentially affecting thousands of users and causing significant financial and reputational damage. Early detection is crucial to limiting the scope and impact of such attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Okta Admin Console Unusual Behavior</code> to your SIEM to detect suspicious Okta Admin Console access based on Okta&rsquo;s internal behavior analysis.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the unusual behavior is legitimate or indicative of malicious activity.</li>
<li>Review Okta&rsquo;s System Log API documentation to understand the various event types and data fields available for monitoring and detection.</li>
<li>Implement multi-factor authentication (MFA) for all Okta accounts, especially administrator accounts, to mitigate the risk of account compromise (related to initial access).</li>
<li>Monitor Okta&rsquo;s security advisories and announcements for updates on emerging threats and recommended security practices (references).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>privilege-escalation</category><category>persistence</category><category>defense-evasion</category><category>initial-access</category></item><item><title>Bitbucket User Login Failure Detection</title><link>https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</link><pubDate>Fri, 08 Mar 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-03-bitbucket-login-fail/</guid><description>Detection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user login failures within Bitbucket environments. Monitoring failed login attempts is crucial as it can indicate various malicious activities, including credential stuffing, brute-force attacks, or attempts to gain unauthorized initial access. The audit logs in Bitbucket record details of these authentication failures, providing valuable data for security monitoring. The rule provided detects these events and can be used for correlation with other security events based on the &ldquo;author.name&rdquo; field for enhanced accuracy and context. Requires &ldquo;Advance&rdquo; log level to receive audit events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access Attempt:</strong> An attacker attempts to gain initial access to a Bitbucket account using a compromised or guessed username.</li>
<li><strong>Credential Guessing:</strong> The attacker attempts to guess the user&rsquo;s password through manual attempts or automated tools.</li>
<li><strong>Authentication Failure:</strong> Bitbucket records a &ldquo;User login failed&rdquo; event due to incorrect credentials. The <code>auditType.category</code> is Authentication, and <code>auditType.action</code> is User login failed.</li>
<li><strong>Multiple Failed Attempts:</strong> The attacker repeats the login attempts with different password variations or using a list of compromised credentials.</li>
<li><strong>Account Lockout (Optional):</strong> Depending on Bitbucket&rsquo;s configuration, repeated failed login attempts may trigger an account lockout.</li>
<li><strong>Successful Login (Potential):</strong> After multiple attempts, the attacker may eventually guess the correct password or use a valid compromised credential.</li>
<li><strong>Privilege Escalation/Persistence (If Successful):</strong> If successful, the attacker could escalate privileges, establish persistence, or perform other malicious actions within the Bitbucket environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive code repositories, intellectual property theft, and potential supply chain compromise. Attackers could inject malicious code, modify existing code, or exfiltrate sensitive data. Detecting these failed login attempts early can prevent significant damage. Although the number of victims cannot be determined with this specific detection, a successful attack can have far-reaching impacts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Bitbucket User Login Failure&rdquo; to your SIEM to detect suspicious authentication failures (logsource: bitbucket, service: audit). Tune for your environment by correlating on the author.name field.</li>
<li>Investigate the source IP addresses associated with the failed login attempts to identify potential malicious actors.</li>
<li>Implement multi-factor authentication (MFA) to significantly reduce the risk of successful credential-based attacks.</li>
<li>Monitor for unusual activity following any successful login after a series of failures.</li>
<li>Enforce strong password policies to reduce the effectiveness of brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bitbucket</category><category>authentication</category><category>brute-force</category><category>credential-access</category><category>initial-access</category></item><item><title>Detection of New GitHub Actions Secrets Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</guid><description>This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies the creation of new secrets within GitHub Actions. Threat actors may create or modify secrets to gain unauthorized access, establish persistence, or escalate privileges within the GitHub environment. The activity is captured via GitHub&rsquo;s audit logs. The scope of this detection encompasses the creation of secrets at the organization, environment, codespaces, or repository level. Successful detection of this activity allows security teams to investigate potentially malicious modifications to GitHub Actions secrets, which could lead to supply chain compromise or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub account, potentially through compromised credentials or phishing (T1078.004).</li>
<li>The attacker authenticates to the GitHub organization or repository.</li>
<li>The attacker navigates to the settings for the organization, environment, codespaces, or repository.</li>
<li>The attacker creates a new secret within the GitHub Actions settings, using the GitHub API or web interface.</li>
<li>The secret is stored within GitHub&rsquo;s infrastructure, accessible to GitHub Actions workflows.</li>
<li>The attacker modifies or creates a GitHub Actions workflow that utilizes the newly created secret.</li>
<li>The workflow executes, using the secret to perform privileged actions such as accessing sensitive data or deploying malicious code.</li>
<li>The attacker achieves persistence or elevates their privileges within the GitHub environment, potentially compromising the entire software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, code injection, and supply chain compromise. The impact ranges from low, in cases where the secret is used for benign purposes, to critical if the secret is used to deploy malicious code into production environments. While the number of affected organizations is unknown, the potential for widespread impact across the software supply chain makes this a critical area for monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the events necessary for this detection (see <code>logsource</code> definition).</li>
<li>Deploy the Sigma rule <code>Github New Secret Created</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the &ldquo;actor&rdquo; involved in creating the secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>persistence</category><category>privilege-escalation</category><category>initial-access</category></item><item><title>AWS Identity API Access from Rare ASN Organizations</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-aws-rare-asn/</guid><description>This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.</description><content:encoded><![CDATA[<p>This detection identifies AWS identities that primarily use API traffic originating from well-known cloud providers (e.g., Amazon, Google, Microsoft), but also exhibit a small amount of traffic from less common Autonomous System (AS) organizations. This pattern can indicate that automation or CI credentials are being reused or pivoted outside of their usual hosted cloud environment. The detection focuses on successful API calls and looks for a combination of high volume from trusted cloud providers and at least one sensitive action originating from an uncommon network. This behavior could be indicative of credential compromise and lateral movement. This rule was published by Elastic on 2026-04-22.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to valid AWS credentials, potentially through phishing, credential stuffing, or exposed secrets.</li>
<li>The attacker uses the compromised credentials to make API calls from their own infrastructure, which is associated with a rare AS organization.</li>
<li>The attacker performs reconnaissance, such as <code>GetCallerIdentity</code>, <code>ListBuckets</code>, or <code>ListSecrets</code>, to understand the AWS environment.</li>
<li>The attacker attempts to escalate privileges by calling <code>AssumeRole</code>, <code>AttachUserPolicy</code>, or <code>CreateAccessKey</code>.</li>
<li>The attacker attempts to access sensitive data using actions such as <code>GetObject</code> or <code>GetSecretValue</code>.</li>
<li>The attacker attempts to create new users or modify existing user profiles using actions such as <code>CreateUser</code>, <code>UpdateLoginProfile</code>, or <code>AddUserToGroup</code>.</li>
<li>The attacker may attempt to invoke cloud ML models using <code>InvokeModel</code> or <code>Converse</code> to further their objectives.</li>
<li>The attacker persists in the environment by creating new IAM users, roles, or policies, or by modifying existing ones.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data stored in S3 buckets, Secrets Manager, or other AWS services. It can also allow the attacker to escalate privileges, create new users, and modify existing configurations, leading to long-term control of the AWS environment. The severity of the impact depends on the level of access granted to the compromised credentials. This can lead to exfiltration of sensitive data, denial of service, or complete compromise of the AWS account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging in all regions and send logs to a centralized SIEM or logging platform to enable detection capabilities (<a href="https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference.html">references</a>).</li>
<li>Deploy the Sigma rule &ldquo;AWS Rare Source AS Organization Activity&rdquo; translated from the provided ESQL query to detect unusual source ASNs for AWS API calls.</li>
<li>Investigate alerts generated by the rule, focusing on the <code>user.name</code>, <code>aws.cloudtrail.user_identity.type</code>, <code>Esql.src_asn_values</code>, and <code>Esql.untrusted_suspicious_actions</code> to understand the context of the activity.</li>
<li>Rotate credentials for the affected principal if abuse is suspected and enforce OIDC or short-lived keys for automation.</li>
<li>Tighten IAM and data-plane permissions to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>initial-access</category><category>credential-access</category></item><item><title>Google Workspace Suspicious Login Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</guid><description>Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting suspicious login activity within Google Workspace environments, as flagged by Google&rsquo;s internal risk assessment mechanisms. Google Workspace logs login events and classifies them based on various risk factors, including the use of less secure applications, programmatic logins, and other anomalies. This detection capability is crucial for identifying potential compromises, unauthorized access attempts, and malicious activities within the Google Workspace ecosystem. Analyzing these flagged events allows security teams to proactively respond to threats before they escalate, preventing data breaches and maintaining the integrity of sensitive information. This alert focuses on logins classified as &lsquo;suspicious_login_less_secure_app&rsquo;, &lsquo;suspicious_login&rsquo;, and &lsquo;suspicious_programmatic_login&rsquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access using compromised credentials or brute-force techniques targeting Google Workspace accounts.</li>
<li><strong>Login Attempt:</strong> The attacker attempts to log in to a Google Workspace account using a less secure application (e.g., an older email client without modern authentication) or via programmatic login.</li>
<li><strong>Suspicious Activity Detection:</strong> Google&rsquo;s internal systems analyze the login attempt and flag it as suspicious based on various risk factors, such as unusual location, time of day, or login method.</li>
<li><strong>Event Logging:</strong> Google Workspace logs the suspicious login event, including the reason for the classification (e.g., &lsquo;suspicious_login_less_secure_app&rsquo;).</li>
<li><strong>Potential Privilege Escalation:</strong> Upon successful login, the attacker may attempt to escalate privileges within the Google Workspace environment to gain broader access.</li>
<li><strong>Defense Evasion:</strong> The attacker might use techniques to evade detection, such as disabling security features or modifying audit logs.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new accounts, modifying existing ones, or installing malicious apps.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> The attacker uses the compromised account to exfiltrate sensitive data or perform other malicious activities, such as sending phishing emails.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data stored within Google Workspace, including emails, documents, and other files. This can result in data breaches, financial loss, and reputational damage. The number of affected users depends on the scope of the compromised account and the attacker&rsquo;s ability to escalate privileges. Targeted sectors are broad, affecting any organization relying on Google Workspace for collaboration and data storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious login activity classified by Google Workspace (logsource: <code>gcp</code>, service: <code>google_workspace.login</code>).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the login attempt and take appropriate action, such as resetting passwords or disabling compromised accounts.</li>
<li>Enforce multi-factor authentication (MFA) for all Google Workspace accounts to mitigate the risk of credential compromise.</li>
<li>Disable or restrict the use of less secure apps within Google Workspace to reduce the attack surface.</li>
<li>Monitor Google Workspace audit logs for other suspicious activities, such as unusual file access or data exfiltration attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>gworkspace</category></item><item><title>Detecting External RPC Traffic for Initial Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-rpc-from-internet/</link><pubDate>Tue, 09 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-rpc-from-internet/</guid><description>This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.</description><content:encoded><![CDATA[<p>This detection rule identifies RPC traffic originating from the internet, which can indicate malicious activity. RPC is used for remote system administration and resource sharing but should rarely be exposed to the internet. Threat actors frequently target RPC for initial access or as a backdoor. This rule analyzes network traffic, specifically looking for TCP connections to port 135 (a common RPC port) originating from outside the internal network. The rule aims to detect unauthorized attempts to access or control systems via RPC from external sources, enhancing network security and preventing potential breaches. The rule was last updated on 2026-04-24.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker scans the internet for systems with exposed RPC services on TCP port 135.</li>
<li>The attacker establishes a TCP connection to the target system&rsquo;s port 135.</li>
<li>The attacker attempts to negotiate an RPC connection, potentially exploiting vulnerabilities in the RPC service.</li>
<li>Successful exploitation allows the attacker to execute commands remotely on the target system.</li>
<li>The attacker uses the compromised system to perform reconnaissance, gathering information about the internal network.</li>
<li>The attacker attempts lateral movement to other systems within the network, using the initial foothold.</li>
<li>The attacker installs malware or creates a backdoor for persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of exposed RPC services can lead to complete system compromise, allowing attackers to execute arbitrary commands, install malware, and steal sensitive data. This can result in data breaches, financial loss, and reputational damage. The rule aims to prevent attackers from gaining initial access to internal systems, mitigating the risk of wider network compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect RPC from Internet&rdquo; to your SIEM to identify potentially malicious connections to port 135.</li>
<li>Review and harden systems that provide RPC services to ensure they are not directly exposed to the internet, as detected by the rule &ldquo;Detect RPC from Internet&rdquo;.</li>
<li>Enforce network segmentation to limit the exposure of critical systems and services, preventing RPC services from being accessible from the Internet (reference: note section in the rule).</li>
<li>Investigate any alerts generated by the Sigma rule by examining the source and destination IP addresses and related network traffic logs (reference: note section in the rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>initial-access</category><category>network</category><category>rpc</category></item><item><title>Successful AWS Console Login Without MFA</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-aws-console-login-no-mfa/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-aws-console-login-no-mfa/</guid><description>Successful AWS console logins without multi-factor authentication can indicate compromised credentials, misconfigured security settings, or unauthorized access attempts.</description><content:encoded><![CDATA[<p>The absence of multi-factor authentication (MFA) during AWS console logins presents a significant security risk. Threat actors often target AWS environments due to the high value of data and services hosted within. An attacker gaining initial access through compromised credentials can move laterally, escalate privileges, and potentially exfiltrate sensitive data, deploy malicious workloads, or disrupt critical services. This activity can go unnoticed for extended periods, increasing the potential for damage. Detecting successful console logins without MFA is crucial for identifying potential breaches and ensuring the enforcement of security best practices. This brief focuses on detecting these logins to mitigate the risk of unauthorized access and potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid AWS credentials, possibly through phishing, credential stuffing, or by exploiting a vulnerable service.</li>
<li>The attacker uses the compromised credentials to attempt to log in to the AWS Management Console.</li>
<li>The attacker successfully authenticates without providing an MFA code, indicating MFA is not enabled or is bypassed for the compromised user.</li>
<li>After successful login, the attacker enumerates existing AWS resources, including EC2 instances, S3 buckets, and IAM roles, using the AWS CLI or Console.</li>
<li>The attacker attempts to escalate privileges by exploiting IAM misconfigurations or vulnerabilities to gain access to more sensitive resources.</li>
<li>The attacker modifies security configurations, such as disabling CloudTrail logging or creating new IAM users with elevated permissions, to establish persistence.</li>
<li>The attacker accesses sensitive data stored in S3 buckets or databases, potentially exfiltrating it to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful AWS console login without MFA can lead to a full compromise of the AWS environment. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and deploy malicious workloads. The lack of MFA increases the likelihood of successful credential-based attacks, potentially affecting a large number of organizations hosting data and applications in AWS. Consequences include data breaches, financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;AWS Successful Console Login Without MFA&rdquo; Sigma rule to your SIEM to detect logins without MFA (rule).</li>
<li>Enforce MFA for all AWS IAM users, especially those with administrative privileges to prevent initial access (reference: <a href="https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/)">https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/)</a>.</li>
<li>Regularly audit IAM configurations to identify and remediate misconfigurations that could allow privilege escalation.</li>
<li>Monitor CloudTrail logs for suspicious activity following a console login, such as resource enumeration or IAM policy changes (logsource).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>mfa</category><category>initial-access</category></item><item><title>Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment</title><link>https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</link><pubDate>Fri, 05 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</guid><description>Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.</description><content:encoded><![CDATA[<p>CVE-2023-50164 is a critical path traversal vulnerability affecting Apache Struts 2 versions prior to 2.5.33 or 6.3.0.2. The vulnerability resides in the file upload functionality, allowing attackers to manipulate file upload parameters and write malicious files, such as JSP web shells, to arbitrary locations on the web server. Successful exploitation leads to remote code execution. Detection focuses on correlating suspicious file upload requests to Struts endpoints with subsequent creation of JSP files in web-accessible directories, indicating successful exploitation. The attack involves crafting malicious multipart/form-data POST requests with WebKitFormBoundary to Struts .action upload endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious HTTP POST request to a vulnerable Apache Struts endpoint (e.g., <code>*.action</code>).</li>
<li>The HTTP POST request contains a <code>multipart/form-data</code> content type with a <code>WebKitFormBoundary</code> string.</li>
<li>The request exploits CVE-2023-50164, leveraging a path traversal vulnerability in the file upload process.</li>
<li>The attacker bypasses security controls due to the path traversal vulnerability.</li>
<li>The attacker uploads a malicious JSP file (web shell) to a web-accessible directory, such as Tomcat&rsquo;s <code>webapps</code> directory.</li>
<li>A Java process (e.g., Tomcat) creates the JSP web shell file in the webapps directory.</li>
<li>The attacker accesses the deployed web shell via HTTP.</li>
<li>The attacker executes arbitrary commands on the server through the web shell.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-50164 allows attackers to achieve remote code execution on the affected server. This can lead to complete system compromise, data exfiltration, deployment of malware, and lateral movement within the network. The vulnerability affects Apache Struts 2 applications using the file upload feature, potentially impacting numerous organizations across various sectors using the framework.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Webshell Creation&rdquo; to detect JSP file creation events in webapps directories following suspicious POST requests as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Suspicious POST Request&rdquo; to detect suspicious POST requests to Struts endpoints with <code>multipart/form-data</code> content containing <code>WebKitFormBoundary</code>, as indicated in the Attack Chain.</li>
<li>Patch Apache Struts 2 to version 2.5.33, 6.3.0.2, or higher to remediate the CVE-2023-50164 vulnerability, as noted in the References.</li>
<li>Enable HTTP request body capture in network traffic monitoring tools to detect the multipart/form-data content containing WebKitFormBoundary indicators, as required by the rule setup.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache-struts</category><category>webshell</category><category>cve-2023-50164</category><category>initial-access</category><category>persistence</category><category>command-and-control</category></item><item><title>Suspicious PDF Reader Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</link><pubDate>Thu, 04 Jan 2024 18:45:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</guid><description>Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging PDF reader applications as an initial access vector, exploiting vulnerabilities within these programs or using social engineering to trick users into opening malicious PDF documents. Upon successful exploitation, adversaries often spawn built-in Windows utilities from the compromised PDF reader process to perform reconnaissance, escalate privileges, or establish persistence. This activity is designed to blend in with normal system operations, making it difficult to detect without specific monitoring and detection rules. The targeted software commonly includes Adobe Acrobat, Adobe Reader, and Foxit Reader. Defenders should be vigilant for unexpected child processes of PDF readers, especially command-line interpreters and system administration tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious PDF document via phishing or other means.</li>
<li>The user opens the PDF document using a vulnerable PDF reader application (e.g., Adobe Acrobat, Foxit Reader).</li>
<li>The PDF document exploits a vulnerability or uses a malicious script to execute an arbitrary command.</li>
<li>The PDF reader application spawns a command-line interpreter (e.g., cmd.exe, powershell.exe) or a system administration tool (e.g., reg.exe, net.exe).</li>
<li>The spawned process executes commands to gather system information (e.g., ipconfig.exe, systeminfo.exe, whoami.exe).</li>
<li>The attacker may attempt to discover network configuration, user accounts, or running processes.</li>
<li>The attacker could leverage the spawned process to download and execute further payloads.</li>
<li>The attacker gains a foothold on the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PDF reader applications can lead to initial access, privilege escalation, and further compromise of the affected system. While individual incidents may have a low risk score, widespread exploitation can lead to significant data breaches, system downtime, and reputational damage. The use of legitimate system utilities for malicious purposes can make detection challenging, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of suspicious child processes (Sysmon Event ID 1, Windows Security Event Logs).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious PDF Reader Child Process&rdquo; to your SIEM and tune for your environment to detect the execution of suspicious processes spawned by PDF reader applications.</li>
<li>Monitor for network connections originating from PDF reader applications to unusual or external IP addresses.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>initial-access</category><category>defense-evasion</category><category>discovery</category></item><item><title>Suspicious AWS SAML Activity Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</link><pubDate>Wed, 03 Jan 2024 18:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</guid><description>This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious Security Assertion Markup Language (SAML) activity within Amazon Web Services (AWS). The activity includes monitoring for <code>AssumeRoleWithSAML</code> and <code>UpdateSAMLProvider</code> events. An adversary might exploit SAML to gain unauthorized access, escalate privileges, move laterally within the AWS environment, or establish persistent backdoor access. The focus is on detecting unusual or unauthorized modifications to SAML configurations and role assumptions, which could indicate a compromised identity provider or malicious actor leveraging SAML for illicit purposes. Defenders should prioritize monitoring SAML-related API calls to identify and mitigate potential threats early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or creates a malicious SAML identity provider.</li>
<li>The attacker configures the AWS environment to trust the malicious SAML provider using <code>UpdateSAMLProvider</code>.</li>
<li>The attacker crafts a SAML assertion to assume a specific role within the AWS environment.</li>
<li>The attacker uses the <code>AssumeRoleWithSAML</code> API call to authenticate with AWS using the crafted SAML assertion.</li>
<li>AWS STS validates the SAML assertion and, if valid, provides temporary credentials for the assumed role.</li>
<li>The attacker uses the temporary credentials to perform actions within AWS, potentially escalating privileges.</li>
<li>The attacker moves laterally within the AWS environment, accessing resources and services authorized for the assumed role.</li>
<li>The attacker establishes persistent access by creating backdoors or modifying existing IAM policies, leveraging the initially gained access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via SAML manipulation can lead to a complete compromise of the AWS environment. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and deploy malicious infrastructure. The impact includes potential data breaches, financial losses, and reputational damage. The number of affected resources depends on the permissions associated with the roles assumed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for <code>AssumeRoleWithSAML</code> events to detect suspicious role assumptions (see &ldquo;AssumeRoleWithSAML Detection Rule&rdquo;).</li>
<li>Deploy the Sigma rule for <code>UpdateSAMLProvider</code> events to detect unauthorized SAML provider modifications (see &ldquo;UpdateSAMLProvider Detection Rule&rdquo;).</li>
<li>Investigate any <code>AssumeRoleWithSAML</code> events originating from unfamiliar user agents or IP addresses by reviewing CloudTrail logs.</li>
<li>Monitor <code>UpdateSAMLProvider</code> events for unexpected changes to SAML provider configurations. Review associated CloudTrail logs for user identity, user agent, and hostname to ensure authorized access.</li>
<li>Tune the provided Sigma rules for your environment, addressing false positives by exempting known, legitimate behavior.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>saml</category><category>cloudtrail</category><category>initial-access</category><category>lateral-movement</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category></item><item><title>Azure AD Temporary Access Pass Added to Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-tap-added/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-tap-added/</guid><description>Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.</description><content:encoded><![CDATA[<p>This alert identifies when a temporary access pass (TAP) is added to an Azure Active Directory (Azure AD) account. TAPs are intended for temporary use, allowing users to access resources or perform actions without needing a password. While legitimate use cases exist, adversaries can leverage TAPs to gain unauthorized access, escalate privileges, establish persistence, or move laterally within an Azure environment. This activity warrants investigation, especially if the TAP is added to a privileged account. The source material does not indicate a specific campaign or threat actor, but the technique aligns with common cloud-based attack vectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (Optional):</strong> An attacker gains initial access to an Azure AD account through compromised credentials or other means.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges to an account with sufficient permissions to manage TAPs.</li>
<li><strong>TAP Generation:</strong> The attacker, using an account with appropriate permissions, generates a temporary access pass (TAP) for a target account.</li>
<li><strong>TAP Activation:</strong> The attacker uses the TAP to authenticate to the target account.</li>
<li><strong>Resource Access:</strong> Once authenticated, the attacker gains access to resources and applications associated with the target account.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised account to access other resources or accounts within the environment.</li>
<li><strong>Persistence (Optional):</strong> The attacker establishes persistence by creating new credentials or modifying existing ones, if permissions allow.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and applications within the Azure environment. Compromised privileged accounts can grant attackers control over critical infrastructure, leading to data breaches, service disruptions, and reputational damage. The impact depends on the permissions associated with the compromised account and the resources accessible through the TAP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect TAP additions in Azure AD audit logs (see rules).</li>
<li>Investigate any instances where TAPs are added to privileged accounts in Azure AD, as highlighted in the rule description and references.</li>
<li>Review Azure AD audit logs for suspicious activity surrounding the TAP generation event, including the source IP address and user agent (see rules).</li>
<li>Monitor for anomalous sign-in activity using TAPs, specifically focusing on unusual locations or devices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>temporary-access-pass</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category></item><item><title>Okta Alerts Following Unusual Proxy Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-proxy-auth-alerts/</guid><description>Attackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.</description><content:encoded><![CDATA[<p>Attackers frequently use proxy infrastructure (VPNs, Tor, residential proxies) to mask their origin when using stolen credentials. This behavior often triggers additional detection rules after the initial authentication. By correlating the first instance of Okta user authentication via a proxy with subsequent Okta security alerts for the same user, this rule aims to identify potentially compromised accounts. This correlation focuses on activity within a 30-minute window following the initial proxy authentication, helping to pinpoint users whose proxy-based authentication was followed by suspicious activity. The rule leverages Okta system logs and alerts to identify these patterns. This is important for defenders to quickly identify compromised accounts and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains valid Okta credentials through phishing, credential stuffing, or other means. (T1078)</li>
<li>The attacker initiates an Okta user session from behind a proxy (VPN, Tor, etc.) to mask their origin.</li>
<li>Okta classifies the connection as originating from a proxy.</li>
<li>The user successfully authenticates and starts a session.</li>
<li>Post-authentication, the attacker attempts to access sensitive applications or data. (T1078.004)</li>
<li>The attacker&rsquo;s activity triggers an Okta security alert, such as unusual access patterns or MFA bypass attempts.</li>
<li>The detection rule correlates the proxy authentication event with the subsequent security alert.</li>
<li>Security team investigates and responds to the potential account compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the organization&rsquo;s cloud environment. Multiple alerts, coupled with proxy authentication, indicate a higher likelihood of account compromise. If successful, attackers could exfiltrate sensitive data, modify configurations, or disrupt services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Alerts Following Unusual Proxy Authentication&rdquo; to your SIEM and tune for your environment to detect suspicious activity after proxy authentication.</li>
<li>Investigate correlated security alerts triggered after proxy authentication events for affected users, as highlighted by the Sigma rule.</li>
<li>Monitor Okta system logs for authentication events originating from known malicious proxy IP addresses and block them at the network perimeter.</li>
<li>Review user&rsquo;s Okta activity for signs of account takeover (MFA changes, new devices, unusual app access) after proxy authentication.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of account compromise via stolen credentials, as this attack relies on valid accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>identity</category><category>cloud</category><category>okta</category><category>initial-access</category></item><item><title>Azure AD User Password Reset Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</guid><description>Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user-initiated password resets within Azure Active Directory (Azure AD). While legitimate password resets are common, monitoring this activity can help identify potentially malicious behavior, such as an attacker attempting to gain unauthorized access to an account or an insider threat actor escalating privileges. Attackers may leverage compromised credentials or social engineering to initiate password resets, bypassing multi-factor authentication (MFA) if it is not properly configured or enforced. This detection is important for defenders because successful password resets can lead to a complete account takeover, allowing attackers to access sensitive data, resources, and systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li>The attacker attempts to log in to an Azure AD-protected resource using the compromised credentials.</li>
<li>The attacker fails to authenticate, either because they do not have the correct password or MFA is enabled.</li>
<li>The attacker initiates a password reset request using the &ldquo;Forgot password&rdquo; feature or a similar mechanism.</li>
<li>Azure AD sends a password reset verification code or link to the user&rsquo;s registered email address or phone number.</li>
<li>If the attacker controls the registered email address or phone number (due to prior compromise), they can access the verification code or link.</li>
<li>The attacker uses the verification code or link to set a new password for the user&rsquo;s Azure AD account.</li>
<li>The attacker logs in to the Azure AD account with the new password, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets by attackers can lead to complete account takeover, allowing them to access sensitive data, resources, and systems protected by Azure AD. This can result in data breaches, financial loss, reputational damage, and disruption of business operations. The impact depends on the privileges and permissions assigned to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Password Reset By User Account</code> to your SIEM to detect user-initiated password resets in Azure AD audit logs.</li>
<li>Investigate any detected password resets, especially those initiated by users who have not recently requested a password change.</li>
<li>Review and enforce multi-factor authentication (MFA) policies to prevent attackers from bypassing password-based authentication.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to password resets, such as multiple failed login attempts followed by a successful reset.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>password-reset</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>credential-access</category><category>stealth</category></item><item><title>Suspicious PowerShell Execution via Windows Script Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-powershell-execution/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-powershell-execution/</guid><description>Detection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell execution initiated by Windows Script Host processes (cscript.exe or wscript.exe). Attackers often use Windows Script Host (WSH) to execute malicious scripts as an initial access method. These scripts can act as droppers for second-stage payloads or download tools and utilities necessary for further compromise. The rule focuses on the parent-child process relationship between WSH and PowerShell, highlighting a common technique used to bypass security controls and execute arbitrary commands on a compromised system. This activity is relevant to defenders as it represents a potential entry point for various attacks, including malware deployment and data exfiltration. The detection logic is based on process execution events observed in Windows environments and is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user receives a phishing email with a malicious attachment (e.g., a .vbs or .js file).</li>
<li>The user opens the attachment, which is processed by either wscript.exe or cscript.exe.</li>
<li>The scripting engine executes the embedded malicious code.</li>
<li>The script downloads a PowerShell script from a remote server or contains an embedded, obfuscated PowerShell command.</li>
<li>The script uses wscript.exe or cscript.exe to launch powershell.exe to execute the downloaded or embedded PowerShell script.</li>
<li>PowerShell executes, performing malicious actions such as downloading additional payloads, modifying system settings, or establishing persistence.</li>
<li>PowerShell attempts to connect to external command-and-control servers to receive further instructions.</li>
<li>The attacker gains initial access to the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, allowing attackers to deploy malware, steal sensitive information, or perform other malicious activities. The impact can range from data breaches and financial losses to reputational damage. The severity depends on the attacker&rsquo;s objectives and the level of access they gain. The number of affected systems depends on the scope of the phishing campaign or other initial access methods used to deliver the malicious script.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the necessary event data for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate process execution chains where cscript.exe or wscript.exe spawn powershell.exe using the provided Sigma rules.</li>
<li>Implement email security measures to block phishing emails with script attachments.</li>
<li>Monitor network connections originating from PowerShell processes for suspicious outbound traffic.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>execution</category><category>windows</category><category>powershell</category><category>script</category></item><item><title>RDP (Remote Desktop Protocol) from the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-internet/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-internet/</guid><description>This rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.</description><content:encoded><![CDATA[<p>Remote Desktop Protocol (RDP) is a common tool for system administrators to remotely manage systems, however, exposing RDP directly to the internet creates a significant attack surface. Threat actors frequently target and exploit RDP for initial access, lateral movement, and establishing backdoors within compromised networks. This activity is detected by monitoring network traffic for RDP connections originating from outside the internal network (RFC1918 IP ranges). This is important because successful RDP compromise often leads to broader network infiltration and data exfiltration. This detection focuses on the network level characteristics of RDP connections from the internet to internal assets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a publicly accessible RDP service.</li>
<li>The attacker attempts to brute-force RDP login credentials or exploits a known RDP vulnerability (e.g. BlueKeep CVE-2019-0708).</li>
<li>Upon successful authentication or exploitation, the attacker gains remote access to the targeted system.</li>
<li>The attacker uses the compromised system as a pivot point to perform reconnaissance on the internal network.</li>
<li>The attacker moves laterally within the network using stolen credentials or by exploiting other vulnerabilities.</li>
<li>The attacker installs malware or establishes persistence mechanisms (e.g., creating new user accounts or modifying system configurations).</li>
<li>The attacker gathers sensitive data from internal systems.</li>
<li>The attacker exfiltrates the stolen data to an external server or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised RDP services can lead to significant data breaches, system downtime, and financial losses. Attackers can leverage RDP access to steal sensitive information, install ransomware, or disrupt critical business operations. While the number of affected organizations varies, RDP exploitation remains a prevalent attack vector, especially for organizations with inadequate security practices. The impact of a successful RDP attack ranges from several thousands to millions of dollars, depending on the size of the organization and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;RDP (Remote Desktop Protocol) from the Internet&rdquo; Sigma rule to your SIEM to detect unauthorized RDP connections from outside the network.</li>
<li>Review firewall rules and network configurations to ensure RDP services are not exposed directly to the internet. Implement a VPN or RDP gateway for secure remote access.</li>
<li>Enable and monitor network traffic logs (category: <code>network_traffic</code>, product: <code>windows|linux|macos</code>) to provide data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address and user accounts involved in the RDP connection.</li>
<li>Implement network segmentation to limit the blast radius of a potential RDP compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>lateral-movement</category><category>initial-access</category><category>rdp</category></item><item><title>Detecting RPC Traffic to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</guid><description>This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.</description><content:encoded><![CDATA[<p>The Remote Procedure Call (RPC) protocol, while essential for legitimate system administration tasks such as remote maintenance and resource sharing within internal networks, poses a significant security risk when exposed to the internet. Threat actors frequently target and exploit RPC services as an initial access vector or to establish backdoors within compromised systems. This exposure allows attackers to remotely execute commands, move laterally within the network, and potentially exfiltrate sensitive data. This brief provides detection strategies to identify such anomalous RPC traffic, enabling security teams to proactively mitigate potential threats. The detection focuses on identifying TCP traffic to port 135 from internal IP ranges to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the internal network, potentially through phishing or exploiting a vulnerability.</li>
<li>The compromised host initiates an RPC connection to an external IP address on TCP port 135.</li>
<li>The attacker uses the RPC connection to enumerate network resources and identify potential targets for lateral movement.</li>
<li>Using the RPC connection, the attacker attempts to authenticate to other systems within the network.</li>
<li>Upon successful authentication, the attacker remotely executes commands on the target system via RPC.</li>
<li>The attacker installs malware or a backdoor on the target system for persistence.</li>
<li>The attacker leverages the established foothold to further propagate within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RPC services exposed to the internet can lead to a complete compromise of the internal network. Attackers can gain initial access, move laterally, exfiltrate sensitive data, deploy ransomware, or disrupt critical business operations. A single exposed RPC service can serve as a gateway for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect RPC traffic from internal IP ranges to external destinations on TCP port 135, focusing on network traffic logs.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems exhibiting suspicious RPC activity (Sigma rule, logsource: network_connection).</li>
<li>Ensure that RPC services are not directly exposed to the internet. Implement firewall rules to restrict access to authorized internal IP ranges only.</li>
<li>Continuously monitor network traffic for anomalous RPC activity and correlate with other security events (logsource: network_connection).</li>
<li>Review and update firewall configurations to block unauthorized outbound connections on port 135 (logsource: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network-traffic</category><category>initial-access</category><category>lateral-movement</category><category>rpc</category></item><item><title>Suspicious Execution via Microsoft Office Add-Ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-addins/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-addins/</guid><description>This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging malicious Microsoft Office Add-Ins to gain initial access and persistence on victim systems. These add-ins, often delivered through phishing campaigns, contain embedded malicious code. This detection identifies unusual execution patterns, such as Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE, VSTOInstaller.exe) launching add-ins (wll, xll, ppa, ppam, xla, xlam, vsto) from suspicious paths like Temp or Downloads directories, or with atypical parent processes (explorer.exe, OpenWith.exe, cmd.exe, powershell.exe). The detection logic filters out known benign activities to minimize false positives, focusing on anomalies indicative of malicious intent, such as installations of Logitech software. This activity matters because successful exploitation can lead to arbitrary code execution, data theft, and further compromise of the victim&rsquo;s network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Microsoft Office document.</li>
<li>The user opens the document, which prompts them to enable macros or install an add-in.</li>
<li>The malicious add-in (wll, xll, ppa, ppam, xla, xlam, vsto) is downloaded from a remote server or dropped into a suspicious directory, such as %TEMP% or %APPDATA%.</li>
<li>The user executes an Office application (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE), which loads the malicious add-in.</li>
<li>The malicious add-in executes arbitrary code, potentially downloading and executing a second-stage payload.</li>
<li>The add-in may establish persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker gains initial access to the system and can perform reconnaissance, lateral movement, and data exfiltration.</li>
<li>The attacker achieves their objective, which could include data theft, ransomware deployment, or intellectual property theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across all sectors are at risk, particularly those with a high volume of email traffic. The use of malicious Office Add-Ins provides attackers with a persistent foothold within the victim&rsquo;s environment, allowing for long-term data collection and disruption of business operations. This can lead to significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Add-In Loaded From Suspicious Path</code> to detect add-ins loaded from temporary or download directories based on <code>process.args</code> and <code>process.name</code>.</li>
<li>Deploy the Sigma rule <code>Office Add-In Loaded By Suspicious Parent</code> to detect add-ins loaded by <code>cmd.exe</code> or <code>powershell.exe</code> based on <code>process.parent.name</code>.</li>
<li>Investigate any instances of <code>VSTOInstaller.exe</code> executing with the <code>/Uninstall</code> argument, as this may indicate suspicious activity, correlating with the exclusion rule in the provided query.</li>
<li>Monitor for Office applications launching add-ins with parent processes of <code>explorer.exe</code> or <code>OpenWith.exe</code> using process creation logs and the provided query logic.</li>
<li>Implement stricter email filtering to prevent phishing emails containing malicious Office documents from reaching end-users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office-addins</category><category>phishing</category><category>initial-access</category></item><item><title>WebPros cPanel &amp; WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel &amp; WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>WebPros cPanel &amp; WHM (WebHost Manager) and WP2 (WordPress Squared) are affected by an authentication bypass vulnerability, identified as CVE-2026-41940. This flaw exists within the login flow, potentially granting unauthenticated remote attackers unauthorized access to the control panel. Successful exploitation allows attackers to bypass normal authentication mechanisms and directly access sensitive administrative functions within cPanel &amp; WHM and WP2. Defenders should apply vendor-provided mitigations or discontinue use of the product if mitigations are not available. The vulnerability was disclosed in April 2026, and mitigations should be applied by May 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable cPanel &amp; WHM or WP2 instance.</li>
<li>The attacker crafts a malicious HTTP request exploiting the authentication bypass vulnerability in the login flow.</li>
<li>The request is sent to the target server, bypassing authentication checks.</li>
<li>The server incorrectly processes the request, granting the attacker an authenticated session.</li>
<li>The attacker leverages the authenticated session to access administrative interfaces and settings.</li>
<li>The attacker modifies server configurations, potentially creating new administrative accounts.</li>
<li>The attacker installs malicious plugins or software through the control panel.</li>
<li>The attacker achieves full control over the web server and hosted websites.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of the affected cPanel &amp; WHM or WP2 server. This can result in data breaches, website defacement, malware distribution, and denial-of-service attacks. The impact is significant due to the widespread use of cPanel &amp; WHM in web hosting environments. Compromised servers could be leveraged for further attacks against other systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by WebPros as detailed in their security update advisory to address CVE-2026-41940.</li>
<li>Deploy the Sigma rule &ldquo;Detect cPanel/WHM Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>If mitigations cannot be immediately applied, follow BOD 22-01 guidance for cloud services, potentially isolating the affected system until patched.</li>
<li>Consider discontinuing use of the affected product if patches or mitigations are unavailable, as advised in the original CISA KEV entry.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>wp2</category><category>wordpress</category><category>authentication-bypass</category><category>cve-2026-41940</category><category>initial-access</category></item><item><title>Unused Privileged Identity Management (PIM) Roles in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-role-not-used/</guid><description>Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.</description><content:encoded><![CDATA[<p>This alert identifies a condition where users have been assigned privileged roles within Azure&rsquo;s Privileged Identity Management (PIM) but are not actively utilizing those roles. This situation can arise from various factors, including misconfiguration of PIM settings, over-allocation of privileged roles due to process gaps or lack of oversight, or the presence of dormant accounts with elevated privileges. Such unused roles represent a potential security risk, as they can be exploited by malicious actors or misused inadvertently, especially if MFA or conditional access policies are not enforced. Regularly auditing and addressing unused PIM roles is crucial for maintaining a strong security posture and optimizing license utilization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An administrator assigns a privileged role to a user within Azure PIM.</li>
<li>The user is granted the role but does not activate or use it to perform any privileged actions.</li>
<li>Azure PIM monitors role usage and detects the lack of activity for the assigned role.</li>
<li>The &ldquo;redundantAssignmentAlertIncident&rdquo; event is triggered within the Azure PIM logs.</li>
<li>An attacker gains access to the user&rsquo;s account through credential compromise or other means.</li>
<li>The attacker activates the unused privileged role.</li>
<li>The attacker leverages the now-active privileged role to perform unauthorized actions, such as modifying system configurations, accessing sensitive data, or escalating privileges further.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise, without being detected due to the pre-existing role assignment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of unused privileged roles can lead to significant security breaches and compliance violations. An attacker exploiting an unused role can gain immediate access to sensitive resources and perform unauthorized actions, potentially leading to data breaches, system outages, or financial losses. The number of affected users and resources depends on the scope of the unused role and the attacker&rsquo;s objectives. Failure to identify and address these unused roles can also result in unnecessary license costs and increased attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>redundantAssignmentAlertIncident</code> events indicating unused PIM roles in Azure (see &ldquo;Roles Are Not Being Used&rdquo; rule).</li>
<li>Investigate all detected instances of unused PIM roles to determine the reason for inactivity and potential risks.</li>
<li>Revoke the assigned role if the user no longer requires it, or provide training and guidance to ensure proper role utilization.</li>
<li>Review and refine PIM role assignment policies to minimize the allocation of unnecessary privileges.</li>
<li>Implement regular audits of PIM role assignments to identify and address unused roles promptly.</li>
<li>Configure security alerts within Azure PIM to receive notifications about unused roles and other potential security incidents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privileged-identity-management</category><category>role-based-access-control</category><category>initial-access</category><category>privilege-escalation</category></item><item><title>Unauthorized Guest User Invitation Attempt in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</guid><description>Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.</description><content:encoded><![CDATA[<p>This alert detects instances where a user attempts to invite an external guest user to an Azure environment but fails due to insufficient permissions. This activity can signify several potential security risks, including unauthorized privilege escalation attempts by internal users or malicious insiders attempting to expand access without proper authorization. While legitimate failed attempts may occur, repeated or targeted failures should be investigated. The activity is logged within the Azure Audit Logs. Detecting this activity is crucial for maintaining control over user access and preventing potential data breaches. The relevant log data resides within Azure&rsquo;s audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal user (either compromised or malicious) attempts to invite an external guest user via the Azure portal or API.</li>
<li>The Azure Active Directory service checks the inviter&rsquo;s permissions against the organization&rsquo;s guest invitation policies.</li>
<li>The system determines the user lacks the necessary permissions to invite guest users.</li>
<li>Azure Audit Logs record the &ldquo;Invite external user&rdquo; event with a &ldquo;failure&rdquo; status.</li>
<li>The failed invitation attempt is blocked, preventing the external user from gaining access.</li>
<li>The attacker may retry the invitation with different accounts or methods, attempting to bypass access controls.</li>
<li>If successful through other means (not detected by this rule), the guest user could be used for lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation could grant unauthorized access to sensitive data and resources within the Azure environment. While this specific detection focuses on failed attempts, repeated failures may indicate a concerted effort to bypass security controls. If successful, unauthorized guest users could be used for lateral movement, data exfiltration, or other malicious activities. The number of affected resources depends on the permissions granted to the guest user if the invitation had been successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Guest User Invited By Non Approved Inviters&rdquo; to your SIEM to detect unauthorized invitation attempts within Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the invitation attempt and the intent of the user.</li>
<li>Review and enforce the principle of least privilege for user roles and permissions within Azure Active Directory.</li>
<li>Monitor for repeated failed invitation attempts from the same user account (correlate with the Azure Audit Logs data).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category><category>azure</category></item><item><title>Suspicious MS Office Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</guid><description>Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook), which are commonly targeted for initial access via malicious documents or macro exploitation. The rule focuses on identifying anomalous process executions originating from these applications, a tactic often employed to execute arbitrary code or download additional payloads. Attackers leverage Office applications due to their widespread use and inherent scripting capabilities. Successful exploitation can lead to arbitrary code execution, lateral movement, and data exfiltration. This detection helps defenders identify and respond to potential security breaches originating from Microsoft Office applications, reducing the attack surface and minimizing potential damage. The rule specifically looks for processes like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, <code>wscript.exe</code>, and others being spawned by Office applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious Microsoft Office document (e.g., Word, Excel) via email or downloads it from a compromised website.</li>
<li>The user opens the document, triggering the execution of a malicious macro or exploitation of a vulnerability within the Office application.</li>
<li>The Office application (e.g., <code>winword.exe</code>, <code>excel.exe</code>) spawns a suspicious child process such as <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The spawned process executes a command to download a malicious payload from a remote server using <code>bitsadmin.exe</code> or <code>certutil.exe</code>.</li>
<li>The downloaded payload is a reverse shell or a malware dropper, which establishes a connection to an attacker-controlled server.</li>
<li>The attacker gains initial access to the compromised system and attempts to escalate privileges and perform reconnaissance.</li>
<li>The attacker uses discovery commands with <code>net.exe</code>, <code>ipconfig.exe</code>, <code>tasklist.exe</code>, and <code>whoami.exe</code> to map the environment and identify valuable targets.</li>
<li>The attacker moves laterally to other systems within the network, aiming to compromise critical assets and achieve their objectives, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain initial access to the compromised system. This can result in data theft, installation of malware, lateral movement to other systems, and ultimately, significant disruption to business operations. The widespread use of Microsoft Office makes it a prime target, potentially affecting a large number of users and organizations. Failure to detect and respond to these attacks can result in significant financial losses, reputational damage, and compromise of sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Event Logs) to ensure the visibility required to detect suspicious child processes.</li>
<li>Deploy the Sigma rule <code>Suspicious MS Office Child Process</code> to your SIEM and tune the rule based on your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the <code>Suspicious MS Office Child Process</code> Sigma rule by examining the parent process tree and associated network connections.</li>
<li>Implement application control policies to restrict the execution of unauthorized processes from Microsoft Office applications.</li>
<li>Regularly update Microsoft Office applications to patch known vulnerabilities.</li>
<li>Block known malicious domains or IPs associated with malware delivery and command and control, based on threat intelligence feeds and IOCs from external sources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>discovery</category><category>windows</category></item><item><title>Suspicious HTML File Creation Leading to Potential Payload Delivery</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-html-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-html-creation/</guid><description>This detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious sequence of events indicative of HTML smuggling, where adversaries embed malicious payloads within seemingly benign HTML files to bypass security filters. The rule focuses on Windows systems and monitors for the creation of HTML files exhibiting characteristics such as high entropy (&gt;=5) and large size (&gt;=150,000 bytes) or very large size (&gt;=1,000,000 bytes) within common download and temporary directories (e.g., Downloads, Content.Outlook, AppData\Local\Temp). Subsequently, it tracks the execution of browser processes (e.g., chrome.exe, firefox.exe, iexplore.exe) opening these HTML files with specific command-line arguments (e.g., &ndash;single-argument, -url). The detection aims to uncover initial access attempts, defense evasion, and user execution of malicious files delivered through HTML smuggling techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious HTML attachment.</li>
<li>The user opens the attachment, triggering the download of a large HTML file to the Downloads folder.</li>
<li>The HTML file contains obfuscated JavaScript code that, when executed, reconstructs a malicious payload (e.g., a Cobalt Strike beacon).</li>
<li>The file is saved with an .htm or .html extension in a temporary or download directory.</li>
<li>A browser process (chrome.exe, firefox.exe, etc.) is initiated to open the HTML file, often with specific arguments like &ldquo;&ndash;single-argument&rdquo; or &ldquo;-url&rdquo;.</li>
<li>The browser renders the HTML, executing the embedded JavaScript.</li>
<li>The JavaScript deobfuscates and executes the smuggled payload, initiating a reverse shell connection to a command-and-control server.</li>
<li>The attacker gains initial access to the compromised system and can proceed with lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via HTML smuggling can lead to initial access to a targeted system, potentially enabling attackers to perform lateral movement, data exfiltration, or ransomware deployment. While the specific number of victims and targeted sectors are not explicitly stated in the source, the technique is broadly applicable and can affect any Windows user who interacts with malicious HTML attachments or downloads from untrusted sources. The consequences of successful exploitation range from data breaches and financial losses to reputational damage and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune the file path and browser process filters for your environment.</li>
<li>Enable file integrity monitoring (FIM) on common download and temporary directories to detect the creation of suspicious HTML files as described in the Sigma rules.</li>
<li>Implement network egress filtering to block connections to known malicious command-and-control servers and domains to prevent payload execution.</li>
<li>Educate users about the risks of opening attachments from untrusted sources and train them to recognize phishing emails as outlined in the Overview.</li>
<li>Utilize endpoint detection and response (EDR) solutions to monitor process execution and network connections for anomalous behavior associated with HTML smuggling.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>html-smuggling</category><category>phishing</category><category>initial-access</category><category>windows</category><category>evasion</category></item><item><title>Suspicious Execution from VS Code Extension</title><link>https://feed.craftedsignal.io/briefs/2024-01-vscode-extension-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vscode-extension-execution/</guid><description>Malicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.</description><content:encoded><![CDATA[<p>A malicious VS Code extension, configured to run upon editor startup, can execute arbitrary commands, potentially leading to the installation of remote access trojans (RATs) or other malicious payloads. The attack vector leverages the extension host under <code>.vscode/extensions/</code> to spawn processes such as script interpreters or download utilities. This activity has been observed in campaigns like the fake Clawdbot extension that installed ScreenConnect RAT. The execution can involve Living-off-the-Land binaries (LOLBins) or recently created executables from non-standard paths, posing a significant risk to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user installs a malicious VS Code extension.</li>
<li>The extension is configured with <code>activationEvents: [&quot;onStartupFinished&quot;]</code> to run automatically when VS Code starts.</li>
<li>The VS Code extension host (<code>Code.exe</code> or <code>node.exe</code>) spawns a script interpreter (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>) from within the <code>.vscode/extensions/</code> directory.</li>
<li>The script interpreter executes a command to download a malicious payload from a remote server using tools like <code>curl.exe</code>, <code>bitsadmin.exe</code>, or <code>mshta.exe</code>.</li>
<li>The downloaded payload is saved to disk, often in a temporary directory outside of Program Files.</li>
<li>The script interpreter executes the downloaded payload, leading to further malicious activity. For example, ScreenConnect might be installed.</li>
<li>Persistence mechanisms are established (e.g., via registry keys or scheduled tasks).</li>
<li>The attacker gains remote access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the complete compromise of a developer&rsquo;s workstation, potentially affecting intellectual property and sensitive data. The installation of RATs like ScreenConnect can enable persistent remote access, allowing attackers to perform data exfiltration, lateral movement, and further malicious activities. The compromised machine can then be used as a pivot point to attack other systems within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Suspicious Execution from VS Code Extension&rdquo; Sigma rule to your SIEM to detect malicious process execution from VS Code extensions.</li>
<li>Monitor process creation events for script interpreters and LOLBins spawned from the <code>.vscode/extensions/</code> directory.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables.</li>
<li>Regularly review and audit installed VS Code extensions for suspicious activity or unnecessary permissions.</li>
<li>Educate developers about the risks of installing extensions from untrusted sources.</li>
<li>Block the C2 domains associated with ScreenConnect and other RATs at the firewall/DNS resolver.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>execution</category><category>supply-chain-compromise</category><category>vscode</category></item><item><title>Execution from Removable Media with Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-removable-media-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-removable-media-execution/</guid><description>Detects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.</description><content:encoded><![CDATA[<p>This detection identifies potential initial access attempts where adversaries use removable media, such as USB drives, to introduce malware into systems, potentially those on disconnected or air-gapped networks. The attack relies on copying malware to the removable media and taking advantage of Autorun or user execution to initiate the malicious process. The rule focuses on identifying suspicious process executions from USB devices lacking valid code signatures, followed by network connection attempts, indicating a potential attempt to establish command and control or exfiltrate data. This activity is significant as it can bypass traditional network security measures and establish a foothold within an organization&rsquo;s environment. The detection logic is based on Elastic Defend telemetry.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker copies malware onto a USB drive from an infected system.</li>
<li>The attacker physically inserts the USB drive into a target Windows system.</li>
<li>The user, either unknowingly or through social engineering, executes the malicious binary from the USB drive. This could be achieved through Autorun features (if enabled) or by manually clicking on an executable file.</li>
<li>The executed process, now running on the target system, lacks a valid code signature, raising suspicion.</li>
<li>The malicious process attempts to establish a network connection, potentially to a command and control server or to exfiltrate data.</li>
<li>The network connection attempt is logged, capturing details about the destination IP address and port.</li>
<li>The attacker gains initial access to the system and can potentially perform reconnaissance, privilege escalation, or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, system compromise, and potential lateral movement within the network. Although the risk score is low, such attacks on air-gapped systems are high impact. The number of victims is unknown; however, organizations across all sectors are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation and network connection logging to detect this type of activity (logs-endpoint.events.process-* and logs-endpoint.events.network-*).</li>
<li>Deploy the Sigma rule &ldquo;Execution from a Removable Media with Network Connection&rdquo; to your SIEM and tune for your environment.</li>
<li>Disable Autorun features on all systems to prevent automatic execution of programs from removable media.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>removable-media</category><category>windows</category></item><item><title>Detection of Privileged Account Creation in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-privileged-account-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-privileged-account-creation/</guid><description>Detects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of new privileged account creation within Azure environments. Attackers often create new admin accounts to establish persistence, escalate privileges, or move laterally within a compromised environment. Monitoring for such activity is crucial, especially given that compromised accounts are a common entry point for various attacks. This activity, if malicious, can lead to significant data breaches, service disruptions, and reputational damage. This detection focuses on identifying &ldquo;Add user&rdquo; and &ldquo;Add member to role&rdquo; events within Azure audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure environment, possibly through compromised credentials (T1078.004).</li>
<li>The attacker leverages their access to enumerate existing accounts and roles within the Azure Active Directory.</li>
<li>The attacker attempts to create a new user account with elevated privileges, such as Global Administrator or other custom administrative roles.</li>
<li>The attacker assigns the newly created user account to one or more privileged roles, granting it administrative access to the Azure environment. This action is logged as &ldquo;Add member to role&rdquo;.</li>
<li>The attacker uses the newly created privileged account to perform reconnaissance, identify sensitive data, or deploy malicious applications.</li>
<li>The attacker establishes persistence by maintaining access through the newly created account, even if the initial entry point is detected and remediated.</li>
<li>The attacker escalates privileges to gain control over critical resources and services within the Azure environment.</li>
<li>The attacker uses the privileged account to exfiltrate sensitive data, deploy ransomware, or disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation of a privileged account can provide an attacker with persistent access and the ability to escalate privileges, leading to widespread damage. The attacker can gain control over critical resources, exfiltrate sensitive data, deploy ransomware, or disrupt business operations. This can lead to significant financial losses, reputational damage, and legal liabilities. While the scope and number of victims are unknown, all organizations using Azure Active Directory are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect privileged account creation events within Azure Audit Logs.</li>
<li>Investigate any detected instances of privileged account creation to determine whether the activity is legitimate.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with privileged roles, to mitigate the risk of credential compromise (T1110).</li>
<li>Regularly review and audit user account privileges to identify and remove unnecessary or excessive permissions.</li>
<li>Monitor Azure Audit Logs for suspicious activities, such as unusual sign-in attempts, changes to security settings, and modifications to privileged roles.</li>
<li>Implement alerting for changes to privileged roles and groups within Azure AD.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>privileged-account</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Azure Subscription Permission Elevation via Activity Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-subscription-elevation/</guid><description>An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.</description><content:encoded><![CDATA[<p>This threat involves the elevation of user permissions within an Azure environment to manage all Azure subscriptions. While legitimate administrators may perform this action, unauthorized elevation of permissions can grant an attacker significant control over the entire Azure environment. This could be an insider threat or a compromised account being used to broaden access. The activity is logged within Azure Activity Logs, providing an opportunity for detection. Defenders should be aware of this potential escalation path and monitor for unexpected or unauthorized permission changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account, potentially through compromised credentials (T1078.004).</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI/PowerShell with the compromised account.</li>
<li>The attacker attempts to elevate their permissions using the <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operation.</li>
<li>Azure Activity Logs record the attempt to elevate permissions.</li>
<li>If successful, the attacker gains management access to all Azure subscriptions within the tenant.</li>
<li>The attacker can then provision resources, modify configurations, and access data within those subscriptions.</li>
<li>The attacker might establish persistence by creating new user accounts with elevated privileges or modifying existing roles.</li>
<li>The attacker can then exfiltrate sensitive data or disrupt services within the Azure environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful elevation of permissions to manage all Azure subscriptions allows an attacker to control all resources, data, and configurations within the Azure environment. This can lead to data breaches, service disruptions, financial loss, and reputational damage. The scope of impact depends on the sensitivity of the data stored within Azure and the criticality of the services hosted there.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> operations in Azure Activity Logs.</li>
<li>Investigate any detected instances of <code>MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION</code> immediately, as outlined in the rule description.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts to reduce the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for Azure role assignments.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource creation or modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category></item><item><title>AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-assume-role-external-asn/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-assume-role-external-asn/</guid><description>Detects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of successful AWS <code>AssumeRoleWithWebIdentity</code> calls originating from a Kubernetes service account but not from an Amazon-managed Autonomous System Number (ASN). The primary concern is the potential compromise or misuse of projected service account tokens. Kubernetes service accounts can be mapped to IAM roles through OIDC using IRSA (IAM Roles for Service Accounts). Typically, these credential requests originate from within AWS-managed or associated networks. However, if a request with a Kubernetes service account identity originates from an external ASN (i.e., not <code>Amazon.com, Inc.</code>), it raises suspicion that the token might have been exfiltrated and is being used from an unauthorized location. This rule is designed to highlight such anomalies, prompting further investigation into possible token theft or misconfiguration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to a Kubernetes service account token within a compromised pod or through other means.</li>
<li>Attacker exfiltrates the service account token from the Kubernetes cluster.</li>
<li>The attacker uses the exfiltrated token to call the AWS STS <code>AssumeRoleWithWebIdentity</code> API.</li>
<li>The <code>AssumeRoleWithWebIdentity</code> call is made from a network with an ASN organization name that is not <code>Amazon.com, Inc.</code>.</li>
<li>AWS CloudTrail logs the successful <code>AssumeRoleWithWebIdentity</code> event, including details about the user, source IP, and ASN organization.</li>
<li>The compromised IAM role is used to perform unauthorized actions within the AWS environment.</li>
<li>These actions could include data exfiltration, resource modification, or further lateral movement within the cloud infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to significant security breaches within an AWS environment. An attacker leveraging stolen service account tokens can gain unauthorized access to sensitive resources, leading to data breaches, service disruption, or financial loss. This is especially concerning for organizations heavily reliant on Kubernetes and AWS, as it can undermine the security of their cloud-native applications and infrastructure. While the number of affected organizations is unknown, the potential impact on those targeted can be severe, leading to substantial remediation costs and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by following the investigation steps in the rule&rsquo;s <code>note</code> field.</li>
<li>Expand the <code>source.as.organization.name</code> exclusions in the Sigma rule for known and trusted egress paths if needed.</li>
<li>Enable geolocation/ASN enrichment for your AWS CloudTrail logs to accurately identify the source of <code>AssumeRoleWithWebIdentity</code> calls.</li>
<li>Regularly review and rotate IRSA trust relationships to minimize the impact of compromised service account tokens.</li>
<li>Revoke the role session, rotate IRSA trust where appropriate, investigate token exposure, and reduce service account and role permissions if unauthorized access is suspected.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>iam</category><category>kubernetes</category><category>initial-access</category><category>web-identity</category></item><item><title>Azure AD Account Created and Deleted Within a Close Time Frame</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-short-lived-account/</guid><description>Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.</description><content:encoded><![CDATA[<p>The creation and immediate deletion of user accounts within Azure Active Directory can be indicative of various malicious activities. Attackers may create accounts to escalate privileges, establish persistence, or gain initial access to a system. The short lifespan of these accounts suggests an attempt to evade detection. This behavior is particularly concerning as it can be used to perform actions and then quickly remove the evidence of the account&rsquo;s existence from standard audit logs. Monitoring for this activity helps defenders identify and respond to potential security breaches within their Azure environment. This technique is relevant for any organization utilizing Azure Active Directory for user management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD environment, potentially through compromised credentials or a phishing attack.</li>
<li>The attacker creates a new user account within the Azure AD. This can be achieved through the Azure portal, PowerShell, or the Azure CLI.</li>
<li>The attacker assigns elevated privileges to the newly created account. This might involve adding the account to privileged roles such as Global Administrator or assigning specific permissions to access sensitive resources.</li>
<li>The attacker uses the newly created account to perform malicious activities, such as accessing confidential data, modifying system configurations, or deploying malicious applications.</li>
<li>After completing the malicious tasks, the attacker removes the elevated privileges from the account to reduce the chances of detection during privilege reviews.</li>
<li>The attacker deletes the created account from Azure AD. This step is performed to remove the traces of the account&rsquo;s existence and hinder forensic investigations.</li>
<li>The actions performed by the short-lived account may leave other traces in logs, such as access logs or activity logs related to the resources the account interacted with.</li>
<li>The attacker aims to maintain stealth and evade detection while gaining unauthorized access to resources or establishing persistence within the Azure AD environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive resources, data breaches, and system compromise. The creation and deletion of short-lived accounts can mask malicious activities, making it difficult to trace the attacker&rsquo;s actions. Organizations using Azure AD could experience data exfiltration, financial loss, and reputational damage. Detecting such activity early is critical to preventing further damage and mitigating the impact of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to your SIEM and tune for your environment to detect suspicious account creation/deletion events in Azure AD audit logs.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Account Created And Deleted Within A Close Time Frame&rdquo; to determine the scope and impact of the potential compromise.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with elevated privileges, to reduce the risk of credential compromise (reference: attack.initial-access).</li>
<li>Regularly review Azure AD audit logs for unusual account activity, focusing on accounts created and deleted within a short timeframe (logsource: azure, service: auditlogs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category><category>stealth</category><category>account-manipulation</category></item><item><title>AWS Root Account Usage Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</link><pubDate>Tue, 02 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-aws-root-usage/</guid><description>The AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.</description><content:encoded><![CDATA[<p>The use of the AWS root account should be strictly limited to specific tasks that cannot be performed with IAM users or roles. This alert indicates that the root account was used, which could signify various security concerns. An attacker with access to the root account can perform any action within the AWS environment, including creating new users, modifying security policies, accessing sensitive data, and deleting resources. Defenders should investigate each instance of root account usage to determine legitimacy. This activity may also indicate a misconfiguration where IAM roles should be used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the AWS root account credentials through credential theft or other means.</li>
<li>The attacker authenticates to the AWS Management Console or uses the AWS CLI with the root account credentials.</li>
<li>The attacker enumerates AWS resources to identify potential targets for privilege escalation.</li>
<li>The attacker creates or modifies IAM policies to grant themselves additional permissions.</li>
<li>The attacker may create new IAM users or roles with elevated privileges.</li>
<li>The attacker uses the elevated privileges to access sensitive data stored in S3 buckets or other AWS services.</li>
<li>The attacker modifies security configurations, such as network access control lists or security groups, to facilitate lateral movement or data exfiltration.</li>
<li>The attacker could disable logging features to cover tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the AWS root account can lead to a complete breach of the AWS environment, resulting in unauthorized access to sensitive data, data loss, service disruption, and potential financial losses. Attackers can leverage root privileges to perform nearly any action within the AWS account, affecting all services and resources. The number of affected victims depends on the scope and criticality of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Root Credentials&rdquo; to your SIEM to detect root account usage based on CloudTrail logs.</li>
<li>Investigate all instances of root account usage identified by the &ldquo;AWS Root Credentials&rdquo; Sigma rule to determine legitimacy.</li>
<li>Enforce multi-factor authentication (MFA) on all AWS accounts, including the root account, as documented in <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html">AWS documentation</a>.</li>
<li>Implement the principle of least privilege by granting IAM users and roles only the permissions they need to perform their tasks.</li>
<li>Regularly audit IAM policies and user permissions to identify and remove unnecessary privileges.</li>
<li>Disable or restrict root account access wherever possible, delegating tasks to IAM users/roles.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category></item><item><title>SMB (Windows File Sharing) Activity to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</link><pubDate>Tue, 02 Jan 2024 14:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</guid><description>This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.</description><content:encoded><![CDATA[<p>The provided Elastic rule identifies instances of Server Message Block (SMB), also known as Windows File Sharing, being transmitted to external IP addresses. SMB is intended for internal network communication for file, printer, and resource sharing. Exposing SMB to the internet presents a significant security risk. Threat actors frequently target and exploit SMB for initial access, deploying backdoors, or exfiltrating sensitive data. This activity warrants immediate investigation as it violates best practices and poses a direct threat to network security. The rule focuses on traffic on TCP ports 139 and 445, originating from internal IP ranges and destined for external IPs, excluding known safe IP ranges, as defined by IANA. The rule was last updated April 24, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised, often through phishing or other social engineering techniques.</li>
<li>The compromised host attempts to establish an SMB connection to an external IP address on TCP ports 139 or 445.</li>
<li>The attacker leverages the SMB protocol to attempt authentication, potentially exploiting vulnerabilities like credential stuffing or known SMB exploits.</li>
<li>Upon successful authentication or exploitation, the attacker gains unauthorized access to shared resources or system services on the external system.</li>
<li>The attacker may upload malicious payloads, such as malware or backdoors, via the SMB connection to the external host.</li>
<li>The attacker uses the SMB protocol to exfiltrate sensitive data from the internal network to the external system.</li>
<li>The attacker maintains persistence on the compromised internal host, using SMB for command and control or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising SMB services can lead to significant data breaches, system compromise, and potential ransomware deployment. Exposed SMB services allow attackers to gain unauthorized access to sensitive files, critical infrastructure, and internal network resources. Successful exploitation can result in complete system takeover, data exfiltration, and disruption of business operations. While the exact number of victims is unknown, the prevalence of SMB vulnerabilities and misconfigurations suggests a widespread risk across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect SMB traffic to the internet and tune for your environment.</li>
<li>Review firewall and network configurations to ensure SMB traffic is not allowed to the Internet, and block any unauthorized outbound SMB traffic on ports 139 and 445, as identified by the rule description.</li>
<li>Investigate the source IP addresses triggering the rule, identifying internal systems initiating SMB traffic and determining if they belong to known devices or users within the organization, as described in the provided investigation guide.</li>
<li>Regularly audit network configurations and update the rule exceptions to include any legitimate device IPs to prevent false positives, as mentioned in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>network</category></item><item><title>First Time Seen Removable Device Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-usb/</guid><description>Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.</description><content:encoded><![CDATA[<p>This detection identifies the first-time appearance of removable devices on a Windows system by monitoring registry modifications. While not inherently malicious, the activity can indicate potential data exfiltration over removable media or initial access attempts using malware delivered via USB. The rule specifically looks for registry events with the &ldquo;FriendlyName&rdquo; value associated with USB storage devices (&ldquo;USBSTOR&rdquo;). This helps in identifying potentially unauthorized devices connected to the system. The detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user connects a removable device (e.g., USB drive) to a Windows system.</li>
<li>The operating system detects the new device and attempts to enumerate its properties.</li>
<li>The system queries the registry for device-specific settings, including the &ldquo;FriendlyName,&rdquo; under the <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR</code> key.</li>
<li>If the device is new to the system, the registry is modified to record the device&rsquo;s information, including its friendly name.</li>
<li>The event generates a registry modification event, which is logged by Sysmon, Elastic Defend, Microsoft Defender XDR, or SentinelOne.</li>
<li>An attacker may use the USB device to deploy malware or exfiltrate sensitive data.</li>
<li>The attacker copies files to the USB device.</li>
<li>The attacker removes the USB device, completing the exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and data exfiltration via USB can lead to the loss of sensitive information, intellectual property theft, or the introduction of malware into the network. Although this alert is low severity, multiple alerts across the environment may indicate an active campaign. The detection focuses on registry modifications, which are early indicators of device connection, allowing for proactive monitoring and response.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect registry modifications related to USB devices and activate the Sigma rules below.</li>
<li>Deploy the Sigma rules provided to your SIEM to detect and monitor first-time seen USB devices.</li>
<li>Investigate any alerts generated by the Sigma rules, correlating with user activity and file access events.</li>
<li>Maintain a list of approved USB devices and create exceptions for them in the monitoring system to reduce false positives as described in the rule documentation.</li>
<li>Monitor for subsequent file access or transfer events involving the new device as described in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>windows</category><category>registry</category><category>usb</category></item><item><title>Unauthorized Guest User Invitations in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-azuread-guest-invite/</guid><description>Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.</description><content:encoded><![CDATA[<p>This alert focuses on detecting the invitation of guest users to an Azure Active Directory (AD) tenant by accounts that are not pre-approved to perform this action. Unauthorized guest user invitations can be an indicator of various malicious activities. An attacker could be attempting to escalate privileges by adding an account they control, establish persistence by creating a backdoor account, or gain initial access to the environment. This activity might be part of a broader attack aimed at gaining unauthorized access to sensitive resources or data within the organization&rsquo;s Azure environment. It is important to ensure that only authorized personnel can invite external users to maintain security and prevent potential abuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a low-privilege user account within the Azure AD tenant or uses existing compromised credentials.</li>
<li>The attacker attempts to invite an external guest user to the tenant using the compromised account.</li>
<li>The Azure AD audit logs record the &ldquo;Invite external user&rdquo; operation under the UserManagement category.</li>
<li>The audit log event is generated, capturing details such as the user who initiated the invitation (InitiatedBy) and the target guest user&rsquo;s information.</li>
<li>The detection logic evaluates if the InitiatedBy user is within the list of approved guest inviters.</li>
<li>If the inviting user is not on the approved list, the detection rule triggers, indicating a potentially unauthorized guest invitation.</li>
<li>The attacker may then attempt to leverage the newly invited guest account for lateral movement or data exfiltration.</li>
<li>The attacker uses the guest account to access resources and data within the Azure AD environment, potentially leading to data breaches or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this vulnerability can lead to unauthorized access to sensitive data and resources within the Azure AD tenant. While the precise number of potential victims is unknown, the impact could range from a limited breach affecting a small set of resources to a widespread compromise impacting the entire organization. The addition of unauthorized guest accounts can facilitate lateral movement, data exfiltration, and other malicious activities, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unauthorized guest user invitations in Azure AD audit logs and tune the <code>filter</code> with a list of approved inviters.</li>
<li>Review and restrict the number of users authorized to invite guest users to the Azure AD tenant based on business needs.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, including guest accounts, to prevent unauthorized access (related to audit logs).</li>
<li>Regularly audit Azure AD logs for any suspicious activity related to user management (related to audit logs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azuread</category><category>guest-user</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category></item><item><title>Suspicious Explorer Child Process via DCOM</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-explorer-child-process/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-explorer-child-process/</guid><description>Adversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>Attackers frequently exploit Windows Explorer (explorer.exe) to execute malicious code due to its inherent trust within the operating system. This involves spawning child processes such as PowerShell, cmd.exe, or other scripting engines via Component Object Model (COM) and Distributed Component Object Model (DCOM). This technique enables attackers to bypass security controls, blending malicious activity with legitimate system processes. The detection rule identifies such anomalies by monitoring child processes of Explorer with specific characteristics, excluding known benign activities, to flag potential threats. This activity is frequently associated with initial access and execution of follow-on malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an initial access vector such as spearphishing (T1566).</li>
<li>A user clicks a malicious link or opens an attachment, leading to code execution.</li>
<li>The initial payload exploits explorer.exe through DCOM using the -Embedding argument.</li>
<li>Explorer.exe spawns a child process such as powershell.exe, cmd.exe, or mshta.exe (T1059, T1218).</li>
<li>The spawned process executes malicious commands or scripts.</li>
<li>These commands might download or execute additional payloads.</li>
<li>The attacker achieves code execution, potentially gaining persistence on the system.</li>
<li>The ultimate objective is often lateral movement, data exfiltration, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within a trusted process context, bypassing application whitelisting and other security controls. This can lead to initial access, privilege escalation, and persistence within the compromised system. The compromise can remain undetected for extended periods due to the trusted nature of the parent process (explorer.exe), enabling attackers to perform reconnaissance, deploy malware, exfiltrate data, or disrupt services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to detect suspicious explorer.exe child processes.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Explorer Child Process - PowerShell&rdquo; to identify instances of PowerShell spawned by explorer.exe with suspicious arguments.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Explorer Child Process - Scripting Engines&rdquo; to detect other scripting engines launched by explorer.exe.</li>
<li>Monitor process execution events for processes like powershell.exe, cmd.exe, cscript.exe, wscript.exe, mshta.exe, regsvr32.exe, and rundll32.exe with a parent process of explorer.exe and the argument &ldquo;-Embedding&rdquo; via process creation logs.</li>
<li>Implement application control policies to restrict execution of unsigned or untrusted scripts and executables.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>explorer.exe</category><category>dcom</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item><item><title>Detection of Office Macro File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</guid><description>This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.</description><content:encoded><![CDATA[<p>The creation of Office macro files (.docm, .xlsm, .pptm, etc.) can be an indicator of malicious activity, often linked to initial access attempts such as phishing campaigns or malware distribution. Attackers frequently embed malicious macros within these files to execute arbitrary code on a victim&rsquo;s machine upon opening the document and enabling macros. While legitimate use cases for macro-enabled documents exist, their creation should be monitored, especially when originating from unusual processes or locations. This activity is related to the technique T1566.001 (Phishing: Spearphishing Attachment). Defenders need to monitor file creation events for specific Office macro extensions, filtering out common false positives to identify potential threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Office document (e.g., .docm, .xlsm) containing a VBA macro.</li>
<li>The attacker sends the malicious document as an attachment via email (spearphishing).</li>
<li>The user receives the email and opens the attached Office document.</li>
<li>The user is prompted to enable macros within the document.</li>
<li>If the user enables macros, the embedded VBA code executes.</li>
<li>The VBA code may execute PowerShell or other scripting languages to download a malicious payload.</li>
<li>The downloaded payload is saved to disk (e.g., in the user&rsquo;s temp directory).</li>
<li>The payload executes, establishing persistence or performing other malicious actions, such as ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, malware installation, data exfiltration, and potentially complete system compromise. The impact can range from individual user infection to widespread organizational damage, depending on the attacker&rsquo;s objectives and the level of access gained. In a widespread attack, numerous systems could be infected, leading to significant downtime, data loss, and financial repercussions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Macro File Creation</code> to your SIEM to detect the creation of suspicious Office macro files (logsource: file_event/windows).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes of the file creation event.</li>
<li>Implement user awareness training to educate employees about the risks of opening unsolicited attachments and enabling macros.</li>
<li>Enable Sysmon file creation logging to capture the necessary events for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>phishing</category><category>macro</category></item><item><title>Azure Domain Federation Settings Modified</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-federation-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-federation-modification/</guid><description>An attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.</description><content:encoded><![CDATA[<p>Attackers can modify federation settings on Azure domains to gain unauthorized access and establish persistence. This involves manipulating the trust relationships between the Azure Active Directory and external identity providers. By altering these settings, an attacker can potentially bypass normal authentication mechanisms, assume identities, and maintain a foothold within the environment. This activity is typically carried out by users or applications with administrative privileges, making it crucial to monitor and validate any changes made to the federation settings. Detecting such modifications can be challenging due to the legitimate use of these settings by system administrators. This activity falls under tactics such as privilege escalation, persistence, initial access, and stealth.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to manage Azure Active Directory settings, such as a Global Administrator or Privileged Role Administrator.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell/CLI to interact with Azure resources.</li>
<li>The attacker enumerates existing domain federation settings to understand the current configuration and identify potential targets for modification.</li>
<li>The attacker modifies the federation settings on the domain using commands like <code>Set-MsolDomainFederationSettings</code> or through the Azure portal interface. This may involve altering the trusted certificate, changing the issuer URI, or modifying other federation parameters.</li>
<li>The attacker tests the modified federation settings to ensure they can successfully authenticate using the altered configuration.</li>
<li>The attacker leverages the modified federation settings to impersonate users or applications, gaining unauthorized access to protected resources and services.</li>
<li>The attacker establishes persistence by creating backdoors or alternate authentication methods using the modified federation settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Azure domain federation settings can lead to significant consequences, including unauthorized access to sensitive data, privilege escalation, and long-term persistence within the Azure environment. Attackers could potentially compromise entire domains, impacting all users and applications relying on the affected Azure Active Directory. This can result in data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;Azure Domain Federation Settings Modified&rdquo; to detect suspicious modifications to federation settings in Azure audit logs.</li>
<li>Regularly review and validate changes to Azure domain federation settings, focusing on unfamiliar users and unexpected modifications.</li>
<li>Monitor Azure audit logs for the &ldquo;Set federation settings on domain&rdquo; event to identify potential tampering.</li>
<li>Enforce multi-factor authentication (MFA) for all accounts with administrative privileges to reduce the risk of unauthorized access.</li>
<li>Implement the principle of least privilege, granting users only the necessary permissions to perform their tasks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>federation</category><category>privilege-escalation</category><category>persistence</category><category>initial-access</category></item><item><title>Suspicious MS Outlook Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-outlook-child-process/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-outlook-child-process/</guid><description>Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes of Microsoft Outlook, often associated with spear phishing activity and the execution of malicious attachments. Attackers may leverage malicious documents delivered via email to execute arbitrary code on a victim&rsquo;s machine. The rule focuses on identifying processes such as <code>cmd.exe</code>, <code>powershell.exe</code>, and other system binaries being spawned by Outlook, suggesting the potential execution of malicious attachments or exploitation for initial access. This activity is designed to bypass traditional security measures and gain an initial foothold within the targeted environment. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a spear phishing email with a malicious attachment (e.g., a Microsoft Office document or PDF).</li>
<li>The user opens the attachment, unknowingly triggering embedded malicious code (e.g., macros or exploits).</li>
<li>The malicious code executes within the context of Microsoft Outlook (outlook.exe).</li>
<li>The malicious code spawns a suspicious child process, such as <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, or <code>wscript.exe</code>.</li>
<li>The spawned process executes commands to download and execute further malicious payloads from external sources.</li>
<li>The downloaded payload establishes persistence on the compromised system.</li>
<li>The attacker gains initial access and begins reconnaissance activities.</li>
<li>The attacker moves laterally within the network, escalating privileges and compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to initial access, allowing attackers to gain a foothold within the network, escalate privileges, and potentially exfiltrate sensitive data, deploy ransomware, or conduct other malicious activities. While specific victim counts and sectors are unavailable, similar attacks have targeted a wide range of industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious MS Outlook Child Process Spawning Command Interpreter&rdquo; to your SIEM to detect potential initial access attempts (see rule below).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rules.</li>
<li>Block the execution of commonly abused system binaries (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>, <code>wscript.exe</code>) as child processes of Outlook using application control policies where possible.</li>
<li>Implement and enforce strict macro policies in Microsoft Office applications to prevent the execution of malicious code within documents.</li>
<li>Regularly review and update email security policies to prevent spear phishing emails from reaching users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>phishing</category><category>malware</category><category>windows</category></item></channel></rss>