<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Intrusion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/intrusion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 00:48:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/intrusion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Google Workspace Login Attempt with Government Attack Warning</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</link><pubDate>Tue, 28 Apr 2026 00:48:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</guid><description>A Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.</description><content:encoded><![CDATA[<p>This alert focuses on identifying potentially malicious login attempts within Google Workspace environments. The detection is based on Google&rsquo;s own flagging of a login as a potential &ldquo;gov_attack_warning,&rdquo; suggesting that Google&rsquo;s threat intelligence attributes the activity to a government-backed actor. While specific targeting information is unavailable, this alert highlights a critical area for investigation within organizations utilizing Google Workspace, especially those handling sensitive data or operating in sectors of interest to nation-state actors. This detection provides an early warning of potential compromise or data exfiltration attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker attempts to log into a Google Workspace account using compromised or brute-forced credentials.</li>
<li><strong>Login Attempt:</strong> The login attempt triggers a &ldquo;gov_attack_warning&rdquo; within Google Workspace, indicating a potential government-backed threat actor.</li>
<li><strong>Privilege Escalation (Potential):</strong> If the compromised account has elevated privileges, the attacker may attempt to escalate privileges within the Google Workspace environment.</li>
<li><strong>Defense Evasion (Potential):</strong> The attacker may attempt to disable security features or modify audit logs to evade detection.</li>
<li><strong>Persistence (Potential):</strong> The attacker may establish persistent access through methods such as creating rogue apps or modifying account settings.</li>
<li><strong>Data Access:</strong> The attacker gains access to sensitive data stored within Google Workspace, such as documents, emails, and files.</li>
<li><strong>Exfiltration (Potential):</strong> The attacker exfiltrates the stolen data to an external location.</li>
<li><strong>Impact:</strong> The organization suffers a data breach, reputational damage, and potential financial losses.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to the compromise of sensitive data within the Google Workspace environment, including confidential documents, emails, and other business-critical information. The potential consequences range from reputational damage and legal liabilities to financial losses and disruption of business operations. The number of affected users and the severity of the impact will depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;gov_attack_warning&rdquo; events in Google Workspace logs.</li>
<li>Investigate any triggered alerts promptly, focusing on the affected user account and associated activity.</li>
<li>Review the Google Workspace audit logs for any suspicious activity leading up to the &ldquo;gov_attack_warning&rdquo; event.</li>
<li>Implement multi-factor authentication (MFA) for all Google Workspace accounts, especially those with elevated privileges.</li>
<li>Monitor Google Workspace activity logs for suspicious patterns, such as unusual login locations, failed login attempts, and changes to account settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>googleworkspace</category><category>intrusion</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>OpenCanary Telnet Login Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-10-opencanary-telnet-login/</link><pubDate>Sat, 26 Oct 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-opencanary-telnet-login/</guid><description>The OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.</description><content:encoded><![CDATA[<p>OpenCanary is a low-interaction honeypot designed to detect attackers on a network. This detection focuses on Telnet login attempts, a protocol rarely used legitimately in modern networks and thus a strong indicator of malicious activity. When an attacker attempts to log into a Telnet service on an OpenCanary node, it triggers this alert. This provides early warning of potential intrusion attempts, reconnaissance activities, or lateral movement by attackers who have already gained a foothold. The detection is based on OpenCanary&rsquo;s logging functionality which records such login attempts, generating a log event with code 6001. This event signifies an attacker interacting with the Telnet service, which is unlikely in a well-secured and properly configured environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker scans the network for open ports, identifying a Telnet service.</li>
<li>Attacker attempts to connect to the Telnet service on the OpenCanary node.</li>
<li>Attacker enters credentials (username and password) in an attempt to authenticate.</li>
<li>OpenCanary logs the Telnet login attempt, generating an event with logtype 6001.</li>
<li>The detection rule triggers based on the OpenCanary log event.</li>
<li>Security team investigates the alert to determine the source and intent of the Telnet login attempt.</li>
<li>If the attempt is malicious, the security team takes steps to block the attacker and prevent further access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Telnet login could provide an attacker with unauthorized access to the network or specific systems. While Telnet itself may not grant immediate access to sensitive data, it can be used as a stepping stone for further exploitation and lateral movement. The compromise of even a single system can lead to data breaches, ransomware deployment, and significant disruption of services. OpenCanary serves as an early warning system, allowing defenders to identify and respond to such attempts before significant damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>OpenCanary - Telnet Login Attempt</code> to your SIEM to detect unauthorized Telnet login attempts.</li>
<li>Investigate any alerts generated by the <code>OpenCanary - Telnet Login Attempt</code> rule to determine the source and intent of the connection.</li>
<li>Review the OpenCanary configuration to ensure it is properly deployed and monitoring the appropriate network segments.</li>
<li>Consider disabling the Telnet service on all legitimate systems on the network to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>telnet</category><category>reconnaissance</category><category>intrusion</category><category>opencanary</category></item></channel></rss>