<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/malware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:43:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/malware/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious mysten-metrics Crate Exfiltrates Build Machine Data</title><link>https://feed.craftedsignal.io/briefs/2026-05-mysten-metrics-exfiltration/</link><pubDate>Mon, 04 May 2026 21:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mysten-metrics-exfiltration/</guid><description>The `mysten-metrics` crate was removed from crates.io after it was found to contain a malicious build script that attempted to exfiltrate data from the build machine during the build process.</description><content:encoded><![CDATA[<p>On April 20, 2026, a malicious crate named <code>mysten-metrics</code> was published to crates.io. This crate contained a build script designed to exfiltrate data from the machine during the build process. The crate was identified and removed from crates.io. At the time of removal, only one version of the crate had been published, and there was no evidence of actual usage. The crate had no dependencies on crates.io, limiting the potential spread. This incident highlights the risks associated with supply chain attacks targeting software build processes and the importance of verifying the integrity of third-party dependencies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker publishes the <code>mysten-metrics</code> crate to crates.io.</li>
<li>A developer adds <code>mysten-metrics</code> as a dependency to their project.</li>
<li>The developer builds the project using <code>cargo build</code>.</li>
<li>As part of the build process, the malicious build script within <code>mysten-metrics</code> is executed.</li>
<li>The build script collects sensitive data from the build environment (e.g., environment variables, file contents, system information).</li>
<li>The build script attempts to exfiltrate the collected data to a remote attacker-controlled server. The exact exfiltration method is not specified, but could involve HTTP/S requests or DNS tunneling.</li>
<li>The attacker receives the exfiltrated data from the compromised build machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful execution of the malicious build script could lead to the exposure of sensitive information, including API keys, credentials, source code, and other confidential data present on the build machine. This data could be used to compromise the developer&rsquo;s infrastructure, intellectual property, and customer data. Since there were no known usages, the impact was contained by its early removal.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement integrity checks for all third-party dependencies to identify and prevent the use of malicious packages.</li>
<li>Monitor network connections originating from build processes for suspicious outbound traffic, as this could indicate data exfiltration. Create network connection rules.</li>
<li>Implement file integrity monitoring on build machines to detect unauthorized modifications to files during the build process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>rust</category></item><item><title>Malicious sui-execution-cut Crate Exfiltrates Build Machine Data</title><link>https://feed.craftedsignal.io/briefs/2026-05-sui-execution-cut-exfiltration/</link><pubDate>Mon, 04 May 2026 21:42:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sui-execution-cut-exfiltration/</guid><description>The `sui-execution-cut` crate on crates.io contained a build script designed to exfiltrate data from the build machine during the build process.</description><content:encoded><![CDATA[<p>On April 20, 2026, a malicious crate named <code>sui-execution-cut</code> was published to crates.io. This crate included a build script that, when executed, attempted to exfiltrate data from the machine on which the crate was being built. The crate had no dependencies and only one version was ever published. The malicious package was quickly removed from crates.io after discovery. While the crate was available for a short period, there is no evidence of actual usage, however, supply chain compromises can have a wide impact if successful, and even this low-usage crate warrants monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer adds the malicious <code>sui-execution-cut</code> crate as a dependency to their Rust project.</li>
<li>During the build process, the <code>cargo</code> build system executes the build script embedded within the <code>sui-execution-cut</code> crate.</li>
<li>The build script executes a series of commands designed to gather sensitive information from the build environment.</li>
<li>The script establishes an outbound network connection to a remote server controlled by the attacker.</li>
<li>The gathered data is transmitted to the attacker&rsquo;s server via HTTP POST or a similar method.</li>
<li>The attacker receives the exfiltrated data, which could include environment variables, file contents, or other sensitive information.</li>
<li>The attacker analyzes the stolen data for valuable secrets, credentials, or intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The <code>sui-execution-cut</code> crate, if used, could have compromised developer machines by exfiltrating sensitive data during the build process. Although the crate was quickly removed and showed no signs of usage, a successful attack of this nature could lead to the exposure of secrets, credentials, and intellectual property. The lack of usage limits the impact, but the nature of supply chain attacks makes even low-usage crates a potential risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected network connections originating from build processes, especially connections to unknown or suspicious domains. Use the &ldquo;Detect Suspicious Outbound Connections from Build Processes&rdquo; Sigma rule.</li>
<li>Implement strict dependency review processes to identify and prevent the introduction of malicious packages into your software supply chain.</li>
<li>Continuously monitor crates.io and other package repositories for reports of malicious packages and promptly remove them from your dependencies if identified.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>rust</category></item><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Malware Distribution via Hugging Face and ClawHub</title><link>https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</link><pubDate>Fri, 01 May 2026 08:41:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</guid><description>Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.</description><content:encoded><![CDATA[<p>Threat actors are leveraging AI distribution platforms like Hugging Face and ClawHub to distribute malware. This involves social engineering tactics to deceive users into downloading files that contain malicious code. Instead of directly compromising AI agents, the attackers abuse user trust by injecting indirect prompts into resources that the AI accesses. Acronis reported that on ClawHub, nearly 600 malicious skills across 13 developer accounts were identified distributing trojans, cryptominers, and information stealers targeting both Windows and macOS. On Hugging Face, attackers created repositories hosting malicious files designed to stage multi-step infection chains leading to infostealers, trojans, malware loaders, and other types of malware targeting Windows, Linux, and Android. This tactic allows attackers to bypass traditional security measures and leverage the platforms&rsquo; reputation for trusted AI tooling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious repository or skill on Hugging Face or ClawHub.</li>
<li>The repository or skill contains files that appear legitimate but include malicious code.</li>
<li>The attacker uses social engineering to entice users to download the files.</li>
<li>Upon execution, the malicious code fetches additional payloads from external sources.</li>
<li>For macOS, the payload can be Atomic macOS Stealer (AMOS) Stealer.</li>
<li>The downloaded payload executes commands to install hidden dependencies.</li>
<li>The malware establishes persistence on the victim&rsquo;s system.</li>
<li>The malware performs its intended malicious actions, such as stealing information or mining cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to the installation of various types of malware, including infostealers, trojans, cryptominers, and malware loaders. The targeted platforms include Windows, macOS, Linux, and Android, potentially impacting a wide range of users and systems. The abuse of trust in AI distribution platforms poses a significant risk, as users may be less likely to scrutinize files from these sources. Acronis identified close to 600 malicious skills on ClawHub alone, indicating the scale of this threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of downloaded files from Hugging Face or ClawHub with unusual parent processes using the &ldquo;Detect Suspicious Process Execution from AI Platforms&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect connections to known malicious domains or IPs associated with malware distribution campaigns that originate from processes associated with AI platform tooling.</li>
<li>Educate users about the risks of downloading files from untrusted sources, even on trusted platforms like Hugging Face and ClawHub.</li>
<li>Regularly scan systems for known malware signatures and indicators of compromise associated with infostealers and trojans.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>social-engineering</category><category>ai-platforms</category></item><item><title>Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</link><pubDate>Fri, 01 May 2026 00:45:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</guid><description>Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.</description><content:encoded><![CDATA[<p>On April 30, 2026, two malicious versions (2.6.2 and 2.6.3) of the widely used <code>pytorch-lightning</code> package were published to the PyPI registry after the publisher account was compromised. These versions contain embedded malicious code designed to steal developer credentials and republish infected versions of repositories to which the stolen tokens have access. The attack is triggered upon importing the package, initiating a background process that silently harvests credentials from a wide array of services, including AWS, Azure, Google Cloud, and GitHub, as well as local environment variables and credential files. Version 2.6.3 was published just 13 minutes after 2.6.2, and was intended to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the publisher account for the <code>pytorch-lightning</code> package on PyPI.</li>
<li>Attacker publishes malicious versions 2.6.2 and 2.6.3 to PyPI.</li>
<li>A modified <code>__init__.py</code> file within the package initiates a background process upon import.</li>
<li>The background process executes silently, without any visible output or indication of compromise to the user.</li>
<li>The malicious package downloads a runtime (Bun) from GitHub.</li>
<li>The package executes a large, obfuscated JavaScript file, targeting AWS, Azure, Google Cloud, GitHub, and local credential stores.</li>
<li>Stolen credentials, including cloud provider keys, API tokens, and secrets, are exfiltrated to attacker-controlled infrastructure.</li>
<li>The malware attempts to download and execute a second-stage payload from attacker-controlled infrastructure, expanding the scope of the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations that downloaded and used versions 2.6.2 or 2.6.3 of the <code>pytorch-lightning</code> package are at high risk of compromise. The malicious package is designed to steal a wide range of credentials, including cloud provider keys, API tokens, and secrets stored in environment variables. This can lead to unauthorized access to sensitive data and systems, potentially resulting in data breaches, financial losses, and reputational damage. The malware&rsquo;s ability to download and execute secondary payloads further increases the potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove versions 2.6.2 and 2.6.3 of the <code>lightning</code> package from all systems where they are installed (see overview).</li>
<li>Audit systems for unauthorized processes and review outbound network connections to detect potential compromises (see overview).</li>
<li>Rotate all cloud provider keys (AWS, Azure, GCP), API tokens (GitHub, CI/CD systems), and secrets stored in environment variables to prevent further unauthorized access (see Attack Chain).</li>
<li>Implement the <code>Detect Suspicious PyPI Package Installation</code> Sigma rule to identify potential malicious packages being installed in the future (see rules).</li>
<li>Implement the <code>Detect Credential Harvesting via Bun</code> Sigma rule to catch execution of the malicious JavaScript payload (see rules).</li>
<li>Pin dependencies to known-good versions and verify package integrity before use to prevent future supply chain attacks (see references).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>malware</category></item><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>UNC6692 Combines Social Engineering, Malware, and Cloud Abuse</title><link>https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</link><pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</guid><description>UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.</description><content:encoded><![CDATA[<p>UNC6692 is a newly tracked, financially motivated threat group that employs a multi-stage intrusion campaign combining persistent social engineering and custom modular malware. The actor begins by flooding a target&rsquo;s email inbox before contacting them via Microsoft Teams, posing as help desk personnel to resolve the issue. This leads to a phishing attack where victims are tricked into downloading and executing malicious payloads. UNC6692 abuses legitimate cloud infrastructure, specifically AWS S3 buckets, for payload delivery, command and control (C2), and data exfiltration, allowing them to bypass traditional network reputation filters. The group&rsquo;s operations are focused on gaining access and stealing credentials for further actions, ultimately aiming to exfiltrate data of interest from compromised systems. The initial campaign was observed in late December.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker floods a target&rsquo;s email inbox to create a sense of urgency.</li>
<li>The attacker contacts the target via Microsoft Teams, impersonating help desk personnel.</li>
<li>The attacker sends a phishing link via Teams, promising a local patch to fix the email spamming issue.</li>
<li>The target clicks the link, which downloads a renamed AutoHotKey binary and an AutoHotkey script from a threat actor-controlled AWS S3 bucket.</li>
<li>Execution of the AutoHotKey binary automatically runs the script, initiating reconnaissance commands and installing the SNOWBELT malicious Chromium browser extension.</li>
<li>SNOWBELT facilitates the download of additional tools, including the Snowglaze Python tunneler, the Snowbasin Python bindshell (used as a persistent backdoor), additional AutoHotkey scripts, and a portable Python executable with required libraries.</li>
<li>The attacker uses a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts.</li>
<li>The attacker uses a local administrator account to initiate an RDP session via Snowglaze from the compromised system to a backup server, then dumps LSASS process memory and uses pass-the-hash to move laterally to the domain controller.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The UNC6692 attack leads to the compromise of targeted systems, credential theft, and potential data exfiltration. If successful, the attacker gains control over the domain controller, allowing them to access sensitive information and potentially cause significant damage to the organization. The abuse of AWS S3 buckets allows the threat actor to blend in with legitimate cloud traffic, making detection more difficult. The financial motivation suggests that stolen credentials and data could be used for further malicious activities, such as ransomware attacks or sale on the dark web.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for AutoHotKey execution, especially when associated with downloads from unusual locations like AWS S3 buckets, to detect initial payload execution (see Sigma rule below).</li>
<li>Implement network monitoring to detect unusual RDP connections initiated from compromised systems to internal servers, as this is a key lateral movement technique used by UNC6692 (see Sigma rule below).</li>
<li>Monitor for the installation of new Chromium extensions, especially those not distributed through the Chrome Web Store, as this is how the SNOWBELT malware is deployed.</li>
<li>Monitor for the use of Python scripts to scan the local network for open ports (135, 445, 3389) and enumerate local administrator accounts.</li>
<li>Investigate any Microsoft Teams messages delivering links that promise to fix technical problems, as this is the initial social engineering tactic used by UNC6692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>malware</category><category>cloud-abuse</category><category>credential-theft</category><category>lateral-movement</category></item><item><title>CanisterSprawl: Self-Propagating npm Malware Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-04-canistersprawl-npm-malware/</link><pubDate>Thu, 23 Apr 2026 16:18:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-canistersprawl-npm-malware/</guid><description>The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.</description><content:encoded><![CDATA[<p>The CanisterSprawl campaign, first disclosed in April 2026, is a self-propagating malware targeting npm packages. This campaign focuses on stealing sensitive information, such as API keys, authentication tokens, and crypto wallet data from developer environments. The malware attempts to automate the process of publishing malicious packages to the npm registry using compromised developer accounts. By hijacking trusted credentials, CanisterSprawl seeks to extend its reach within the open-source ecosystem, turning a single compromised machine into a potential source of widespread supply chain attacks. This campaign highlights the need for robust security measures to prevent the installation of malicious packages and detect unauthorized activity within developer environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer installs a malicious npm package from the npm registry.</li>
<li>During installation, the package executes embedded code automatically.</li>
<li>The malware scans environment variables on the local system, looking for credentials and developer tokens.</li>
<li>The malware harvests browser credentials, crypto wallet data, and configuration files containing credentials.</li>
<li>The collected data is exfiltrated to an external server controlled by the attacker.</li>
<li>The malware attempts to locate an npm automation token on the infected machine.</li>
<li>If a token is found, the malware lists all packages to which the token grants &ldquo;write&rdquo; access.</li>
<li>The malware downloads the packages, injects the malicious script into them, and republishes them to the npm registry, spreading the infection to other projects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful CanisterSprawl infections can lead to the exfiltration of sensitive data, including API keys, authentication tokens, and credentials, which can be used to gain unauthorized access to internal systems and services. The malware&rsquo;s self-propagating nature allows it to spread through the npm ecosystem, potentially compromising numerous projects and developer accounts. If successful, attackers can inject malicious code into trusted packages, leading to supply chain attacks that affect a large number of downstream consumers. This can damage the reputation of affected developers and organizations, and result in significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Remove any identified malicious packages immediately to prevent further data theft and propagation.</li>
<li>Rotate potentially compromised credentials, tokens, and API keys that may have been exposed from affected hosts.</li>
<li>Review environment variables and local credentials on developer machines for potential compromise.</li>
<li>Audit account activity for unauthorized publishing or access to the npm registry, as highlighted in the Overview section.</li>
<li>Deploy the Sigma rule to detect suspicious processes attempting to access sensitive files related to credentials.</li>
<li>Enable file integrity monitoring for common credential storage locations and configuration files to detect unauthorized access and modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>npm</category></item><item><title>Suspicious Processes Connecting to Large Language Model Endpoints</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-llm-command-and-control/</link><pubDate>Wed, 22 Apr 2026 16:34:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-llm-command-and-control/</guid><description>This rule detects DNS queries to known Large Language Model (LLM) domains by unsigned binaries or common Windows scripting utilities, indicating potential command and control activity leveraging LLMs for dynamic actions on compromised systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where suspicious processes are communicating with known Large Language Model (LLM) endpoints. The activity suggests potential command and control behavior, where malware or unauthorized scripts leverage LLMs to dynamically execute actions on compromised systems. This behavior emerged in late 2025 and continues to evolve. The rule focuses on detecting DNS queries originating from unsigned binaries or common scripting utilities like PowerShell, <code>mshta.exe</code>, and <code>wscript.exe</code>. The targeting scope includes both Windows and macOS systems. Defenders should be aware of this technique as attackers increasingly integrate LLMs to enhance malware capabilities and evade traditional detection methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user inadvertently executes a malicious script or binary, potentially delivered through social engineering or drive-by download.</li>
<li>The malicious script, such as a PowerShell script or JavaScript within <code>mshta.exe</code>, is launched.</li>
<li>The script executes code to perform reconnaissance, gathering system information or user credentials.</li>
<li>The script constructs a query for a Large Language Model (LLM) endpoint, such as <code>api.openai.com</code>, using a common scripting utility.</li>
<li>The DNS query is resolved, and a network connection is established to the LLM API endpoint, bypassing standard network security controls.</li>
<li>The malicious script sends data to the LLM API, requesting instructions or performing tasks such as code generation or data exfiltration.</li>
<li>The LLM responds with instructions or processed data, which the script then executes on the compromised system.</li>
<li>The attacker gains control over the compromised system by leveraging the LLM to perform various malicious activities, like lateral movement or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems could be remotely controlled via LLM APIs, allowing attackers to perform data exfiltration, lateral movement, or deploy ransomware. Successful exploitation can lead to significant data breaches, financial loss, and reputational damage. The number of victims is currently unknown, but the attack vector affects organizations across all sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM to identify suspicious processes querying LLM endpoints.</li>
<li>Enable DNS query logging on both Windows and macOS endpoints to provide the necessary data source for the detections.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the parent process and associated network activity.</li>
<li>Implement application control policies to restrict the execution of unsigned binaries and common scripting utilities from untrusted locations.</li>
<li>Review and update network firewall rules to restrict outbound connections to known malicious or suspicious domains.</li>
<li>Monitor process creation events for command-line arguments that indicate the use of scripting engines to perform DNS queries to LLM domains.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command_and_control</category><category>malware</category><category>llm</category></item><item><title>Notepad++ Updater (gup.exe) Creates Uncommon Files</title><link>https://feed.craftedsignal.io/briefs/2026-06-notepadpp-updater-file-creation/</link><pubDate>Tue, 21 Apr 2026 10:34:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-notepadpp-updater-file-creation/</guid><description>The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.</description><content:encoded><![CDATA[<p>The Notepad++ updater, <code>gup.exe</code>, is a component designed to automatically update the Notepad++ application. However, attackers can potentially exploit this updater to deliver malware or place unwarranted files on a system. This activity often begins with a compromised update server or a man-in-the-middle attack. Successful exploitation can lead to the installation of backdoors, credential access, and collection of sensitive information. The references provided highlight historical incidents involving the Notepad++ updater being abused in supply chain attacks. Defenders should monitor file creation events by <code>gup.exe</code> outside of expected program directories and temporary update locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user installs Notepad++ on their Windows system.</li>
<li>The <code>gup.exe</code> updater component, located within the Notepad++ installation directory, is executed to check for updates.</li>
<li>The updater connects to the Notepad++ update server to retrieve update information.</li>
<li>An attacker compromises the update server or performs a man-in-the-middle attack.</li>
<li>The compromised update server provides malicious instructions to <code>gup.exe</code>.</li>
<li><code>gup.exe</code> creates a malicious executable or script in an unexpected location, such as the user&rsquo;s temporary directory outside of normal update procedures.</li>
<li>The malicious file is executed, leading to further compromise such as installing a backdoor or stealing credentials.</li>
<li>The attacker gains initial access to the system and can perform collection and credential access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting the Notepad++ updater can lead to the installation of malware, such as backdoors, allowing attackers to gain persistent access to the compromised system. This can lead to data theft, credential compromise, and further lateral movement within the network. The number of potential victims depends on the scope of the compromised update server or the success of the man-in-the-middle attack. Historically, supply chain attacks targeting widely used software have impacted thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Notepad++ Updater (gup.exe) Creates Uncommon Files&rdquo; to your SIEM and tune for your environment. This rule detects file creation events by <code>gup.exe</code> in suspicious locations (see rule configuration).</li>
<li>Monitor <code>file_event</code> logs for unusual file creation events initiated by <code>gup.exe</code> using the specified <code>logsource</code>.</li>
<li>Implement network monitoring to detect and prevent man-in-the-middle attacks against the Notepad++ update server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>notepad++</category></item><item><title>Dragon Boss Solutions Adware Disabling Antivirus Protections</title><link>https://feed.craftedsignal.io/briefs/2026-04-dragon-boss-adware/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dragon-boss-adware/</guid><description>Digitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.</description><content:encoded><![CDATA[<p>A digitally signed adware tool distributed by Dragon Boss Solutions LLC has been observed deploying payloads designed to disable antivirus protections. The campaign, discovered by Huntress on March 22, 2026, leverages signed executables initially classified as potentially unwanted programs (PUPs) to gain a foothold on victim machines. These PUPs, often disguised as browser tools like Chromstera Browser, Chromnius, WorldWideWeb, Web Genius, and Artificius Browser, use an advanced update mechanism to deliver malicious payloads. This update mechanism, powered by the commercial Advanced Installer, silently deploys MSI and PowerShell scripts with elevated SYSTEM privileges. This allows the threat actors to disable or remove antivirus software without user interaction. The campaign has impacted over 23,500 hosts across 124 countries, including high-value networks in the educational, utilities, government, and healthcare sectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial infection occurs via the installation of signed adware tools (PUPs) from Dragon Boss Solutions LLC, such as Chromnius or WorldWideWeb.</li>
<li>The adware uses the Advanced Installer update mechanism to silently download and execute an MSI payload (Setup.msi) disguised as a GIF image.</li>
<li>The MSI payload is executed with SYSTEM privileges, allowing it to bypass user account control (UAC) restrictions.</li>
<li>The MSI installer performs reconnaissance, checking admin status, detecting virtual machines, verifying internet connectivity, and identifying installed antivirus products from Malwarebytes, Kaspersky, McAfee, and ESET.</li>
<li>A PowerShell script (ClockRemoval.ps1) is deployed to disable the detected security products by stopping services, killing processes, deleting installation directories and registry entries, silently running vendors&rsquo; uninstallers, and forcefully deleting files.</li>
<li>The ClockRemoval.ps1 script is scheduled to run at system boot, logon, and every 30 minutes to ensure persistent removal of antivirus products.</li>
<li>The hosts file is modified to block access to antivirus vendor domains, preventing reinstallation or updates of the security software.</li>
<li>With antivirus protections disabled, the compromised system becomes vulnerable to further exploitation and malware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign has impacted over 23,500 hosts across 124 countries. Identified infected hosts include 221 academic institutions, 41 operational technology networks, 35 municipal governments and public utilities, 24 primary and secondary educational institutions, and 3 healthcare organizations. The disabling of antivirus software leaves systems vulnerable to further malware infections, data breaches, and other malicious activities. The potential exists for threat actors to leverage this established infrastructure to deploy far more dangerous payloads.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting the ClockRemoval.ps1 script execution to your SIEM to identify affected systems.</li>
<li>Monitor for WMI event subscriptions containing &ldquo;MbRemoval&rdquo; or &ldquo;MbSetup,&rdquo; scheduled tasks referencing &ldquo;WMILoad&rdquo; or &ldquo;ClockRemoval,&rdquo; and processes signed by Dragon Boss Solutions LLC, as recommended by Huntress.</li>
<li>Review the hosts file for entries blocking AV vendor domains and check Microsoft Defender exclusions for suspicious paths such as &ldquo;DGoogle,&rdquo; &ldquo;EMicrosoft,&rdquo; or &ldquo;DDapps.&rdquo;</li>
<li>Block the C2 domains chromsterabrowser[.]com and worldwidewebframework3[.]com at the DNS resolver.</li>
<li>Investigate systems that have downloaded the Setup.msi payload, identified by its hash.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>adware</category><category>antivirus-evasion</category><category>malware</category><category>windows</category></item><item><title>n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-abuse/</link><pubDate>Wed, 15 Apr 2026 10:03:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-abuse/</guid><description>Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.</description><content:encoded><![CDATA[<p>Cisco Talos has observed a surge in the abuse of agentic AI workflow automation platforms, specifically n8n, in phishing campaigns between October 2025 and March 2026. Attackers are leveraging the trusted infrastructure of n8n to bypass traditional security filters and deliver malware or fingerprint devices. This involves embedding n8n webhook URLs in phishing emails, which redirect victims to malicious content served through the n8n platform. This technique effectively turns a productivity tool into a delivery mechanism for persistent remote access, highlighting the evolving tactics of threat actors exploiting legitimate services. Talos observed a 686% increase in emails containing n8n webhook URLs between January 2025 and March 2026, indicating the growing prevalence of this attack vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a phishing email containing a malicious link.</li>
<li>The link is an n8n webhook URL pointing to a workflow controlled by the attacker on a subdomain of <code>tti.app.n8n[.]cloud</code>.</li>
<li>The victim receives the email and clicks the embedded n8n webhook URL, believing it to be a legitimate service.</li>
<li>Clicking the link redirects the victim&rsquo;s browser to the n8n platform, which triggers the pre-configured workflow.</li>
<li>The n8n workflow serves an HTML page containing a CAPTCHA to the victim&rsquo;s browser.</li>
<li>After the victim completes the CAPTCHA, the webpage presents a download button, concealing the true source of the payload.</li>
<li>Clicking the download button initiates the download of a malicious executable (e.g., &ldquo;DownloadedOneDriveDocument.exe&rdquo;) from an external host.</li>
<li>The executable installs a modified version of Datto RMM, establishes a connection to a relay on <code>centrastage[.]net</code>, granting the attacker remote access and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The abuse of n8n for malware delivery and device fingerprinting can lead to significant compromise of targeted systems. Successful exploitation allows attackers to gain remote access via tools like the modified Datto RMM, enabling them to steal sensitive data, deploy ransomware, or conduct further malicious activities within the compromised network. The rise in n8n webhook URL usage in phishing emails, with a 686% increase in volume from January 2025 to March 2026, indicates a potentially widespread impact across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor email traffic for URLs containing <code>tti.app.n8n[.]cloud</code> and flag them as suspicious (IOC table).</li>
<li>Implement a detection rule to identify network connections to <code>centrastage[.]net</code> initiated by unusual processes (Sigma rule below).</li>
<li>Inspect process creation events for the execution of &ldquo;DownloadedOneDriveDocument.exe&rdquo; or similar filenames downloaded from n8n domains (Sigma rule below).</li>
<li>Block the domains <code>tti.app.n8n[.]cloud</code> and <code>centrastage[.]net</code> at the DNS resolver (IOC table).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>n8n</category><category>phishing</category><category>malware</category><category>workflow-automation</category></item><item><title>OpenClaw Agent Suspicious Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2026-06-openclaw-execution/</link><pubDate>Wed, 08 Apr 2026 12:07:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-openclaw-execution/</guid><description>Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.</description><content:encoded><![CDATA[<p>OpenClaw (formerly Clawdbot, rebranded to Moltbot) is an AI coding assistant that can execute shell commands and scripts. Threat actors are exploiting the skill ecosystem (ClawHub) to distribute malicious skills, observed as early as January 2026, that execute download-and-execute commands, targeting cryptocurrency wallets and credentials. These skills are often obfuscated and distributed through public registries like ClawHub. The attacks leverage the AI agents&rsquo; ability to execute commands through skills or prompt injection. Defenders should monitor for suspicious child processes spawned by Node.js processes running OpenClaw/Moltbot, as these may indicate malicious activity originating from compromised or malicious skills. This activity has been observed across Linux, macOS, and Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user installs the OpenClaw agent, potentially from a legitimate or typosquatted domain.</li>
<li>The user installs a malicious skill from ClawHub or is subject to a prompt injection attack.</li>
<li>The OpenClaw agent, running under Node.js, receives a command to execute a shell command.</li>
<li>The Node.js process spawns a shell process (e.g., bash, sh, cmd.exe, powershell.exe).</li>
<li>The shell process executes a command to download a payload from a remote server using tools like curl or certutil.</li>
<li>The downloaded payload is saved to disk, often with an obfuscated name.</li>
<li>The shell process executes the downloaded payload using chmod +x and ./, rundll32.exe, or powershell.exe.</li>
<li>The payload performs malicious actions such as credential theft or cryptocurrency wallet compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised OpenClaw agents can lead to cryptocurrency wallet theft, credential compromise, and potential data exfiltration. A successful attack allows threat actors to gain access to sensitive data and potentially pivot to other systems on the network. The number of victims is currently unknown, but the targeting of cryptocurrency wallets suggests financially motivated actors. The observed typosquatting activity indicates a campaign to impersonate the legitimate software and trick users into installing malicious versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes of Node.js processes running OpenClaw/Moltbot, specifically shells and scripting interpreters, using the provided Sigma rule (<a href="#execution-via-openclaw-agent---linuxmacoswindows">Execution via OpenClaw Agent - Linux/macOS/Windows</a>).</li>
<li>Block known typosquat domains (moltbot.you, clawbot.ai, clawdbot.you) at the DNS resolver based on the IOCs provided.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables, mitigating the impact of downloaded payloads.</li>
<li>Review OpenClaw skill installation logs and user AI conversation history for signs of malicious activity or prompt injection attempts.</li>
<li>Enable process command-line auditing to capture the full command line of spawned processes, aiding in the identification of malicious commands.</li>
<li>Deploy the Sigma rule to detect execution of curl/certutil downloads (<a href="#openclaw-download-activity">OpenClaw Download Activity</a>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ai-agent</category><category>execution</category><category>malware</category><category>credential-theft</category></item><item><title>Malicious NPM Packages Target Strapi Users</title><link>https://feed.craftedsignal.io/briefs/2026-04-strapi-npm-attack/</link><pubDate>Tue, 07 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-strapi-npm-attack/</guid><description>A threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.</description><content:encoded><![CDATA[<p>A threat actor has compromised the Strapi ecosystem by publishing 36 malicious NPM packages posing as legitimate Strapi plugins. This supply chain attack, discovered by SafeDep, targets users of the open-source headless CMS, Strapi, which is built on Node.js. The malicious packages contain a variety of payloads designed to compromise Strapi installations. These payloads include capabilities for Redis code execution, Docker container escape, credential harvesting, reverse shell deployment, and establishing persistent implants. The attackers specifically targeted the cryptocurrency payment gateway Guardarian, indicating a focus on financial gain and data exfiltration from this specific organization. The malicious activity was observed starting around April 6, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker publishes 36 malicious NPM packages to the NPM registry, using names that mimic legitimate Strapi plugins to entice Strapi developers to install them.</li>
<li>A Strapi developer installs one or more of the malicious NPM packages into their Strapi project using the <code>npm install</code> command.</li>
<li>Upon installation, the malicious package executes its payload, which may include Redis code execution by injecting crontab entries and deploying PHP/Node.js reverse shells.</li>
<li>The payload attempts to escape Docker containers via overlay filesystem discovery, writing shells to host directories and launching a reverse shell.</li>
<li>The malicious code harvests credentials from the compromised system, including database passwords, API keys, JWT secrets, Elasticsearch credentials, and wallet/key files.</li>
<li>The attacker gains a reverse shell on the compromised system, allowing them to execute arbitrary commands and further explore the network.</li>
<li>The malware exfiltrates Strapi configurations and Guardarian API module data to an external attacker-controlled server.</li>
<li>The attacker establishes persistent implants on the compromised system to maintain long-term access and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to severe consequences for Strapi users, particularly those in the cryptocurrency sector. If successful, the attack allows for unauthorized access to sensitive data, including API keys, database credentials, and customer information. The direct targeting of Guardarian suggests a high-value target with potential for significant financial loss. A successful attack could result in data breaches, financial theft, and reputational damage for affected organizations. The ability to escape Docker containers further broadens the attack surface, potentially compromising the host system and other containers running on the same infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Suspicious NPM Package Installation&rdquo; Sigma rule to identify potentially malicious package installations (see rule below).</li>
<li>Enable process creation logging with command-line arguments to facilitate detection and investigation of suspicious activity.</li>
<li>Rotate all credentials, including database passwords, API keys, JWT secrets, and other secrets stored on systems where the malicious packages may have been installed, as recommended in the overview.</li>
<li>Monitor network connections for reverse shell activity originating from Strapi servers, as described in the Attack Chain (reference network_connection log source in Sigma rules).</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to Strapi configuration files and other sensitive files (reference file_event log source in Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>npm</category><category>strapi</category><category>malware</category></item><item><title>Malicious LiteLLM Versions Harvest Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-03-litellm-supply-chain/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-litellm-supply-chain/</guid><description>Compromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.</description><content:encoded><![CDATA[<p>On March 25, 2026, two malicious versions of the <code>litellm</code> package (versions 1.82.7 and 1.82.8) were discovered on the PyPI repository. These versions were found to contain automatically activated malware. The malicious code was designed to harvest sensitive credentials and files from systems where the compromised packages were installed. This supply chain attack follows a previous API token exposure stemming from a compromised trivy dependency, indicating a potential escalation in targeting the <code>litellm</code> project. The compromised packages exfiltrate stolen data to a remote API controlled by the attacker.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises the <code>litellm</code> PyPI package repository, likely leveraging exposed credentials.</li>
<li>The attacker injects malicious code into versions 1.82.7 and 1.82.8 of the <code>litellm</code> package. The malicious code is automatically activated upon installation.</li>
<li>A user installs either <code>litellm</code> version 1.82.7 or 1.82.8 via <code>pip</code>.</li>
<li>Upon execution, the malicious code begins harvesting credentials and files accessible to the <code>litellm</code> environment. This may include API keys, tokens, and other sensitive information.</li>
<li>The malware establishes a network connection to a remote API server controlled by the attacker.</li>
<li>The harvested credentials and files are exfiltrated to the attacker&rsquo;s remote API server.</li>
<li>The attacker gains unauthorized access to services and data protected by the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack directly impacts any user who installed the malicious <code>litellm</code> packages (versions 1.82.7 and 1.82.8). Successful credential harvesting allows attackers to pivot and compromise other systems and services accessible with the stolen credentials, potentially leading to data breaches, unauthorized access, and further lateral movement within victim environments. The number of affected users is currently unknown, but the popularity of <code>litellm</code> suggests a potentially wide impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately revoke and rotate any credentials accessible to environments where <code>litellm</code> versions 1.82.7 or 1.82.8 were installed (description).</li>
<li>Deploy the following Sigma rule to detect installations of the affected <code>litellm</code> versions (Sigma rule).</li>
<li>Monitor network traffic for connections originating from <code>litellm</code> processes to external, untrusted APIs (network_connection).</li>
<li>Implement strong dependency management practices, including the use of software composition analysis tools, to identify and prevent the installation of malicious packages (overview).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>credential-theft</category></item><item><title>TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</link><pubDate>Sun, 22 Mar 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-canisterworm/</guid><description>TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.</description><content:encoded><![CDATA[<p>On March 21, 2026, it was reported that threat actor TeamPCP successfully deployed CanisterWorm, a malicious worm, onto the NPM package registry. This followed a compromise of Trivy, a widely-used open-source vulnerability scanner. The specifics of the Trivy compromise are not detailed in this brief, but it likely involved exploiting vulnerabilities within Trivy or its infrastructure to gain unauthorized access and the ability to publish malicious packages. The scope of this incident affects developers and organizations that rely on NPM packages and utilize Trivy in their software development lifecycle. Defenders should prioritize detecting and mitigating the spread of CanisterWorm within their environments, focusing on identifying compromised Trivy instances and monitoring for suspicious activity related to NPM package installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: TeamPCP gains unauthorized access to Trivy infrastructure, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>Malware Injection: The attackers inject malicious code into a legitimate Trivy package or create a new package containing the CanisterWorm payload.</li>
<li>NPM Deployment: TeamPCP publishes the compromised or new package to the NPM registry, making it available for download by unsuspecting users.</li>
<li>Package Installation: Developers unknowingly download and install the malicious package through NPM, integrating CanisterWorm into their projects.</li>
<li>Worm Propagation: CanisterWorm begins to propagate itself by infecting other NPM packages and dependencies within the compromised project.</li>
<li>Lateral Movement: The worm replicates and spreads to other systems and projects that depend on the infected packages.</li>
<li>Persistence: The malware establishes persistence within infected systems to maintain its presence and continue spreading.</li>
<li>Payload Delivery: CanisterWorm executes its malicious payload, which could include data theft, code injection, or other harmful activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deployment of CanisterWorm on NPM poses a significant threat to the software supply chain. Successful infection can lead to widespread compromise of applications and systems that rely on NPM packages. The specific number of victims and the full extent of damage is currently unknown, but the incident has the potential to affect numerous organizations across various sectors that utilize NPM and Trivy in their development processes. Successful exploitation could result in data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor NPM package installations for suspicious activity and unexpected dependencies to identify potential CanisterWorm infections.</li>
<li>Implement integrity checks for NPM packages to verify their authenticity and prevent the installation of tampered packages.</li>
<li>Analyze process creation events for suspicious processes originating from NPM-related processes using the provided Sigma rules.</li>
<li>Regularly scan systems for known malware signatures to detect CanisterWorm and other potential threats.</li>
<li>Review and strengthen the security of your software supply chain to mitigate the risk of future attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>malware</category><category>npm</category><category>canisterworm</category></item><item><title>GhostLoader Malware Targeting macOS via GitHub and AI Workflows</title><link>https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</link><pubDate>Sat, 21 Mar 2026 13:03:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ghostloader/</guid><description>GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.</description><content:encoded><![CDATA[<p>GhostLoader is a malware campaign observed using GitHub repositories and AI-assisted development workflows to deliver malicious payloads specifically designed to steal credentials from macOS systems. The threat leverages the trust associated with software repositories and the increasing adoption of AI tools in development to potentially bypass security measures. While the exact start date of the campaign is not specified, the report from Jamf highlights its recent emergence as a notable threat. Defenders should prioritize monitoring for suspicious activity related to GitHub repositories and unusual AI-driven development processes. The targeted scope appears to be macOS users who engage with software development resources and AI-related tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates a seemingly legitimate software repository on GitHub.</li>
<li>The repository contains a project with files that may appear benign or related to AI workflows.</li>
<li>A malicious script or binary, named GhostLoader, is included within the repository or downloaded as a dependency.</li>
<li>A user downloads or clones the repository, potentially enticed by AI-assisted development features or other seemingly useful functionality.</li>
<li>The user executes the GhostLoader script or binary on their macOS system.</li>
<li>GhostLoader executes, initiating the credential-stealing process.</li>
<li>Stolen credentials are collected and potentially exfiltrated to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts or sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The GhostLoader malware directly targets macOS systems and focuses on credential theft. Successful attacks can lead to unauthorized access to sensitive user accounts, intellectual property, and confidential data. The number of victims and specific sectors targeted remain unclear, but the use of GitHub and AI workflows suggests a focus on developers or users involved in AI-related activities. The compromise of credentials can have severe consequences, including financial loss, data breaches, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events on macOS for execution of unusual or unsigned binaries in user directories, potentially indicative of GhostLoader execution (see process creation rule).</li>
<li>Implement network monitoring to detect connections to known malicious infrastructure or unusual data exfiltration patterns after the execution of scripts from cloned GitHub repositories.</li>
<li>Educate developers and users about the risks of downloading and executing code from untrusted sources, particularly those related to AI-assisted workflows.</li>
<li>Enable and review macOS system logs for suspicious activity related to credential access and keychain modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>malware</category><category>macos</category><category>credential-theft</category><category>ai</category></item><item><title>Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-03-speagle-docguard-hijack/</link><pubDate>Sat, 21 Mar 2026 00:38:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-speagle-docguard-hijack/</guid><description>The Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.</description><content:encoded><![CDATA[<p>A new malware strain dubbed &ldquo;Speagle&rdquo; has been discovered leveraging the legitimate Cobra DocGuard software to exfiltrate sensitive data. This malware infects systems and then uses compromised Cobra DocGuard servers as a C2 to receive stolen data. By masquerading as legitimate DocGuard client-server communication, Speagle seeks to evade detection. First reported in March 2026, the malware represents a sophisticated approach to data theft. The threat actors are exploiting trust in a legitimate software product to conceal their activities, making detection more challenging for defenders. The targeting scope is currently unknown, but any organization utilizing Cobra DocGuard should be considered potentially at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Speagle infects a target machine through an unknown initial access vector.</li>
<li>The malware identifies and hooks into the Cobra DocGuard application.</li>
<li>Speagle harvests sensitive information from the compromised system, focusing on documents and other valuable data.</li>
<li>The gathered data is prepared for exfiltration, likely compressed and encrypted.</li>
<li>Speagle establishes a connection to a compromised Cobra DocGuard server.</li>
<li>The stolen data is transmitted to the compromised server, disguised as legitimate DocGuard client-server traffic.</li>
<li>The attackers retrieve the exfiltrated data from the compromised Cobra DocGuard server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Speagle infections can lead to significant data breaches, resulting in the loss of sensitive documents, intellectual property, and confidential information. The number of affected organizations is currently unknown, but any company using Cobra DocGuard is potentially at risk. The impact of a successful attack can range from financial losses and reputational damage to legal and regulatory penalties, depending on the type of data compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual communication patterns associated with Cobra DocGuard, even if it appears legitimate (see rules below).</li>
<li>Implement strict access controls and monitoring on Cobra DocGuard servers to detect unauthorized access or data manipulation.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate any Cobra DocGuard client machines exhibiting suspicious behavior, such as unusual file access or network activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>data-exfiltration</category><category>cobra-docguard</category><category>speagle</category></item><item><title>SnappyClient Malware Delivered via HijackLoader</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-snappyclient/</link><pubDate>Fri, 20 Mar 2026 05:19:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-snappyclient/</guid><description>SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.</description><content:encoded><![CDATA[<p>SnappyClient is a sophisticated malware delivered via HijackLoader, a known malware distribution platform. The malware exhibits a wide array of capabilities, indicative of its intent to compromise systems and exfiltrate sensitive data. These capabilities include screenshot capture, keylogging, establishing a remote terminal for interactive command execution, and targeted data theft from web browsers, browser extensions, and other applications. The combination of these functions points towards a threat actor focused on credential harvesting, data collection, and maintaining persistent access through remote command and control. Defenders should prioritize detection and prevention measures to mitigate the risk of SnappyClient infections. The initial report of this activity was published in March 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: HijackLoader infects the system (delivery mechanism unspecified).</li>
<li>Persistence: HijackLoader establishes persistence to ensure SnappyClient is executed upon system reboot.</li>
<li>Malware Deployment: HijackLoader deploys and executes the SnappyClient malware.</li>
<li>Screenshot Capture: SnappyClient begins capturing screenshots of the user&rsquo;s desktop activity using built-in OS functions.</li>
<li>Keylogging: SnappyClient logs keystrokes to capture sensitive information such as usernames, passwords, and financial details.</li>
<li>Browser Data Theft: SnappyClient targets web browsers and their extensions to steal cookies, saved credentials, and browsing history.</li>
<li>Remote Terminal: SnappyClient establishes a remote terminal, granting the attacker interactive command execution capabilities.</li>
<li>Data Exfiltration: Stolen data is exfiltrated to a command and control server controlled by the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful SnappyClient infections can result in significant data breaches, including the compromise of sensitive credentials, financial information, and personal data. The remote terminal functionality allows attackers to perform arbitrary actions on compromised systems, potentially leading to further damage or lateral movement within the network. While the number of victims and specific sectors targeted are unknown, the malware&rsquo;s capabilities make it a high-risk threat to organizations of all sizes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to enhance visibility into HijackLoader and SnappyClient execution (logsource: process_creation).</li>
<li>Implement network monitoring to detect and block connections to known HijackLoader command and control infrastructure.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect SnappyClient activity and tune for your environment.</li>
<li>Monitor registry modifications for persistence mechanisms used by HijackLoader to launch SnappyClient (logsource: registry_set).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>snappyclient</category><category>hijackloader</category><category>malware</category><category>infostealer</category><category>keylogger</category></item><item><title>StoatWaffle Malware Used by WaterPlum Actor</title><link>https://feed.craftedsignal.io/briefs/2024-01-stoatwaffle/</link><pubDate>Thu, 19 Mar 2026 05:35:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-stoatwaffle/</guid><description>StoatWaffle is malware employed by the WaterPlum threat actor, used for an unknown purpose.</description><content:encoded><![CDATA[<p>The threat brief addresses the StoatWaffle malware associated with the threat actor WaterPlum. Specific details regarding the malware&rsquo;s capabilities, deployment methods, and targeted sectors are currently limited based on the available source material. Further analysis is required to determine the exact scope and impact of StoatWaffle and WaterPlum&rsquo;s operations. Defenders should prioritize gathering additional intelligence on this threat to implement appropriate detection and mitigation strategies. Understanding the malware&rsquo;s functionality is crucial for effective defense.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The initial access vector is currently unknown. Further investigation is needed to determine how WaterPlum deploys StoatWaffle.</li>
<li><strong>Execution:</strong> StoatWaffle executes on the compromised system, but the specific method is unknown.</li>
<li><strong>Persistence:</strong> The method StoatWaffle uses to maintain persistence is not described in the available information.</li>
<li><strong>Privilege Escalation:</strong> Any privilege escalation techniques are presently unknown.</li>
<li><strong>Defense Evasion:</strong> Any defense evasion techniques are unknown.</li>
<li><strong>Credential Access:</strong> Credential access methods used by StoatWaffle are unknown.</li>
<li><strong>Discovery:</strong> The information gathering activities of StoatWaffle post-compromise are unknown.</li>
<li><strong>Command and Control:</strong> Command and control channels used by StoatWaffle are unknown.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The precise impact of StoatWaffle malware is currently undetermined. Without more information, it is difficult to determine the number of potential victims, sectors targeted, or potential damage resulting from successful exploitation. The consequences of a successful attack remain unclear, pending further analysis of the malware and the threat actor&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Conduct further research on StoatWaffle malware and the WaterPlum threat actor to gather more specific intelligence about their tactics, techniques, and procedures.</li>
<li>Monitor threat intelligence feeds for updated information on StoatWaffle IOCs or detection signatures.</li>
<li>Implement generic malware detection rules that identify suspicious process behavior, network traffic, or file modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>stoatwaffle</category><category>waterplum</category><category>malware</category></item><item><title>GlassWorm Campaign Deploying Wave 3 Windows Payload</title><link>https://feed.craftedsignal.io/briefs/2024-01-glassworm-wave3/</link><pubDate>Mon, 16 Mar 2026 15:00:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-glassworm-wave3/</guid><description>The GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.</description><content:encoded><![CDATA[<p>The GlassWorm campaign has been identified deploying a Wave 3 Windows payload. This indicates a continuation of the threat actor&rsquo;s operations, with an updated payload targeting Windows systems. The specifics of the delivery mechanism and the exact functionality of the Wave 3 payload are currently unknown. Defenders should be aware of the ongoing GlassWorm activity and implement detections for suspicious Windows executables. Further analysis is required to fully understand the capabilities of the Wave 3 payload and the scope of the campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The initial access vector is unknown.</li>
<li>Payload Delivery: A Wave 3 Windows payload is delivered to the system.</li>
<li>Execution: The Windows payload is executed.</li>
<li>Persistence: The payload establishes persistence on the system.</li>
<li>Command and Control: The payload connects to a command and control server for instructions.</li>
<li>Data Collection: The payload gathers sensitive data from the system.</li>
<li>Exfiltration: The collected data is exfiltrated to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of the GlassWorm Wave 3 payload could lead to data theft, system compromise, and potential financial loss. The impact depends on the specific objectives of the threat actor and the sensitivity of the data compromised. The lack of specific information about victimology makes determining the overall scope impossible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for unknown or unsigned executables, especially those with network connections (reference: process_creation and network_connection log sources).</li>
<li>Investigate any alerts related to the execution of potentially malicious Windows executables.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>glassworm</category><category>malware</category><category>windows</category></item><item><title>Malware Spreading Through Fake 'Claude Code' Google Ads</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-fake-claude-ads/</link><pubDate>Sun, 15 Mar 2026 15:31:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-fake-claude-ads/</guid><description>Malware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.</description><content:encoded><![CDATA[<p>A malware campaign is underway, leveraging deceptive advertisements on Google that masquerade as legitimate &lsquo;Claude Code&rsquo; software. The attackers are using these ads to direct unsuspecting users to malicious websites hosting malware payloads for both Windows and macOS systems. While specific details on the malware are limited, the campaign&rsquo;s reliance on search engine advertisement poisoning indicates a broad targeting strategy aimed at users actively seeking &lsquo;Claude Code&rsquo; related software or tools. This campaign highlights the increasing sophistication of threat actors in using search engine optimization (SEO) poisoning techniques to distribute malware. Defenders should be aware of the potential for users to be directed to malicious sites through search results.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates malicious advertisements on Google that mimic legitimate &lsquo;Claude Code&rsquo; software or related tools.</li>
<li>Users searching for &lsquo;Claude Code&rsquo; or related terms encounter the malicious advertisements in their search results.</li>
<li>Unsuspecting users click on the malicious advertisement, believing it to be a legitimate source for &lsquo;Claude Code&rsquo;.</li>
<li>The advertisement redirects the user to a malicious website controlled by the attacker.</li>
<li>The malicious website hosts malware payloads tailored for both Windows and macOS operating systems.</li>
<li>Upon visiting the site, the user is tricked into downloading and executing the malware, potentially through social engineering or drive-by download techniques.</li>
<li>The malware executes on the victim&rsquo;s system, establishing persistence and potentially disabling security controls.</li>
<li>The malware performs its intended malicious activities, such as data theft, credential harvesting, or further malware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this campaign could be widespread, affecting both individual users and organizations who rely on &lsquo;Claude Code&rsquo;. Successful infection can lead to data theft, financial loss, and reputational damage. Given the use of Google Ads, the number of potential victims is substantial. The cross-platform nature of the attack further amplifies the risk, as it targets a broader range of users regardless of their operating system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement browser security extensions and ad blockers to reduce the likelihood of users clicking on malicious advertisements.</li>
<li>Educate users about the risks of clicking on advertisements in search results and encourage them to verify the legitimacy of websites before downloading software.</li>
<li>Monitor network traffic for connections to newly registered domains or known malicious IP addresses associated with malware distribution.</li>
<li>Deploy endpoint detection and response (EDR) solutions to detect and prevent malware execution on both Windows and macOS systems.</li>
<li>Enable and review web proxy logs for user visits to suspicious domains.</li>
<li>Configure intrusion detection systems (IDS) to identify and block malicious traffic originating from advertisement networks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>google_ads</category><category>initial_access</category><category>windows</category><category>macos</category></item><item><title>Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</link><pubDate>Sun, 15 Mar 2026 15:30:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</guid><description>The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.</description><content:encoded><![CDATA[<p>The Glassworm malware is a newly discovered threat that leverages the presence of invisible Unicode characters within source code to inject malicious payloads into software projects.  Discovered in early 2026, this malware has already compromised over 150 repositories on GitHub. The attack focuses on injecting these invisible characters into popular repositories, particularly those related to JavaScript and Node.js development, potentially impacting a wide range of applications and services. The delivery mechanism involves contributors with malicious intent adding these characters or compromised accounts injecting them. This sophisticated approach allows the malware to remain undetected during code reviews and traditional security scans, making it a significant threat to the software supply chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor gains commit access to a target GitHub repository through either direct contribution or compromised credentials.</li>
<li>The actor injects invisible Unicode characters into source code files, such as JavaScript or package.json files.</li>
<li>These Unicode characters are strategically placed within the code to be innocuous visually but alter the program&rsquo;s execution when interpreted.</li>
<li>The altered code, containing the Unicode characters, is committed to the repository, potentially passing initial code review checks due to the characters&rsquo; invisibility.</li>
<li>When a developer clones or downloads the compromised repository, the Unicode characters are included in their local copy of the code.</li>
<li>During the build process (e.g., <code>npm install</code>), the malicious code embedded within the Unicode characters is executed.</li>
<li>This execution leads to the download and execution of a secondary payload from a remote server, potentially installing malware, backdoors, or exfiltrating sensitive data.</li>
<li>The final objective is to compromise the developer&rsquo;s system or to inject malicious code into applications built using the compromised repository, thus propagating the malware further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of Glassworm can lead to widespread supply chain compromise, potentially affecting thousands of developers and end-users.  Over 150 GitHub repositories have already been identified as infected, and the actual number could be much higher. Successful exploitation leads to arbitrary code execution on developer machines and within deployed applications. The compromised code can steal credentials, inject backdoors, and exfiltrate sensitive data, leading to significant financial and reputational damage. The lack of visibility makes remediation challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement static analysis tools capable of detecting invisible Unicode characters in source code repositories (reference: Overview).</li>
<li>Deploy the Sigma rules provided below to identify suspicious process executions originating from build processes that may indicate Glassworm activity.</li>
<li>Educate developers about the risks associated with invisible Unicode characters and the importance of careful code review (reference: Attack Chain).</li>
<li>Implement multi-factor authentication on all developer accounts to prevent account compromise (reference: Attack Chain).</li>
<li>Monitor network traffic for connections to suspicious or unknown domains originating from build processes (reference: Attack Chain).</li>
<li>Utilize file integrity monitoring (FIM) to track changes to critical files within repositories and development environments (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>unicode</category><category>malware</category><category>github</category></item><item><title>GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</link><pubDate>Sun, 15 Mar 2026 13:51:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-glassworm-v2-analysis/</guid><description>Analysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.</description><content:encoded><![CDATA[<p>This threat brief summarizes an analysis of GlassWorm V2, focusing on its infrastructure rotation and GitHub injection techniques. While specific details regarding the threat actor and initial attack vectors are not provided in this analysis, the report highlights the malware&rsquo;s ability to dynamically change its command and control (C2) infrastructure and potentially leverage GitHub for code injection or storage. Understanding these techniques is crucial for defenders to develop robust detection and mitigation strategies against this evolving threat. The full analysis is available on Codeberg.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: Specific initial access vector is unknown.</li>
<li>GitHub Injection: The malware leverages GitHub to host malicious code or configurations, potentially obfuscating its activities within legitimate traffic.</li>
<li>Infrastructure Rotation: GlassWorm V2 employs techniques to rotate its C2 infrastructure, making it more difficult to track and block.</li>
<li>Communication: The malware establishes communication with its C2 server using the dynamically updated infrastructure.</li>
<li>Command Execution: The C2 server issues commands to the infected host.</li>
<li>Persistence: Unknown persistence mechanism is used.</li>
<li>Data Exfiltration/Lateral Movement/Impact: The ultimate goal is currently unknown.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of a successful GlassWorm V2 infection could range from data theft and system compromise to disruption of services, depending on the specific objectives of the attacker. The use of infrastructure rotation makes it harder to block attacker infrastructure. The GitHub injection may also lead to supply chain concerns.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to unusual or newly registered domains, even if they initially appear benign.</li>
<li>Implement file integrity monitoring on systems to detect unauthorized modifications to critical system files.</li>
<li>Consider using tools that specifically analyze and detect malicious use of GitHub repositories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>malware</category><category>github</category><category>infrastructure</category></item><item><title>Maltrail IOCs Report: Tracking Multiple Threat Actors</title><link>https://feed.craftedsignal.io/briefs/2026-02-maltrail-iocs/</link><pubDate>Fri, 27 Feb 2026 23:00:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-maltrail-iocs/</guid><description>This brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.</description><content:encoded><![CDATA[<p>This threat brief is based on an IOC feed from Maltrail, dated February 27, 2026, which aggregates indicators related to various threat actors and malware campaigns. The tracked actors include APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp. The IOCs primarily consist of domains and IP addresses associated with these groups&rsquo; network infrastructure and malware distribution. These campaigns are likely targeting a wide range of victims across multiple sectors, employing diverse techniques to achieve their objectives, including initial access, command and control, and potentially data exfiltration or deployment of malicious payloads. The data suggests ongoing malicious activity necessitating proactive monitoring and detection efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An unsuspecting user visits a compromised website or interacts with a malicious advertisement, potentially leading to the download of a malware loader such as those associated with SmokeLoader or FakeApp.</li>
<li><strong>Malware Installation:</strong> The initial loader executes on the victim&rsquo;s system, establishing persistence and preparing the environment for further malicious activities. This may involve creating scheduled tasks or modifying registry keys for auto-start.</li>
<li><strong>Command and Control (C2) Communication:</strong> The malware establishes communication with a command-and-control server, using domains such as <code>dax.estate</code> (SmokeLoader) or <code>resistantmusic.shop</code> (PowerShell Injector) to receive instructions and transmit data.</li>
<li><strong>PowerShell Injection:</strong> The PowerShell Injector, utilizes multiple techniques to inject malicious code into running processes, allowing it to evade detection and maintain persistence within the system. Domains such as <code>apostile.zapto.org</code> and <code>googletranslate.zapto.org</code> may resolve to infrastructure involved in command and control of compromised hosts.</li>
<li><strong>Lateral Movement:</strong> The attackers leverage compromised systems to move laterally within the network, potentially using stolen credentials or exploiting vulnerabilities to gain access to additional systems.</li>
<li><strong>Data Exfiltration:</strong> Sensitive data is collected from compromised systems and exfiltrated to attacker-controlled servers, potentially using domains such as <code>ashersoftlib.com</code> (APT_Bitter) for staging or exfiltration.</li>
<li><strong>Android Exploitation:</strong> In the case of Android_Joker, malicious applications distributed through unofficial channels or app stores communicate with <code>petitle.cloud</code> for command and control, potentially leading to data theft or installation of further malware.</li>
<li><strong>Final Objective:</strong> The final objective of the attack may vary depending on the actor and the target, ranging from data theft and espionage (APT_UNC2465, Lazarus Group, APT_Bitter) to financial gain (Android_Joker) or widespread malware distribution (SmokeLoader, FakeApp, PowerShell Injector).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be used for a variety of malicious purposes, including data theft, financial fraud, and further propagation of malware. Victims may experience data breaches, financial losses, and reputational damage. The wide range of threat actors involved suggests that various sectors and organizations are at risk. If successful, these attacks can lead to significant financial losses and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the identified malicious domains and IP addresses at the network perimeter to prevent communication with command-and-control servers (IOC table).</li>
<li>Implement a web proxy filter to block access to URLs associated with malware downloads and phishing campaigns (IOC table).</li>
<li>Monitor network traffic for connections to known malicious domains and IP addresses associated with APT_Bitter, PowerShell Injector, SmokeLoader, and FakeApp (IOC table).</li>
<li>Deploy the Sigma rule to detect network connections to domains associated with PowerShell Injector infrastructure. Tune the rule for your environment (Sigma Rule).</li>
<li>Deploy the Sigma rule to detect network connections to infrastructure associated with FakeApp campaigns, adjusting the rule as needed for your environment (Sigma Rule).</li>
<li>Investigate and remediate any systems that exhibit suspicious network activity or have been identified as compromised based on the IOCs provided (IOC table).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>maltrail</category><category>threat-intelligence</category><category>apt</category><category>malware</category></item><item><title>Suspicious PowerShell Script Using Cryptography Namespace</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</guid><description>The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting suspicious PowerShell activity involving the System.Security.Cryptography namespace, excluding common hashing algorithms like SHA and MD5. The detection leverages Windows PowerShell Script Block Logging (EventCode 4104) to identify scripts using cryptographic functions. This is significant because malware often uses cryptography to decrypt or decode additional malicious payloads, which can lead to further code execution, privilege escalation, or persistence within the compromised environment. The technique is commonly used by malware families like AsyncRAT, XWorm, and VIP Keylogger. Defenders should investigate the parent process of such scripts, the decrypted data, network connections established by the script, and the user context in which the script is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system.</li>
<li>The PowerShell script utilizes the <code>System.Security.Cryptography</code> namespace to perform cryptographic operations.</li>
<li>The script decrypts or decodes a malicious payload (e.g., a second-stage executable or configuration file).</li>
<li>The decrypted payload is written to disk or loaded directly into memory.</li>
<li>The attacker executes the decrypted payload, potentially establishing persistence via registry keys or scheduled tasks.</li>
<li>The malware leverages the established persistence mechanism for long-term access.</li>
<li>The attacker performs malicious actions such as data exfiltration, lateral movement, or remote command execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security measures by hiding malicious code within encrypted payloads. This can lead to data theft, system compromise, and further propagation within the network. Malware families like AsyncRAT, XWorm, and VIP Keylogger use this technique to maintain persistence and perform malicious activities undetected. The impact can range from individual workstation compromise to large-scale data breaches depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to generate the necessary logs (EventCode 4104) for detection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> to your SIEM to detect the described activity.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, decrypted data, network connections, and the user executing the script.</li>
<li>Review and tune the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> based on your environment&rsquo;s specific needs and known-good PowerShell usage to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted PowerShell scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>cryptography</category><category>malware</category><category>asyncrat</category><category>xworm</category><category>vip keylogger</category></item><item><title>Non-Firefox Process Accessing Firefox Profile Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</link><pubDate>Wed, 03 Jan 2024 15:22:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</guid><description>This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to Firefox profile directories. The Firefox profile directory stores sensitive user data, including login credentials, browsing history, and cookies. When a non-Firefox process accesses this directory, it could be an indicator of malicious activity, such as a Remote Access Trojan (RAT) or other malware attempting to steal user information. The analytic leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This is relevant because successful credential theft can lead to account compromise, data breaches, and further propagation of malware within the network. The threat encompasses a broad range of malware families, including stealers (Azorult, RedLine Stealer, 0bj3ctivity Stealer), RATs (Remcos, Quasar RAT, Warzone RAT), keyloggers (Snake Keylogger, VIP Keylogger), and other malware like DarkGate, NjRAT, AgentTesla, and Lokibot. The activity has been observed in campaigns such as CISA AA23-347A and the 3CX Supply Chain Attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user executes a malicious file, potentially delivered via phishing or drive-by download (not covered in source).</li>
<li>The malicious file executes and establishes persistence on the system.</li>
<li>The malware attempts to access the Firefox profile directory, located at <code>*\AppData\Roaming\Mozilla\Firefox\Profiles*</code>.</li>
<li>Windows Security Event 4663 is generated, logging the access attempt to the Firefox profile directory.</li>
<li>The malware reads sensitive data, such as login credentials, cookies, and browsing history, from the profile directory.</li>
<li>The stolen data is exfiltrated to a command-and-control (C2) server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts and sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and credential theft can lead to a wide range of negative outcomes, including unauthorized access to sensitive data, financial fraud, and further compromise of systems within the organization. The impact can range from individual user account compromise to large-scale data breaches affecting thousands of users. Industries heavily reliant on web-based applications and sensitive user data, such as finance, healthcare, and e-commerce, are particularly vulnerable. The consequences include financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure it to log both success and failure events for object access to activate the underlying log source required for this detection.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect non-Firefox processes accessing Firefox profile directories.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the <code>ProcessName</code> and <code>ObjectName</code> to identify potentially malicious processes and the specific profile data being accessed.</li>
<li>Review and update your organization&rsquo;s security policies to restrict unauthorized access to sensitive user data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>malware</category><category>firefox</category></item><item><title>Windows Time-Based Evasion via Choice Exec</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</guid><description>Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of <code>choice.exe</code> being used within batch files as a time-delay tactic, a technique notably employed by the SnakeKeylogger malware. The analysis leverages data from Endpoint Detection and Response (EDR) agents, scrutinizing process names and command-line executions. This behavior is significant because it suggests the implementation of time-based evasion techniques designed to circumvent detection mechanisms. Successful evasion could enable attackers to execute malicious code covertly, remove incriminating files, and establish persistent access on compromised systems. The use of <code>choice.exe</code> for such purposes warrants immediate investigation by security operations center (SOC) analysts due to the potential for significant system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access via an unknown vector.</li>
<li>A batch script is executed on the target system.</li>
<li>The batch script uses <code>choice.exe</code> with the <code>/T</code> and <code>/N</code> parameters to introduce a time delay. The <code>/T</code> parameter specifies a timeout period, and the <code>/N</code> parameter suppresses the display of choices.</li>
<li>This delay allows the malware to evade time-sensitive detection mechanisms.</li>
<li>After the delay, the script executes further commands, potentially downloading and executing a payload.</li>
<li>The payload executes, installing a keylogger such as SnakeKeylogger or 0bj3ctivity Stealer.</li>
<li>The keylogger captures sensitive information such as keystrokes and clipboard data.</li>
<li>The stolen data is exfiltrated to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data theft, intellectual property loss, and financial fraud. SnakeKeylogger and similar malware have been used to steal credentials and sensitive information from various targets. Successful exploitation could result in significant financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the compromised systems&rsquo; value.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Choice.exe Time Delay</code> to your SIEM to detect the use of <code>choice.exe</code> with time-delay parameters (log source: <code>process_creation</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution data for the Sigma rule.</li>
<li>Investigate any instances of <code>choice.exe</code> being used with the <code>/T</code> and <code>/N</code> parameters to determine if it is part of a malicious script.</li>
<li>Block the execution of unsigned or untrusted batch scripts to prevent the initial execution of the malicious code.</li>
<li>Monitor endpoint activity for suspicious processes and network connections originating from systems where <code>choice.exe</code> has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>time-based-evasion</category><category>malware</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Child Processes Spawned by WScript or CScript</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</guid><description>Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Windows Script Host (WScript) or CScript. Adversaries commonly leverage WScript and CScript to execute malicious scripts, LOLBINs (Living Off The Land Binaries), and PowerShell, or inject code into suspended processes as a form of defense evasion. While some legitimate scripts may utilize tools detected by this analytic, it serves as a valuable indicator that a script may be executing suspicious code. Notably, the WhisperGate malware and campaigns by FIN7 have employed similar techniques. This activity has been observed since at least 2022, and continues to be relevant for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user (unknowingly or through social engineering) executes a malicious script.</li>
<li>The malicious script is interpreted by either <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script executes a LOLBIN such as <code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>.</li>
<li>The LOLBIN executes further commands or downloads additional payloads. <code>Certutil.exe</code> may be used to decode and install malicious binaries.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker uses the compromised system as a pivot for lateral movement.</li>
<li>The attacker attempts to escalate privileges and establish persistence.</li>
<li>The attacker may exfiltrate data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across various sectors are vulnerable, as this technique is commonly used by both commodity malware and advanced persistent threat (APT) groups. The WhisperGate malware targeting Ukrainian organizations in 2022 demonstrated the destructive potential of this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (4688) to capture process execution events necessary for the provided rules.</li>
<li>Deploy the Sigma rule <code>Suspicious Child Processes Spawned by WScript or CScript</code> to your SIEM to detect suspicious child processes. Tune the rule based on your environment&rsquo;s baseline activity, filtering out any legitimate use cases.</li>
<li>Investigate any alerts generated by this rule, focusing on the parent and child processes involved and the commands executed.</li>
<li>Monitor endpoint logs for unusual or unexpected process executions originating from WScript or CScript.</li>
<li>Block execution of the LOLBINs (<code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>) if they are not required in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wscript</category><category>cscript</category><category>lolbin</category><category>malware</category><category>defense-evasion</category></item><item><title>Suspicious Script Interpreter Execution from Environment Variable Folders</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-script-execution/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-script-execution/</guid><description>Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.</description><content:encoded><![CDATA[<p>Attackers may attempt to execute malicious scripts from suspicious directories or folders accessible by environment variables. This technique leverages script interpreters such as <code>cscript.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, and <code>powershell.exe</code> to run scripts from locations like the Temp directory, the Public user folder, or other user profile directories. The use of these locations can help attackers evade detection, as security tools may not thoroughly inspect files executed from these typically benign locations. This activity has been associated with threat actors such as Shuckworm, known to target Ukraine military.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access, potentially through phishing or exploiting a software vulnerability.</li>
<li>A malicious script is dropped into a suspicious folder such as <code>C:\Users\Public\</code>, <code>%TEMP%</code>, or <code>C:\Users\&lt;username&gt;\AppData\Local\Temp</code>.</li>
<li>The attacker uses <code>cscript.exe</code>, <code>wscript.exe</code>, or <code>mshta.exe</code> to execute the dropped script. The command line may contain flags to bypass execution policies (e.g., <code>-ExecutionPolicy bypass</code>) or hide the window (e.g., <code>-w hidden</code>).</li>
<li>Alternatively, PowerShell may be invoked with the <code>-ep bypass</code> or <code>-ExecutionPolicy Bypass</code> flags, along with a command to execute the script located in the temporary folder.</li>
<li>The script executes, performing malicious actions such as downloading additional payloads, establishing persistence, or exfiltrating data.</li>
<li>The script may leverage built-in Windows utilities for further malicious activities.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a range of damaging outcomes, including system compromise, data theft, and further propagation of malware within the network. Organizations may experience data breaches, financial losses, and reputational damage. The compromise of systems can also disrupt business operations and require extensive recovery efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Script Interpreter Execution From Suspicious Folder</code> to your SIEM to detect suspicious script executions.</li>
<li>Monitor process creation events with a focus on script interpreters (<code>cscript.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>) executing from suspicious directories, using the <code>logsource</code> and <code>detection</code> sections of the Sigma rule as a guide.</li>
<li>Tune the filters in the Sigma rule based on your environment to reduce false positives, as described in the <code>falsepositives</code> section.</li>
<li>Review and block any observed malicious command lines containing flags like <code>-ep bypass</code>, <code>-ExecutionPolicy bypass</code>, or <code>-w hidden</code>, as detailed in the <code>selection_proc_flags</code> section of the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>execution</category><category>script-execution</category><category>malware</category></item><item><title>Braodo Stealer Screen Capture in TEMP Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</guid><description>This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.</description><content:encoded><![CDATA[<p>The Braodo stealer malware is known for capturing screenshots of a victim&rsquo;s desktop as part of its data theft activities. This malware, often distributed through malicious campaigns, targets sensitive information by creating image files of the user&rsquo;s active screen. These screenshots are typically saved in directories that are easily accessible and commonly used by malware, such as temporary folders. This technique allows attackers to gather credentials, financial information, or other confidential data displayed on the screen. The stealer has been observed in campaigns originating from Vietnam, targeting users in the United States with malware, fraud, and dropshipping schemes. Detecting and responding to these types of screen capture attempts is crucial for preventing sensitive data from being compromised and exfiltrated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user unknowingly downloads and executes a malicious file, potentially delivered through a phishing email or drive-by download.</li>
<li>The Braodo stealer malware is executed on the victim&rsquo;s system.</li>
<li>The malware begins capturing screenshots of the victim&rsquo;s desktop using Windows APIs.</li>
<li>The screenshots are saved as .png, .jpg, or .bmp files.</li>
<li>The files are saved in the user&rsquo;s TEMP directory (e.g., C:\Users\<username>\AppData\Local\Temp\).</li>
<li>The malware may compress or encrypt the captured screenshots.</li>
<li>The malware exfiltrates the captured data to a command-and-control server.</li>
<li>The attacker gains access to sensitive information displayed on the victim&rsquo;s screen, such as credentials or financial data, and uses it for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of sensitive information, including credentials, financial data, and personally identifiable information (PII). This can result in financial loss, identity theft, and reputational damage for the victim. The Braodo stealer has been observed targeting users in the United States, indicating a broad scope of potential victims. The malware&rsquo;s ability to capture screenshots allows attackers to bypass multi-factor authentication and other security measures that rely on information displayed on the screen.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (FileCreate) logging to monitor file creation events on endpoints (required for the Sigma rules below).</li>
<li>Deploy the provided Sigma rule <code>Detect Screen Capture Files Created in TEMP Directory</code> to identify potential screen capture activity in temporary directories.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes creating image files in the TEMP directory.</li>
<li>Review and update endpoint security policies to prevent the execution of malware from temporary directories.</li>
<li>Monitor network traffic for suspicious outbound connections from processes creating screen capture files (T1071).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>stealc-stealer</category><category>crypto-stealer</category><category>braodo-stealer</category><category>apt37</category><category>hellcat-ransomware</category><category>vip-keylogger</category><category>screen-capture</category><category>malware</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item><item><title>Suspicious MS Outlook Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-outlook-child-process/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-suspicious-outlook-child-process/</guid><description>Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes of Microsoft Outlook, often associated with spear phishing activity and the execution of malicious attachments. Attackers may leverage malicious documents delivered via email to execute arbitrary code on a victim&rsquo;s machine. The rule focuses on identifying processes such as <code>cmd.exe</code>, <code>powershell.exe</code>, and other system binaries being spawned by Outlook, suggesting the potential execution of malicious attachments or exploitation for initial access. This activity is designed to bypass traditional security measures and gain an initial foothold within the targeted environment. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a spear phishing email with a malicious attachment (e.g., a Microsoft Office document or PDF).</li>
<li>The user opens the attachment, unknowingly triggering embedded malicious code (e.g., macros or exploits).</li>
<li>The malicious code executes within the context of Microsoft Outlook (outlook.exe).</li>
<li>The malicious code spawns a suspicious child process, such as <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, or <code>wscript.exe</code>.</li>
<li>The spawned process executes commands to download and execute further malicious payloads from external sources.</li>
<li>The downloaded payload establishes persistence on the compromised system.</li>
<li>The attacker gains initial access and begins reconnaissance activities.</li>
<li>The attacker moves laterally within the network, escalating privileges and compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to initial access, allowing attackers to gain a foothold within the network, escalate privileges, and potentially exfiltrate sensitive data, deploy ransomware, or conduct other malicious activities. While specific victim counts and sectors are unavailable, similar attacks have targeted a wide range of industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious MS Outlook Child Process Spawning Command Interpreter&rdquo; to your SIEM to detect potential initial access attempts (see rule below).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rules.</li>
<li>Block the execution of commonly abused system binaries (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>, <code>wscript.exe</code>) as child processes of Outlook using application control policies where possible.</li>
<li>Implement and enforce strict macro policies in Microsoft Office applications to prevent the execution of malicious code within documents.</li>
<li>Regularly review and update email security policies to prevent spear phishing emails from reaching users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>phishing</category><category>malware</category><category>windows</category></item></channel></rss>