<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Named-Pipe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/named-pipe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 19:11:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/named-pipe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Privilege Escalation via Rogue Named Pipe Impersonation</title><link>https://feed.craftedsignal.io/briefs/2026-05-privilege-escalation-via-rogue-named-pipe/</link><pubDate>Tue, 12 May 2026 19:11:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-privilege-escalation-via-rogue-named-pipe/</guid><description>An adversary may attempt privilege escalation by masquerading as a known named pipe and manipulating a privileged process to connect to it on Windows systems.</description><content:encoded><![CDATA[<p>The threat involves an adversary attempting to escalate privileges on a Windows system by creating a rogue named pipe. The attacker masquerades the pipe as a legitimate one, tricking a privileged process into connecting to it. This technique is often employed to abuse impersonation privileges, as seen in tools like PrintSpoofer and EfsPotato. By creating a named pipe with a manipulated path (e.g., including <code>\\pipe\\</code> after a path segment that resembles a service/RPC pipe), attackers can intercept and manipulate communication intended for the legitimate service. This can lead to unauthorized command execution or access to sensitive resources with elevated privileges. Detection focuses on identifying suspicious named pipe creations, analyzing the creator process, monitoring client connections, and tracking follow-on activities to determine the likelihood of a successful privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through some vector.</li>
<li>The attacker identifies a privileged process that communicates via named pipes.</li>
<li>The attacker creates a rogue named pipe using <code>CreateNamedPipe</code> API. The pipe path is crafted to resemble a legitimate service&rsquo;s pipe, possibly embedding <code>\\pipe\\</code> after another path segment.</li>
<li>The privileged process connects to the rogue named pipe. The attacker uses techniques to coerce the privileged process to connect to their rogue pipe.</li>
<li>The attacker impersonates the privileged client. After the privileged process connects, the attacker&rsquo;s process impersonates the security context of the client.</li>
<li>The attacker executes commands or accesses resources with the impersonated privileges.</li>
<li>The attacker gains elevated access to the system.</li>
<li>The attacker persists or expands their access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to execute arbitrary commands with elevated privileges, potentially gaining full control of the system. This can lead to data theft, system compromise, or the deployment of further malicious payloads. The attack can potentially affect any Windows system where privileged processes communicate via named pipes. The number of affected systems depends on the scope and effectiveness of the attacker&rsquo;s initial access and lateral movement techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and file creation logging to capture named pipe creation events (as described in the rule setup instructions: <a href="https://ela.st/sysmon-event-pipe-setup)">https://ela.st/sysmon-event-pipe-setup)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Privilege Escalation via Rogue Named Pipe Impersonation&rdquo; to your SIEM and tune false positives based on legitimate local IPC products.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the rogue pipe path (<code>file.name</code>), creator process (<code>process.executable</code>), and any privileged clients connecting to the pipe.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>named-pipe</category><category>windows</category></item><item><title>Privilege Escalation via Named Pipe Impersonation</title><link>https://feed.craftedsignal.io/briefs/2026-05-privesc-named-pipe/</link><pubDate>Tue, 12 May 2026 19:09:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-privesc-named-pipe/</guid><description>Adversaries may escalate privileges by abusing named pipe impersonation, a technique often used with tools like Metasploit's meterpreter getsystem command, where a process writes to a named pipe to facilitate a SYSTEM-token handoff.</description><content:encoded><![CDATA[<p>This rule identifies a privilege escalation attempt via named pipe impersonation, a technique where an adversary leverages a framework such as Metasploit&rsquo;s meterpreter getsystem command to gain elevated privileges. This involves a process, typically cmd.exe or PowerShell.exe, writing to a named pipe. The detection logic focuses on identifying scenarios where a service-context client interacts with a named-pipe server, enabling the server to impersonate the client&rsquo;s token, thereby achieving privilege escalation. The rule is designed to detect this activity by monitoring for specific command-line arguments associated with named pipe creation and usage, indicative of an attempt to exploit this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to a system, possibly through phishing or exploiting a remote vulnerability.</li>
<li>The adversary executes a reconnaissance phase to identify potential privilege escalation vectors.</li>
<li>The attacker uses a tool like Metasploit&rsquo;s meterpreter and attempts to execute the <code>getsystem</code> command.</li>
<li><code>getsystem</code> attempts various techniques to gain SYSTEM privileges. One of these techniques involves named pipe impersonation.</li>
<li>A process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, writes to a named pipe using the <code>echo</code> command with redirection (<code>&gt; \\\\.\\pipe\\*</code>).</li>
<li>A service running as SYSTEM impersonates the client&rsquo;s token.</li>
<li>The attacker gains SYSTEM privileges and can perform administrative tasks.</li>
<li>The adversary leverages their elevated privileges to achieve their final objective, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute commands with SYSTEM privileges, giving them full control over the compromised system. This can lead to sensitive data theft, installation of malware, lateral movement to other systems within the network, and ultimately, complete compromise of the affected environment. The high risk score reflects the severity of this attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect privilege escalation attempts via named pipe impersonation (detects <code>process.args : &quot;echo&quot; and process.args : &quot;&gt;&quot; and process.args : &quot;\\\\.\\pipe\\*&quot; </code>).</li>
<li>Enable Sysmon process creation logging with command-line arguments to ensure the Sigma rule functions correctly (Data Source: Sysmon).</li>
<li>Review and restrict local administrator and service creation rights to prevent untrusted tooling from creating SYSTEM service clients (Post-incident hardening).</li>
<li>Investigate any alerts generated by this rule, focusing on the parent process, token context, and follow-on activity to determine if the named pipe activity is legitimate or malicious (investigation steps outlined in note section).</li>
<li>Continuously monitor Windows Security Event Logs for suspicious process creation events (Data Source: Windows Security Event Logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>named-pipe</category><category>windows</category></item></channel></rss>