<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Password-Stealing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/password-stealing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/password-stealing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unauthorized Access to Chrome Local State File</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</guid><description>Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to the Chrome &lsquo;Local State&rsquo; file, a critical component of the Chrome browser that stores settings and, more importantly, the encrypted master key used to protect saved passwords. The &lsquo;Local State&rsquo; file is typically accessed only by the Chrome browser itself. When other processes attempt to read this file, it&rsquo;s a strong indicator of malicious activity, potentially involving credential theft or reconnaissance by malware such as RedLine Stealer. This analytic leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. Detecting and responding to this activity is crucial for preventing attackers from gaining access to sensitive user credentials stored within the Chrome browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing or exploitation of a software vulnerability (not specified in this advisory).</li>
<li>Malware is deployed on the victim machine (e.g., RedLine Stealer).</li>
<li>The malware attempts to locate the Chrome &lsquo;Local State&rsquo; file, typically found at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Local State</code>.</li>
<li>The malware process accesses the &lsquo;Local State&rsquo; file, triggering a Windows Security Event 4663.</li>
<li>The malware extracts the encrypted master key from the &lsquo;Local State&rsquo; file.</li>
<li>The malware decrypts the master key using attacker-controlled methods.</li>
<li>The decrypted master key is used to decrypt saved passwords stored by Chrome.</li>
<li>The stolen credentials are exfiltrated to the attacker&rsquo;s command and control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials stored in the Chrome browser. This can lead to unauthorized access to email accounts, social media profiles, banking websites, and other sensitive online services. The impact could range from identity theft and financial fraud to corporate espionage and data breaches. The number of potential victims depends on the number of systems compromised and the extent of Chrome usage on those systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to ensure Windows Security Event 4663 is generated for file access, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chrome Local State File Access by Non-Chrome Processes&rdquo; to your SIEM to detect unauthorized access attempts (see &ldquo;rules&rdquo; section). Tune the rule&rsquo;s filter list to reduce false positives related to legitimate software uninstallers.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process name and path involved in accessing the &lsquo;Local State&rsquo; file, as described in the rule&rsquo;s description.</li>
<li>Consider implementing network egress filtering to prevent exfiltration of stolen credentials to known malicious command and control servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>chrome</category></item><item><title>Non-Chrome Process Accessing Chrome Login Data</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</guid><description>This analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to Chrome&rsquo;s &ldquo;Login Data&rdquo; file, a local SQLite database that stores user credentials. Attackers, after gaining initial access to a Windows system, may attempt to steal these credentials by directly accessing and parsing this file. The &ldquo;Login Data&rdquo; file contains sensitive information, including usernames, passwords, and URLs. The technique is commonly associated with credential-stealing malware families like RedLine Stealer, DarkGate, and others listed below. Successful exploitation allows attackers to harvest credentials for lateral movement and further compromise. This detection is based on Windows Security Event logs, specifically event ID 4663, which records attempts to access objects like files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a malicious executable or script on the compromised system.</li>
<li>The malicious process attempts to access the Chrome &ldquo;Login Data&rdquo; file, typically located at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data</code>.</li>
<li>Windows Security Event Log generates an event with EventCode 4663, recording the file access attempt.</li>
<li>The attacker&rsquo;s process reads the &ldquo;Login Data&rdquo; SQLite database.</li>
<li>The attacker extracts and potentially decrypts stored usernames and passwords from the &ldquo;Login Data&rdquo; file.</li>
<li>The attacker uses the stolen credentials for lateral movement within the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Chrome &ldquo;Login Data&rdquo; files can lead to widespread credential theft, granting attackers unauthorized access to numerous online accounts. Depending on the user&rsquo;s browsing habits and password reuse, this can include access to sensitive corporate resources, financial accounts, and personal email. The impact can range from financial loss to significant data breaches and reputational damage. The references section in the original source mentions Redline Stealer which is used in various attacks, indicating a potentially large number of victims across different sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to generate Windows Security Event 4663, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule <code>Chrome Login Data Accessed by Non-Browser Process</code> to your SIEM and tune the <code>process_path</code> filter to exclude legitimate software in your environment.</li>
<li>Investigate any alerts generated by the <code>Chrome Login Data Accessed by Non-Browser Process</code> Sigma rule to determine if credential theft has occurred and remediate any affected accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>windows</category></item></channel></rss>