<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Persistence — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/persistence/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/persistence/feed.xml" rel="self" type="application/rss+xml"/><item><title>Service DACL Modification via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</guid><description>Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the modification of Discretionary Access Control Lists (DACLs) for Windows services using the <code>sc.exe</code> utility. Attackers can leverage this technique to deny access to a service, making it unmanageable or hiding it from system administrators and users. The detection rule focuses on identifying instances where <code>sc.exe</code> is used with the <code>sdset</code> argument, specifically targeting the denial of access for key user groups such as IU, SU, BA, SY, and WD. This activity is indicative of a defense evasion attempt aimed at hindering security tools or preventing remediation. The rule is designed for data generated by Elastic Defend, but also supports integrations with third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, offering broad coverage for detecting this malicious behavior across diverse environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker elevates privileges to gain necessary permissions to modify service configurations.</li>
<li>The attacker executes <code>sc.exe</code> with the <code>sdset</code> command to modify the DACL of a targeted service.</li>
<li>The <code>sdset</code> command arguments specify the new security descriptor, denying access to specific user groups (e.g., IU, SU, BA, SY, WD).</li>
<li>The service becomes inaccessible to the targeted user groups, potentially disrupting legitimate operations or security tools.</li>
<li>The attacker may repeat this process for multiple services to further impair system functionality or evade detection.</li>
<li>The attacker leverages the disabled or hidden services to maintain persistence or carry out other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service DACLs can lead to a denial-of-service condition for legitimate users and system administrators. This can impair the functionality of critical security tools, hinder incident response efforts, and provide attackers with a persistent foothold on the compromised system. The hiding of services can also prevent users from identifying and removing malicious services. While the number of victims is not specified in the source, organizations across various sectors are potentially vulnerable to this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service DACL Modification via sc.exe</code> to your SIEM to detect this specific behavior.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any instances where <code>sc.exe</code> is used with the <code>sdset</code> argument and access denial flags, focusing on the targeted user groups (IU, SU, BA, SY, WD).</li>
<li>Implement strict access controls and monitor for unauthorized attempts to modify service configurations.</li>
<li>Regularly audit service permissions to identify and remediate any unauthorized changes.</li>
<li>Review and update endpoint protection policies to prevent similar threats in the future, ensuring that all systems are equipped with the latest security patches and configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>GenAI Tools Accessing Sensitive Files for Credential Access and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</link><pubDate>Fri, 01 May 2026 22:46:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-15-genai-sensitive-file-access/</guid><description>This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging GenAI agents to automate the discovery and exfiltration of sensitive information, including credentials, API keys, and tokens stored within files on compromised systems. The observed activity involves GenAI tools accessing critical files such as cloud credentials, SSH keys, browser password databases, and shell configuration files. Successful exploitation allows attackers to harvest credentials, gain unauthorized access to systems, and establish persistence mechanisms for continued access. The GenAI tools mentioned include ollama, textgen, lmstudio, claude, cursor, copilot, codex, jan, gpt4all, gemini-cli, genaiscript, grok, qwen, koboldcpp, llama-server, windsurf, zed, opencode, and goose. This activity highlights the emerging threat landscape of AI-assisted attacks and the need for robust detection and mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an unrelated vulnerability or social engineering.</li>
<li>Installation or execution of a GenAI tool (e.g., ollama, lmstudio) on the compromised system.</li>
<li>The GenAI tool is configured or instructed to scan the file system for sensitive files.</li>
<li>The GenAI tool accesses files containing credentials, such as <code>.aws/credentials</code>, browser password databases (<code>Login Data</code>, <code>key3.db</code>), or SSH keys (<code>.ssh/id_*</code>).</li>
<li>The GenAI tool exfiltrates the harvested credentials and API keys to a remote server controlled by the attacker.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to cloud resources, internal systems, or other sensitive accounts.</li>
<li>The GenAI tool attempts to modify shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>Upon system restart or user login, the modified shell configuration executes malicious commands, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this threat can lead to significant data breaches, unauthorized access to critical systems, and persistent compromise of affected environments. Attackers can leverage stolen credentials to escalate privileges, move laterally within the network, and exfiltrate sensitive data. The number of victims and sectors targeted are currently unknown, but the potential impact is widespread given the increasing adoption of GenAI tools in various industries. Credential theft leads to financial loss, intellectual property theft, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Accessing Sensitive Files&rdquo; to your SIEM to detect GenAI tools accessing sensitive files on endpoints.</li>
<li>Enable file access monitoring on systems where GenAI tools are used to capture access events for analysis.</li>
<li>Review and restrict the use of GenAI tools within the environment, especially concerning access to sensitive file paths.</li>
<li>Monitor for modifications to shell configuration files (e.g., <code>.bashrc</code>, <code>.zshrc</code>, <code>.profile</code>) as an indicator of persistence attempts.</li>
<li>Implement regular credential rotation policies to minimize the impact of stolen credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>genai</category><category>credential-access</category><category>persistence</category><category>collection</category></item><item><title>AWS IAM Privilege Operations via Lambda Execution Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-aws-lambda-iam-privilege-escalation/</guid><description>Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.</description><content:encoded><![CDATA[<p>This threat focuses on the abuse of AWS Lambda execution roles to perform sensitive IAM operations. Lambda functions, often running with over-permissioned roles, can be exploited by adversaries to escalate privileges and establish persistence within an AWS environment. An attacker gaining control of a Lambda function can leverage its execution role to make IAM API calls that would normally require elevated permissions. This includes creating new IAM users or roles, attaching policies to existing IAM entities, and modifying EC2 instance profiles. The scope of this threat includes any AWS environment utilizing Lambda functions with IAM permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Lambda function, either through code injection, vulnerable dependencies, or misconfiguration.</li>
<li>The attacker leverages the Lambda function&rsquo;s execution role, which has excessive IAM permissions.</li>
<li>The attacker executes IAM API calls, such as <code>CreateUser</code>, <code>CreateRole</code>, or <code>CreateAccessKey</code>, to create new IAM identities.</li>
<li>The attacker uses <code>AttachUserPolicy</code>, <code>PutUserPolicy</code>, <code>AttachRolePolicy</code>, or <code>PutRolePolicy</code> to grant elevated permissions to the newly created or existing IAM identities.</li>
<li>The attacker modifies instance profiles using <code>CreateInstanceProfile</code> and <code>AddRoleToInstanceProfile</code> to prepare EC2 instances for lateral movement.</li>
<li>The attacker uses the newly created or modified IAM identities to assume roles and access resources they were not previously authorized to access via <code>sts:AssumeRole</code>.</li>
<li>The attacker achieves privilege escalation, gaining control over sensitive AWS resources and services.</li>
<li>The attacker establishes persistence by creating rogue IAM users, roles, or access keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to full compromise of the AWS environment. An attacker could create highly privileged IAM users and roles, granting them the ability to access and control all AWS resources. This can result in data breaches, service disruptions, and financial losses. The impact is magnified in environments where Lambda functions are heavily relied upon for critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Sensitive Operations via Lambda Execution Role&rdquo; to your SIEM and tune for your environment to detect the described IAM API calls originating from Lambda execution roles.</li>
<li>Review and restrict the permissions granted to Lambda execution roles, following the principle of least privilege, to minimize the potential impact of a compromised function.</li>
<li>Monitor <code>aws.cloudtrail.user_identity.arn</code> to identify the Lambda function and associated deployment path responsible for the IAM API calls.</li>
<li>Investigate <code>aws.cloudtrail.request_parameters</code> for targets such as <code>userName</code>, <code>groupName</code>, <code>roleName</code>, <code>policyArn</code>, or <code>instanceProfileName</code> to understand the scope of the IAM operations.</li>
<li>Revoke or rotate the credentials of any compromised Lambda execution roles to prevent further unauthorized access.</li>
<li>Remediate any rogue IAM users, roles, or access keys created by the attacker to eliminate persistence mechanisms.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>iam</category><category>lambda</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Google Workspace Login Attempt with Government Attack Warning</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</link><pubDate>Tue, 28 Apr 2026 00:48:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-gworkspace-govattack/</guid><description>A Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.</description><content:encoded><![CDATA[<p>This alert focuses on identifying potentially malicious login attempts within Google Workspace environments. The detection is based on Google&rsquo;s own flagging of a login as a potential &ldquo;gov_attack_warning,&rdquo; suggesting that Google&rsquo;s threat intelligence attributes the activity to a government-backed actor. While specific targeting information is unavailable, this alert highlights a critical area for investigation within organizations utilizing Google Workspace, especially those handling sensitive data or operating in sectors of interest to nation-state actors. This detection provides an early warning of potential compromise or data exfiltration attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker attempts to log into a Google Workspace account using compromised or brute-forced credentials.</li>
<li><strong>Login Attempt:</strong> The login attempt triggers a &ldquo;gov_attack_warning&rdquo; within Google Workspace, indicating a potential government-backed threat actor.</li>
<li><strong>Privilege Escalation (Potential):</strong> If the compromised account has elevated privileges, the attacker may attempt to escalate privileges within the Google Workspace environment.</li>
<li><strong>Defense Evasion (Potential):</strong> The attacker may attempt to disable security features or modify audit logs to evade detection.</li>
<li><strong>Persistence (Potential):</strong> The attacker may establish persistent access through methods such as creating rogue apps or modifying account settings.</li>
<li><strong>Data Access:</strong> The attacker gains access to sensitive data stored within Google Workspace, such as documents, emails, and files.</li>
<li><strong>Exfiltration (Potential):</strong> The attacker exfiltrates the stolen data to an external location.</li>
<li><strong>Impact:</strong> The organization suffers a data breach, reputational damage, and potential financial losses.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to the compromise of sensitive data within the Google Workspace environment, including confidential documents, emails, and other business-critical information. The potential consequences range from reputational damage and legal liabilities to financial losses and disruption of business operations. The number of affected users and the severity of the impact will depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;gov_attack_warning&rdquo; events in Google Workspace logs.</li>
<li>Investigate any triggered alerts promptly, focusing on the affected user account and associated activity.</li>
<li>Review the Google Workspace audit logs for any suspicious activity leading up to the &ldquo;gov_attack_warning&rdquo; event.</li>
<li>Implement multi-factor authentication (MFA) for all Google Workspace accounts, especially those with elevated privileges.</li>
<li>Monitor Google Workspace activity logs for suspicious patterns, such as unusual login locations, failed login attempts, and changes to account settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>googleworkspace</category><category>intrusion</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Linux Persistence via Sudoers.d File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</link><pubDate>Mon, 27 Apr 2026 23:12:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</guid><description>Attackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.</description><content:encoded>&lt;p>The sudoers.d directory on Linux systems is designed to allow administrators to manage sudo privileges by adding individual files rather than modifying the main /etc/sudoers file. An attacker who gains initial access to a system can exploit this by creating or modifying files within this directory to grant themselves or other malicious actors elevated privileges. This can be done to ensure persistent access, even if other initial access methods are detected and remediated. The modification of…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>linux</category><category>sudoers</category></item><item><title>GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</link><pubDate>Wed, 22 Apr 2026 16:34:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-genai-sensitive-file-access/</guid><description>This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.</description><content:encoded><![CDATA[<p>Attackers are increasingly exploiting GenAI tools to automate the discovery and exfiltration of sensitive information from compromised systems. This involves using GenAI agents to systematically scan file systems for credentials, API keys, tokens, and other secrets. Access to credential stores (.aws/credentials, .ssh/id_*) indicates credential harvesting, while modifications to shell configuration files (.bashrc, .zshrc) point to persistence attempts.  The observed activity leverages legitimate GenAI tool functionality, making it difficult to distinguish between benign use and malicious intent.  This technique has become more prevalent since late 2025, with attackers refining methods to instruct GenAI agents to specifically target and exfiltrate sensitive files. Defenders must monitor for unusual file access patterns by GenAI processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system via phishing or exploiting a software vulnerability.</li>
<li>Attacker installs or deploys a GenAI tool (e.g., LM Studio, Claude, Copilot) on the compromised system.</li>
<li>The attacker configures the GenAI tool to scan the file system for specific file names and patterns associated with sensitive data (credentials, keys, cookies).</li>
<li>The GenAI tool accesses files such as <code>.aws/credentials</code>, <code>.ssh/id_rsa</code>, browser login databases (e.g., <code>Login Data</code>, <code>logins.json</code>, <code>Cookies</code>), and other credential stores.</li>
<li>The GenAI tool may modify shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>) to establish persistence.</li>
<li>The GenAI tool stages the collected data for exfiltration.</li>
<li>The attacker exfiltrates the harvested credentials and data to an external server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread credential compromise, allowing attackers to move laterally within a network, access sensitive data, and potentially disrupt critical business operations. A single compromised developer workstation could expose cloud infrastructure credentials, impacting hundreds of systems and services. The use of GenAI tools allows for rapid and automated credential harvesting, significantly increasing the scale and speed of potential breaches. Sectors at high risk include software development, cloud computing, and any organization that relies heavily on API keys and secrets for authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>GenAI Process Accessing Sensitive Files</code> to your SIEM to detect GenAI tools accessing sensitive files. Tune for your environment to reduce false positives.</li>
<li>Monitor file access events, specifically looking for GenAI processes (ollama, lmstudio, claude) accessing files with names like <code>credentials</code>, <code>id_rsa</code>, <code>logins.json</code>, and <code>.bashrc</code>, as outlined in the Sigma rule.</li>
<li>Implement stricter access controls and monitoring for sensitive directories like <code>.aws</code>, <code>.ssh</code>, and browser profile directories.</li>
<li>Regularly audit and rotate credentials, API keys, and tokens, especially those stored in files.</li>
<li>Educate developers and users about the risks of using GenAI tools to handle sensitive data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>genai</category><category>file-access</category><category>persistence</category></item><item><title>State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)</title><link>https://feed.craftedsignal.io/briefs/2026-04-state-sponsored-access/</link><pubDate>Tue, 14 Apr 2026 13:51:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-state-sponsored-access/</guid><description>In 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.</description><content:encoded><![CDATA[<p>In 2025, state-sponsored threat actors from China, Russia, North Korea, and Iran exhibited distinct motivations, ranging from espionage and disruption to financial gain and geopolitical influence. Despite these varying objectives, these actors employed similar tactics, techniques, and procedures (TTPs), particularly regarding initial access and persistence. A common thread was the exploitation of both newly disclosed (e.g., ToolShell by China) and long-standing vulnerabilities in networking devices and widely used software. Identity-based attacks, including social engineering and the use of stolen credentials, were also prominent. North Korea notably stole $1.5 billion in cryptocurrency and generated billions through fraudulent IT work using AI-generated profiles. Iranian actors combined disruptive hacktivism with advanced persistent threat (APT) activity, such as the ShroudedSnooper group targeting telecommunications for long-term access. The focus across these actors was on establishing a persistent presence within compromised networks, often remaining undetected for extended periods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Vulnerability Exploitation (Initial Access):</strong> Actors exploit vulnerabilities in networking devices and widely used software, leveraging both newly disclosed and unpatched flaws.</li>
<li><strong>Social Engineering (Initial Access):</strong> North Korean actors use fake recruiter personas via campaigns like Contagious Interview to trick targets into executing code or handing over credentials.</li>
<li><strong>Credential Harvesting (Privilege Escalation/Persistence):</strong> After initial access, actors harvest credentials to gain further access within the network.</li>
<li><strong>Web Shell Deployment (Persistence):</strong> Chinese actors deploy web shells for persistent access to compromised systems.</li>
<li><strong>Custom Backdoor Installation (Persistence):</strong> Backdoors, including compact custom backdoors like those used by ShroudedSnooper, are deployed to maintain long-term access.</li>
<li><strong>Tunneling (Command &amp; Control):</strong> Actors use tunneling tools to maintain covert communication channels with compromised systems.</li>
<li><strong>Data Exfiltration (Exfiltration):</strong> Actors exfiltrate sensitive data, including espionage-related information or financial data such as cryptocurrency.</li>
<li><strong>Disruption/Espionage (Impact):</strong> Depending on the actor and objective, the final stage involves disruptive activities like DDoS attacks or long-term espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed state-sponsored activity resulted in significant financial losses, espionage, and disruptive attacks. North Korean actors stole $1.5 billion in cryptocurrency and generated billions in revenue through fraudulent IT work, impacting financial institutions and various Fortune 500 companies. Iranian hacktivist operations caused disruption through DDoS attacks and defacements. Espionage campaigns targeted sectors such as telecommunications, potentially compromising sensitive communications and intellectual property. The persistent nature of these attacks allows for long-term monitoring and potential future exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Prioritize patching of both newly disclosed and long-standing vulnerabilities in networking devices and software to mitigate initial access (Reference: Overview, Attack Chain Step 1).</li>
<li>Implement robust identity and access management controls, including multi-factor authentication and monitoring for suspicious login activity, to counter social engineering and credential-based attacks (Reference: Attack Chain Step 2 &amp; 3).</li>
<li>Increase visibility into network and edge infrastructure by enabling comprehensive logging and monitoring to detect unauthorized access and persistence mechanisms (Reference: Attack Chain Steps 4, 5, &amp; 6).</li>
<li>Deploy the Sigma rules below to detect suspicious web shell activity and backdoor installations (Reference: Rules).</li>
<li>Monitor network traffic for unusual patterns and connections indicative of tunneling or data exfiltration (Reference: Attack Chain Steps 6 &amp; 7).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>state-sponsored</category><category>apt</category><category>persistence</category><category>vulnerability-exploitation</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</link><pubDate>Tue, 14 Apr 2026 12:50:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</guid><description>Scripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.</description><content:encoded><![CDATA[<p>This brief covers suspicious registry modifications made by scripting engine processes like WScript, CScript, and MSHTA. These processes are often abused by attackers to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence. Legitimate use of these scripting engines to modify the registry is uncommon, making this behavior a good indicator of potential malicious activity. Defenders should monitor for these processes interacting with sensitive registry keys. This activity was observed as of 2025 and continues to be a relevant technique for persistence and defense evasion in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or social engineering.</li>
<li>The attacker uses MSHTA.exe to execute malicious HTML Application code.</li>
<li>MSHTA.exe is used to launch a PowerShell script.</li>
<li>The PowerShell script uses the Registry module to add a new registry key.</li>
<li>The registry key is configured to execute a payload upon system startup.</li>
<li>The attacker uses wscript.exe or cscript.exe to execute VBScript or JScript.</li>
<li>The script modifies registry values to disable security features.</li>
<li>The compromised system restarts, executing the payload defined in the registry, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistence on the targeted system, enabling them to maintain access even after a reboot. This can lead to data theft, further malware deployment, or complete system compromise. The impact ranges from minor data breaches to significant operational disruptions. The scope of the impact depends on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect this specific activity, and tune for your environment (rules).</li>
<li>Investigate any instances of wscript.exe, cscript.exe or mshta.exe modifying registry keys outside of known-good paths (rules).</li>
<li>Monitor registry events for unexpected modifications by scripting engines, focusing on persistence-related keys (rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>registry-modification</category><category>persistence</category><category>defense-evasion</category><category>scripting-engine</category></item><item><title>Entra ID ADRS Token Request by Microsoft Authentication Broker</title><link>https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</link><pubDate>Fri, 10 Apr 2026 17:57:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-adrs-token-request/</guid><description>Detects suspicious OAuth 2.0 token requests where the Microsoft Authentication Broker requests access to the Device Registration Service on behalf of a user principal, potentially indicating an attempt to abuse device registration for unauthorized persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious activity within Microsoft Entra ID (Azure AD) involving the Microsoft Authentication Broker (MAB). Specifically, it focuses on OAuth 2.0 token requests where MAB (application ID 29d9ed98-a469-4536-ade2-f981bc1d605e) requests access to the Device Registration Service (DRS) (resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9) on behalf of a user. The presence of the <code>adrs_access</code> scope within the authentication processing details signals an attempt to interact with the ADRS (Azure Device Registration Service), an action not typically associated with standard user sign-ins. This behavior could indicate an attacker attempting to abuse device registration mechanisms to achieve persistence, such as acquiring a Primary Refresh Token (PRT) or establishing a trusted session. The Volexity report from April 2025 highlights similar OAuth workflow targeting.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises user credentials through phishing or other means.</li>
<li>Attacker leverages the compromised credentials to initiate an OAuth 2.0 authentication flow.</li>
<li>The Microsoft Authentication Broker is used to request an access token.</li>
<li>The request targets the Device Registration Service (DRS) with resource ID 01cb2876-7ebd-4aa4-9cc9-d28bd4d359a9.</li>
<li>The OAuth scope includes <code>adrs_access</code>, indicating an attempt to access ADRS functionalities.</li>
<li>The request is made using a refresh token, suggesting an attempt to establish persistent access.</li>
<li>Successful token acquisition allows the attacker to manipulate device registration or acquire a Primary Refresh Token (PRT).</li>
<li>The attacker uses the PRT or device registration to maintain unauthorized access to resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow an attacker to maintain persistent access to an organization&rsquo;s cloud resources, even after a user changes their password or is removed from the organization. This can lead to data exfiltration, lateral movement, and further compromise of sensitive information. The number of potentially affected users depends on the scope of the initial compromise and the effectiveness of the attacker&rsquo;s persistence mechanisms. This attack targets any organization using Microsoft Entra ID.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID ADRS Token Request by Microsoft Authentication Broker&rdquo; to your SIEM and tune it for your environment to detect suspicious ADRS access attempts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user principal and the origin of the request.</li>
<li>Review Conditional Access policies to ensure they are sufficient to prevent unauthorized access to sensitive resources.</li>
<li>Monitor Entra ID audit logs for device registrations or changes to user&rsquo;s device registration status as suggested in the rule&rsquo;s triage steps.</li>
<li>Correlate with primary refresh token (PRTs) usage for the same user and/or session ID to identify any potential abuse, as mentioned in the rule&rsquo;s triage.</li>
<li>Consider adjusting the rule or adding exceptions for specific applications or user accounts that legitimately require access to the Device Registration Service, based on false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>persistence</category><category>oauth</category></item><item><title>AWS IAM Login Profile Added for Root</title><link>https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-aws-root-login-profile/</guid><description>An adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.</description><content:encoded><![CDATA[<p>This rule detects the creation of a console login profile for the AWS account root user, a highly privileged account. While <code>CreateLoginProfile</code> is normally applied to IAM users, when executed from a temporary root session (e.g., via <code>AssumeRoot</code>) without specifying a <code>userName</code>, the profile is created for the root principal. This activity is especially concerning because it provides persistent access. An attacker gaining temporary root access via STS or credential compromise might exploit this to set a root password. The attacker can then use this new password to log in through the console. This method circumvents traditional access key rotation or disabling and can be employed even after the initial vulnerability is patched. This activity started being tracked on 2024-12-02, defenders need to be aware of this persistence mechanism and promptly investigate any such incidents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account with sufficient privileges, possibly through compromised credentials or an STS session.</li>
<li>The attacker executes the <code>AssumeRoot</code> API call to assume the privileges of the root user.</li>
<li>The attacker uses the <code>CreateLoginProfile</code> API call without specifying a <code>userName</code>. This action creates a console login profile directly for the root account instead of an IAM user. The <code>aws.cloudtrail.request_parameters</code> will not contain <code>userName=</code>.</li>
<li>The attacker sets a password for the root account using the <code>CreateLoginProfile</code> API. <code>passwordResetRequired</code> might be set to <code>true</code> or omitted, with omission potentially indicating an attacker-controlled password.</li>
<li>The attacker uses the newly created root account password to log in to the AWS Management Console. The event will be logged as a <code>ConsoleLogin</code> event.</li>
<li>The attacker uses the root account&rsquo;s privileges to create or modify resources, escalate privileges, or exfiltrate data.</li>
<li>The attacker maintains persistence by using the console login, even if the initially compromised credentials or temporary session tokens are revoked.</li>
<li>The attacker may also create new IAM users or roles with elevated permissions to further solidify their presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete control over the AWS environment. The attacker can create, modify, or delete resources; access sensitive data; and disrupt services. Because the root user has unrestricted privileges, the impact is extremely high. There have been no reported victim counts. However, any successful exploitation can have severe impacts including data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM Login Profile Added for Root&rdquo; to detect unauthorized creation of login profiles for the root account and tune for your environment.</li>
<li>Investigate any <code>CreateLoginProfile</code> events where <code>aws.cloudtrail.user_identity.type</code> is <code>Root</code> and <code>aws.cloudtrail.request_parameters</code> does not contain <code>userName=</code>.</li>
<li>Enable CloudTrail, GuardDuty, AWS Config, and Security Hub across all regions for continuous monitoring of root and IAM activity to improve overall visibility.</li>
<li>Review IAM policies for least-privilege adherence, focusing on <code>iam:CreateLoginProfile</code>, <code>iam:UpdateLoginProfile</code>, and <code>iam:CreateAccessKey</code> permissions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>persistence</category></item><item><title>First Time Python Process Creates macOS Launch Agent or Daemon</title><link>https://feed.craftedsignal.io/briefs/2026-06-python-launch-agent-persistence/</link><pubDate>Wed, 08 Apr 2026 21:12:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-python-launch-agent-persistence/</guid><description>This rule detects the initial creation or modification of a macOS LaunchAgent or LaunchDaemon plist file by a Python process, a common persistence technique employed by attackers using malicious scripts, compromised dependencies, or model file deserialization.</description><content:encoded><![CDATA[<p>This threat brief highlights the malicious use of Python to establish persistence on macOS systems. Attackers can achieve Python code execution through various means, including malicious scripts, compromised dependencies, or even model file deserialization vulnerabilities (such as pickle or PyTorch <code>__reduce__</code> exploits). Once code execution is achieved, attackers can drop plist files into LaunchAgent or LaunchDaemon directories, ensuring their payload survives reboots and user logouts. This persistence mechanism allows the attacker to maintain access and control over the compromised host. Legitimate Python processes typically do not create persistence mechanisms in this manner, making the first occurrence of such activity a strong indicator of compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the macOS system through methods such as exploiting vulnerabilities, social engineering, or phishing.</li>
<li>The attacker achieves code execution within a Python process. This can occur via a malicious script, a compromised Python package, or by exploiting deserialization vulnerabilities like <code>pickle.load</code> or <code>torch.load</code>.</li>
<li>The malicious Python script crafts a LaunchAgent or LaunchDaemon plist file. This plist file contains configuration details about the program to be executed, including its path, arguments, and execution triggers.</li>
<li>The Python process writes the crafted plist file to either the <code>/Library/LaunchAgents/</code> (for user-level persistence) or <code>/Library/LaunchDaemons/</code> (for system-level persistence) directory.</li>
<li>The LaunchAgent or LaunchDaemon is automatically loaded by <code>launchd</code> at login or boot, according to the configuration specified in the plist file.</li>
<li>The program specified in the plist file is executed, giving the attacker persistent access to the compromised system.</li>
<li>The attacker can then use this persistent access to perform various malicious activities, such as data exfiltration, lateral movement, or deploying additional malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistent compromise of macOS systems. Attackers can maintain unauthorized access, execute arbitrary code, steal sensitive data, or use the compromised system as a foothold for further attacks within the network. The impact can range from individual user data theft to widespread organizational breaches, depending on the attacker&rsquo;s objectives and the system&rsquo;s role within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Python Launch Agent/Daemon Creation&rdquo; to your SIEM to identify when a Python process creates a LaunchAgent or LaunchDaemon plist file.</li>
<li>Enable Elastic Defend endpoint logging to capture <code>event.action:&quot;launch_daemon&quot;</code> events, which are necessary for the Sigma rule to function correctly.</li>
<li>Prioritize investigation of alerts generated by the Sigma rule, focusing on understanding the program arguments, run-at-load configuration, and keep-alive settings within the created plist file.</li>
<li>Implement strict dependency management and vulnerability scanning for Python environments to prevent the use of compromised packages.</li>
<li>Monitor for processes loading model files (<code>torch.load</code>, <code>pickle.load</code>) and investigate any suspicious activity to prevent exploitation of deserialization vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>macos</category><category>python</category></item><item><title>Coder Code-Marketplace Zip Slip Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</link><pubDate>Sat, 04 Apr 2026 06:29:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</guid><description>A Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.</description><content:encoded><![CDATA[<p>A Zip Slip vulnerability (CVE-2026-35454) exists in the Coder code-marketplace application, specifically in versions up to 2.4.1. The vulnerability stems from improper sanitization of zip entry names during VSIX file extraction, which allows an attacker to write files to arbitrary locations on the server. This flaw, discovered by Kandlaguduru Vamsi and detailed in GHSA-8x9r-hvwg-c55h, can be exploited by any authenticated user with upload privileges. Successful exploitation could lead to persistence via cron/init injection, SSH key injection, <code>ld.so.preload</code> hijacking, or binary overwrite. The vulnerability was patched in version 2.4.2. Defenders should upgrade to the latest version of the code-marketplace application to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with upload privileges logs into the code-marketplace application.</li>
<li>The attacker crafts a malicious VSIX file containing zip entries with path traversal sequences (e.g., &ldquo;../../../etc/cron.d/evil&rdquo;).</li>
<li>The attacker uploads the malicious VSIX file through the application&rsquo;s extension upload functionality.</li>
<li>The <code>ExtractZip</code> function processes the uploaded VSIX file without proper sanitization of zip entry names.</li>
<li>The <code>filepath.Join</code> function constructs the output path using the unsanitized zip entry name and a base directory.</li>
<li>Path traversal sequences like <code>..</code> are resolved by <code>filepath.Clean</code>, but the resulting path is not checked against the intended base directory, allowing it to escape.</li>
<li>The application writes the extracted file to an attacker-controlled location on the server&rsquo;s file system.</li>
<li>The attacker achieves persistence, privilege escalation, or arbitrary code execution by overwriting critical system files or injecting malicious code into system configurations like cron jobs or SSH authorized keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this Zip Slip vulnerability allows attackers to write arbitrary files to the underlying system. An attacker can achieve persistence by injecting malicious cron jobs or modifying system initialization scripts. Privilege escalation is possible via SSH key injection or by overwriting binaries with malicious versions. The impact ranges from system compromise to data exfiltration and denial of service. While the number of victims is unknown, any organization using vulnerable versions of the Coder code-marketplace application is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the coder/code-marketplace application to version 2.4.2 or later to remediate CVE-2026-35454.</li>
<li>Implement file integrity monitoring on critical system directories (e.g., /etc/cron.d, /root/.ssh) using a file_event log source to detect unauthorized file modifications.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious File Creation in Sensitive Directories&rdquo; to detect potential exploitation attempts based on file creation events.</li>
<li>Enable webserver logging and deploy the provided Sigma rule &ldquo;Detect VSIX Uploads with Path Traversal&rdquo; to identify suspicious VSIX uploads containing path traversal sequences based on request parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zip-slip</category><category>path-traversal</category><category>code-marketplace</category><category>persistence</category></item><item><title>BRICKSTORM Malware Targeting VMware vSphere Environments</title><link>https://feed.craftedsignal.io/briefs/2026-04-brickstorm-vsphere/</link><pubDate>Thu, 02 Apr 2026 13:55:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brickstorm-vsphere/</guid><description>The BRICKSTORM malware targets VMware vSphere environments, specifically vCenter Server Appliance (VCSA) and ESXi hypervisors, by exploiting weak security configurations to establish persistence at the virtualization layer, leading to administrative control and potential data exfiltration.</description><content:encoded><![CDATA[<p>The BRICKSTORM campaign targets VMware vSphere environments, with a focus on the vCenter Server Appliance (VCSA) and ESXi hypervisors. This campaign, building on previous BRICKSTORM research, highlights the increasing threats targeting virtualized infrastructure. By gaining persistence at the virtualization layer, attackers bypass traditional security measures, such as endpoint detection and response (EDR) agents, which are often ineffective in these environments. The attackers exploit weak security architectures, identity design flaws, lack of host-based configuration enforcement, and limited visibility within the virtualization layer. This allows them to maintain long-term persistence and gain administrative control over the entire vSphere environment, making the VCSA a prime target due to its centralized control. This activity is not due to vendor vulnerabilities but rather misconfigurations and security gaps. vSphere 7 reached End of Life (EoL) in October 2025, so organizations using this version are at increased risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the vSphere environment, potentially through compromised credentials or vulnerabilities in externally facing services.</li>
<li><strong>VCSA Compromise:</strong> The attacker targets the vCenter Server Appliance (VCSA) to gain centralized control over the vSphere environment.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges within the VCSA to gain root or administrative access to the underlying Photon Linux OS.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by modifying system files or creating malicious services that survive reboots. This may involve writing scripts to <code>/etc/rc.local.d</code> or modifying startup files.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised VCSA to move laterally to other ESXi hosts and virtual machines within the environment.</li>
<li><strong>Data Access:</strong> The attacker accesses the underlying storage (VMDKs) of virtual machines, bypassing operating system permissions and traditional file system security, to exfiltrate sensitive data.</li>
<li><strong>Control of ESXi Hosts:</strong> The attacker resets root credentials on any managed ESXi host, providing full control of the hypervisor.</li>
<li><strong>Impact:</strong> The attacker can power off, delete, or reconfigure any virtual machine, encrypt datastores, disable virtual networks, and exfiltrate data. The ultimate objective could be data theft, disruption of services, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful BRICKSTORM attack can have severe consequences, including complete compromise of the vSphere environment. This can lead to data exfiltration of Tier-0 assets, disruption of critical services (such as domain controllers), and potential ransomware deployment across all virtual machines. Organizations may face significant financial losses, reputational damage, and legal liabilities. The lack of command-line logging on the Photon OS shell further hinders incident response efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Harden the vCenter Server Appliance (VCSA) by implementing the security configurations recommended in the Mandiant vCenter Hardening Script (reference: vCenter Hardening Script link in Overview).</li>
<li>Implement logging and monitoring for the Photon OS shell to detect unauthorized access and command execution (reference: Phase 4 in Content).</li>
<li>Upgrade to a supported version of vSphere to receive critical security patches (reference: vSphere 7 End of Life in Content).</li>
<li>Enable Secure Boot, strictly firewall management interfaces, and disable shell access on ESXi hosts and the VCSA (reference: Technical Hardening in Content).</li>
<li>Deploy the Sigma rule to detect modifications to startup files for persistence on Photon OS (reference: Sigma rule: &ldquo;Detect Startup File Modification in Photon OS&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vsphere</category><category>virtualization</category><category>brickstorm</category><category>persistence</category><category>lateral-movement</category></item><item><title>SSH Authorized Key File Modification Inside a Container</title><link>https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</guid><description>The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.</description><content:encoded><![CDATA[<p>This detection focuses on identifying malicious actors who modify SSH authorized_keys files inside containers to gain unauthorized access. SSH authorized keys are used for public key authentication, and modification of these files allows attackers to maintain persistence or move laterally within a containerized environment. The rule specifically looks for file creation and modification events of authorized_keys files within Linux-based containers. Introduced as part of the Defend for Containers integration in Elastic Stack version 9.3.0, this detection is crucial because unauthorized SSH access can lead to significant compromise within cloud environments and containerized workloads. Defenders need to be aware of unexpected SSH key modifications as indicators of compromise inside containerized environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through a software vulnerability or misconfiguration.</li>
<li>The attacker executes commands within the container to locate the SSH authorized_keys file (typically located at <code>/home/&lt;user&gt;/.ssh/authorized_keys</code> or <code>/root/.ssh/authorized_keys</code>).</li>
<li>The attacker modifies the authorized_keys file, adding their own SSH public key to the file using commands like <code>echo &quot;ssh-rsa AAAAB3Nz...&quot; &gt;&gt; /root/.ssh/authorized_keys</code>.</li>
<li>The attacker uses the newly added SSH key to authenticate and log into the container without needing a password.</li>
<li>The attacker uses the SSH session to execute further commands, potentially escalating privileges or moving laterally to other containers or systems.</li>
<li>The attacker maintains persistence by ensuring their SSH key remains in the authorized_keys file, allowing them to re-access the container at any time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the authorized_keys file enables persistent, unauthorized SSH access to the compromised container. This can lead to lateral movement within the container environment, privilege escalation, data exfiltration, or further attacks on other systems. The rule aims to detect these modifications early, preventing significant damage. While the number of specific victims isn&rsquo;t stated, a successful attack targeting containers can affect critical cloud infrastructure and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized modifications of SSH authorized_keys files within containers (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Enable <code>Elastic Defend for Containers</code> integration (minimum version 9.3.0) to provide the necessary file event data for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process and user context of the file modifications, as outlined in the rule&rsquo;s description (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Implement stricter access controls and monitoring on SSH usage within containers to prevent similar incidents in the future, as recommended in the incident response section.</li>
<li>Create exceptions for known update processes or deployment scripts that regularly alter these files to reduce false positives, as suggested in the false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>persistence</category><category>lateral-movement</category><category>privilege-escalation</category><category>ssh</category></item><item><title>Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</link><pubDate>Mon, 30 Mar 2026 10:27:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</guid><description>Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute within Active Directory via PowerShell scripts. This activity is flagged as potentially malicious because it could be indicative of an attempt to exploit the &lsquo;BadSuccessor&rsquo; privilege escalation vulnerability in Windows Server 2025. The vulnerability, as outlined in Akamai&rsquo;s research, allows attackers to manipulate managed service account (dMSA) links to gain elevated privileges. The detection is based on identifying specific PowerShell script patterns that include <code>.Put(&quot;msDS-ManagedAccountPrecededByLink'</code> and <code>CN=</code>, which are used to modify these critical AD attributes. Defenders should be aware that legitimate administrative tasks might also trigger this detection, so careful tuning and validation are necessary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a system with sufficient privileges to execute PowerShell scripts, possibly through compromised credentials or other initial access vectors (T1078.002).</li>
<li><strong>Discovery:</strong> The attacker uses PowerShell to enumerate existing dMSAs and their associated <code>msDS-ManagedAccountPrecededByLink</code> attributes.</li>
<li><strong>Attribute Modification:</strong> The attacker crafts a PowerShell script to modify the <code>msDS-ManagedAccountPrecededByLink</code> attribute of a target dMSA. This involves using the <code>.Put(&quot;msDS-ManagedAccountPrecededByLink&quot;</code> command and specifying a new distinguished name (<code>CN=</code>) for the preceding account.</li>
<li><strong>Persistence:</strong> The attacker leverages the modified dMSA link to establish a persistent foothold in the environment by gaining control over the targeted dMSA.</li>
<li><strong>Privilege Escalation:</strong> By manipulating the dMSA links, the attacker effectively inherits the permissions and privileges associated with the compromised dMSA, thereby escalating their own privileges.</li>
<li><strong>Defense Evasion:</strong> The attacker may attempt to evade detection by obfuscating the PowerShell script or using other techniques to hide their activity.</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker can move laterally within the network, accessing sensitive resources and systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability through modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute can lead to complete domain compromise. An attacker can gain control over critical services and data, potentially resulting in data breaches, service disruptions, and significant financial losses. The impact is amplified in environments heavily reliant on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect potentially malicious modifications to dMSA link attributes via PowerShell (logsource: ps_script, product: windows).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if the activity is legitimate or indicative of an attempted exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability.</li>
<li>Implement strict access controls and monitoring for systems and accounts with the ability to modify Active Directory attributes.</li>
<li>Review and harden Active Directory security configurations to prevent unauthorized modification of sensitive attributes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>initial-access</category><category>active-directory</category></item><item><title>@mobilenext/mobile-mcp Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</link><pubDate>Fri, 27 Mar 2026 19:13:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-04-mobile-mcp-path-traversal/</guid><description>The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.</description><content:encoded><![CDATA[<p>The <code>@mobilenext/mobile-mcp</code> npm package, versions prior to 0.0.49, contains a critical path traversal vulnerability. This flaw stems from the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> tools which improperly handle user-supplied paths. Specifically, the <code>saveTo</code> parameter in <code>mobile_save_screenshot</code> and the <code>output</code> parameter in <code>mobile_start_screen_recording</code> are passed directly to filesystem write operations without adequate validation. This oversight enables a malicious actor to write arbitrary files to locations outside of the intended workspace. A successful exploit of this vulnerability allows for the potential overwriting of sensitive system files, enabling privilege escalation and persistence on the host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains control over the <code>saveTo</code> or <code>output</code> parameter of the vulnerable functions. This could be achieved through a malicious application, supply chain attack, or other means of code injection.</li>
<li>The attacker crafts a path containing traversal sequences (e.g., <code>../</code>) designed to navigate outside of the intended save directory.</li>
<li>The attacker calls the <code>mobile_save_screenshot</code> or <code>mobile_start_screen_recording</code> tool with the manipulated path as the <code>saveTo</code> or <code>output</code> parameter, respectively.</li>
<li>The vulnerable function passes the attacker-controlled path to <code>fs.writeFileSync()</code> without validation.</li>
<li><code>fs.writeFileSync()</code> writes the screenshot or screen recording data to the attacker-specified path.</li>
<li>If the path leads to a sensitive system file (e.g., <code>~/.bashrc</code>, <code>~/.ssh/authorized_keys</code>), it is overwritten with the contents of the screenshot or screen recording.</li>
<li>The attacker can overwrite configuration files or executables in order to achieve code execution.</li>
<li>The attacker achieves persistence and/or elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can have severe consequences. An attacker can overwrite critical system files, such as shell configuration files (<code>.bashrc</code>, <code>.zshrc</code>), SSH authorized keys (<code>.ssh/authorized_keys</code>), or application configuration files. This can lead to arbitrary code execution, privilege escalation, and persistent backdoor access to the affected system. The reported impact includes potential for a broken shell and unauthorized access. All users of <code>@mobilenext/mobile-mcp</code> versions prior to 0.0.49 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@mobilenext/mobile-mcp</code> version 0.0.49 or later to remediate the vulnerability.</li>
<li>Implement robust input validation for all file paths used in file system operations. Specifically, validate the <code>saveTo</code> and <code>output</code> parameters of the <code>mobile_save_screenshot</code> and <code>mobile_start_screen_recording</code> functions.</li>
<li>Deploy the Sigma rule &ldquo;Detect Mobile-MCP Path Traversal Attempts&rdquo; to your SIEM to detect attempts to exploit this vulnerability.</li>
<li>Monitor application logs for unusual file access patterns or attempts to write to sensitive system directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>privilege-escalation</category><category>persistence</category></item><item><title>OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-symlink/</link><pubDate>Fri, 27 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-symlink/</guid><description>OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package is vulnerable to a symlink traversal vulnerability (CVE-2026-32013) affecting versions 2026.2.22 and earlier. The vulnerability lies in the <code>agents.create</code> and <code>agents.update</code> handlers within the <code>src/gateway/server-methods/agents.ts</code> file. These handlers use <code>fs.appendFile</code> on the <code>IDENTITY.md</code> file without proper symlink containment checks. An attacker capable of placing a symlink within the agent workspace can redirect the <code>IDENTITY.md</code> path to point to arbitrary files on the system, allowing them to append attacker-controlled content to these files. This can lead to serious consequences such as remote code execution by modifying <code>/etc/crontab</code>, persistent code execution by modifying shell configuration files like <code>~/.bashrc</code>, or unauthorized SSH access by modifying <code>~/.ssh/authorized_keys</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the agent workspace.</li>
<li>The attacker plants a symbolic link named <code>IDENTITY.md</code> within the agent workspace. This symlink points to a sensitive system file, such as <code>/etc/crontab</code> or <code>~/.ssh/authorized_keys</code>.</li>
<li>The <code>ensureAgentWorkspace</code> function is called, but the exclusive-create flag (<code>wx</code>) skips creation due to the existing symlink (EEXIST error).</li>
<li>The attacker triggers the <code>agents.create</code> or <code>agents.update</code> API endpoint, for example, by sending an HTTP POST request.</li>
<li>The <code>agents.create</code> or <code>agents.update</code> handler constructs the path to <code>IDENTITY.md</code> using <code>path.join(workspaceDir, DEFAULT_IDENTITY_FILENAME)</code>.</li>
<li>The vulnerable <code>fs.appendFile</code> function is called to append agent metadata (name, emoji, avatar) to the <code>IDENTITY.md</code> file. Because <code>fs.appendFile</code> follows symlinks, the content is written to the attacker-controlled target file.</li>
<li>Attacker-controlled data is appended to the target file.</li>
<li>If the target file is a cron configuration file, this leads to remote code execution. If it&rsquo;s an SSH authorized_keys file, this leads to unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to append attacker-controlled content to arbitrary files on the system. This can lead to:</p>
<ul>
<li><strong>Remote Code Execution:</strong> By appending malicious entries to <code>/etc/crontab</code> or user crontab files.</li>
<li><strong>Persistent Code Execution:</strong> By modifying shell configuration files like <code>~/.bashrc</code> or <code>~/.profile</code>.</li>
<li><strong>Unauthorized SSH Access:</strong> By appending SSH keys to <code>~/.ssh/authorized_keys</code>.</li>
<li><strong>Service Disruption:</strong> By modifying application configuration files.</li>
</ul>
<p>The vulnerability affects <code>openclaw</code> versions 2026.2.22 and earlier, and no patches are currently available. The number of affected systems depends on the adoption rate of the <code>openclaw</code> package.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events within agent workspace directories for the creation of symbolic links using file_event logs.</li>
<li>Implement and deploy the provided Sigma rule to detect exploitation attempts by monitoring <code>fs.appendFile</code> calls related to IDENTITY.md without symlink resolution.</li>
<li>Restrict access to the agent workspace directory to prevent attackers from planting symlinks.</li>
<li>Upgrade to a patched version of <code>openclaw</code> when available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>symlink-traversal</category><category>vulnerability</category><category>npm</category><category>rce</category><category>persistence</category></item><item><title>RegPwnBOF Registry Symlink Race Condition Exploit</title><link>https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</link><pubDate>Thu, 19 Mar 2026 05:23:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</guid><description>RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.</description><content:encoded><![CDATA[<p>RegPwnBOF is an exploit leveraging a registry symlink race condition within the Windows Accessibility ATConfig mechanism. This vulnerability allows an unprivileged user to manipulate protected areas of the registry, specifically HKLM, which are typically reserved for administrators or system processes. By exploiting this race condition, an attacker can write arbitrary values to these protected keys. The initial report surfaced around March 2026, highlighting the potential for unauthorized persistence and privilege escalation. This circumvents standard Windows security controls, posing a significant risk to system integrity and confidentiality. The exploit&rsquo;s accessibility to non-administrator users makes it particularly dangerous in environments where least-privilege principles are not strictly enforced.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates the ATConfig mechanism within the Windows Accessibility features.</li>
<li>The exploit creates a registry symlink pointing to a protected HKLM key.</li>
<li>A race condition is triggered during the ATConfig process, allowing the exploit to bypass security checks.</li>
<li>The attacker leverages this race condition to overwrite the target HKLM registry key with arbitrary data.</li>
<li>The modified registry key is used to establish persistence, for example, by creating a Run key.</li>
<li>Upon system restart or user login, the malicious payload associated with the modified Run key is executed.</li>
<li>The attacker gains elevated privileges by executing code within the context of a privileged process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RegPwnBOF allows an attacker to gain persistent access to a compromised system and escalate their privileges to administrator level. This can lead to complete system compromise, data theft, and the installation of malware. The impact is magnified by the fact that this exploit can be triggered by a normal user, bypassing traditional access controls. The number of potential victims is considerable, as the vulnerability exists within the Windows Accessibility features, which are enabled by default on many systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications targeting HKLM keys, especially those related to Accessibility features, using a process_creation log source and the provided Sigma rules.</li>
<li>Implement strict access controls and least-privilege principles to limit the ability of unprivileged users to interact with system-level configurations.</li>
<li>Investigate any unusual registry symlink creation events using file_event logs, particularly those involving the ATConfig mechanism, to identify potential RegPwnBOF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>registry</category><category>symlink</category><category>race-condition</category><category>accessibility</category><category>privilege-escalation</category><category>persistence</category><category>windows</category></item><item><title>Entra ID Federated Identity Credential Issuer Modified</title><link>https://feed.craftedsignal.io/briefs/2026-03-entra-id-federated-issuer-modified/</link><pubDate>Wed, 18 Mar 2026 21:22:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-entra-id-federated-issuer-modified/</guid><description>Modification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.</description><content:encoded><![CDATA[<p>This detection identifies modifications to the issuer URL within a federated identity credential on an Entra ID application. Federated identity credentials enable applications to authenticate using tokens from external identity providers (e.g., GitHub Actions, AWS) without managing secrets. An attacker can exploit this by changing the issuer to an attacker-controlled identity provider, enabling them to generate valid tokens and authenticate as the application&rsquo;s service principal. This technique provides persistent access to Azure resources with the application&rsquo;s permissions, effectively bypassing traditional secret-based authentication. The detection logic focuses on the &ldquo;Update application&rdquo; event within Entra ID audit logs, specifically targeting changes to the &ldquo;FederatedIdentityCredentials&rdquo; property. It is applicable to environments using Azure and Entra ID and is relevant for defenders aiming to prevent unauthorized access and maintain the integrity of their cloud infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an Entra ID account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Entra ID portal or uses PowerShell/Azure CLI to locate a target application with federated identity credentials configured.</li>
<li>The attacker modifies the &ldquo;Issuer&rdquo; URL of an existing Federated Identity Credential within the application registration. They replace the legitimate issuer URL with a URL controlled by the attacker.</li>
<li>The attacker configures their own identity provider to issue tokens that match the application&rsquo;s expected audience and subject claims.</li>
<li>The attacker crafts a malicious token from their identity provider, impersonating the legitimate service principal.</li>
<li>The attacker uses the crafted token to authenticate to Azure resources, bypassing normal authentication controls.</li>
<li>The attacker leverages the application&rsquo;s permissions to access sensitive data, modify configurations, or deploy malicious code.</li>
<li>The attacker maintains persistent access to the Azure environment by continuing to use the compromised federated identity configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to gain persistent access to Azure resources with the permissions of the compromised application. This could lead to data breaches, unauthorized modifications to critical infrastructure, and deployment of malicious code within the cloud environment. The impact is significant because it bypasses traditional authentication methods and relies on a trust relationship established with an external identity provider. The rule is rated high severity because it directly addresses a persistence and privilege escalation technique that can severely impact the confidentiality, integrity, and availability of cloud resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the Azure integration with Microsoft Entra ID Audit Logs data stream to ingest data in your Elastic Stack deployment, as required by the rule setup instructions.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized modifications to federated identity credential issuers in Entra ID (<code>Entra ID Federated Identity Credential Issuer Modified</code>).</li>
<li>Review <code>azure.auditlogs.properties.initiated_by.user.userPrincipalName</code> and <code>ipAddress</code> logs to determine the source of detected changes, as recommended in the rule&rsquo;s triage notes.</li>
<li>Implement conditional access policies and PIM (Privileged Identity Management) to protect application management operations within Entra ID, as suggested in the rule&rsquo;s response and remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>federated_identity</category><category>persistence</category><category>privilege_escalation</category></item><item><title>Persistnux - Linux Persistence Detection Tool</title><link>https://feed.craftedsignal.io/briefs/2026-03-persistnux-tool/</link><pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-persistnux-tool/</guid><description>Persistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.</description><content:encoded><![CDATA[<p>Persistnux is a bash-based tool designed to aid security analysts and incident responders in identifying Linux persistence mechanisms employed by attackers. Developed by 0xblake, this tool streamlines the process of detecting various persistence techniques on compromised Linux systems. Persistnux performs comprehensive checks across the system, generating detailed reports in both CSV and JSONL formats for further analysis. Its key feature is its dependency-free operation, relying solely on built-in Linux tools, making it easily deployable on live systems. The tool focuses on detecting known methods used to maintain access, offering a valuable resource for defenders. It uses indicators and confidence scoring to highlight suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a Linux system through methods such as exploiting vulnerabilities or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> Once inside, the attacker attempts to escalate privileges to gain root access using exploits or misconfigurations.</li>
<li><strong>Persistence Establishment:</strong> The attacker employs various Linux persistence mechanisms to ensure continued access to the compromised system. These techniques include manipulating init scripts, cron jobs, and systemd services.</li>
<li><strong>Init Script Modification:</strong> The attacker modifies init scripts located in <code>/etc/init.d/</code> or <code>/etc/rc.d/</code> to execute malicious code during system startup.</li>
<li><strong>Cron Job Manipulation:</strong> The attacker schedules malicious tasks using cron jobs by adding entries to <code>/etc/crontab</code> or user-specific crontab files.</li>
<li><strong>Systemd Service Modification:</strong> The attacker creates or modifies systemd service files in <code>/etc/systemd/system/</code> to execute malicious code as a service.</li>
<li><strong>Reverse Shell Installation:</strong> The attacker installs a reverse shell to maintain persistent access by connecting back to an attacker-controlled server. This may involve techniques like download-execute or obfuscation.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> With persistent access established, the attacker proceeds to exfiltrate sensitive data, deploy ransomware, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and persistence within a Linux environment can allow attackers to maintain long-term access, leading to data theft, system disruption, or the deployment of ransomware. The impact can range from data breaches and financial losses to reputational damage and operational downtime. The scope of impact depends on the level of access gained and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for detecting init script modifications to identify potential persistence attempts (reference: Sigma rule for init script modification).</li>
<li>Deploy the Sigma rule for detecting cron job modifications to identify potential persistence attempts (reference: Sigma rule for cron job modification).</li>
<li>Regularly audit systemd service configurations for unauthorized modifications using the Sigma rule (reference: Sigma rule for systemd service modification).</li>
<li>Use Persistnux or similar tools to regularly scan systems for known persistence mechanisms and review the generated reports (reference: Persistnux tool).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>linux</category><category>dfir</category></item><item><title>Kubernetes Sensitive Role Creation or Modification</title><link>https://feed.craftedsignal.io/briefs/2026-03-kubernetes-role-modification/</link><pubDate>Thu, 05 Mar 2026 13:13:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kubernetes-role-modification/</guid><description>This rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.</description><content:encoded><![CDATA[<p>This detection rule, sourced from Elastic&rsquo;s detection-rules repository, focuses on identifying malicious activity within Kubernetes environments. Specifically, it targets the creation, update, or patching of Roles and ClusterRoles that introduce high-risk RBAC permissions. These permissions include wildcard access (e.g., <code>*</code>) and escalation verbs such as <code>bind</code>, <code>escalate</code>, or <code>impersonate</code>. The rule leverages audit logs to monitor these actions and flags those that could lead to privilege escalation or unauthorized access. The rule aims to detect attackers attempting to add a new ClusterRole with <code>*</code> verbs/resources and then using it to bind themselves or a service account to cluster-admin–equivalent access. This is important because attackers can silently expand privileges and enable persistence or lateral movement across the cluster.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Kubernetes cluster, possibly through compromised credentials or a vulnerable application.</li>
<li>The attacker attempts to create a new ClusterRole or Role with broad permissions, including wildcard verbs and resources.</li>
<li>The attacker may use <code>kubectl</code> or a similar tool to apply a YAML manifest defining the malicious role.</li>
<li>The Kubernetes API server receives the request to create the role, and the audit logging system captures the event.</li>
<li>The attacker then attempts to bind the newly created role to a service account or user, granting them the elevated permissions. This is achieved by creating or modifying a RoleBinding or ClusterRoleBinding object.</li>
<li>The Kubernetes API server logs the creation or modification of the RoleBinding or ClusterRoleBinding.</li>
<li>With the elevated permissions, the attacker can now perform actions they were previously unauthorized to do, such as accessing sensitive data, deploying malicious containers, or modifying cluster configurations.</li>
<li>The attacker leverages these elevated privileges to establish persistence within the cluster and potentially move laterally to other resources or environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to full cluster compromise, allowing the attacker to control all resources and data within the Kubernetes environment. This can result in data breaches, service disruptions, and significant financial losses. The severity depends on the scope of the compromised role and the resources it grants access to. Even seemingly minor modifications can have a cascading effect, enabling attackers to gain complete control over critical systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Creation or Modification of Sensitive Role&rdquo; to your SIEM and tune it for your environment to detect suspicious RBAC changes (rule.name).</li>
<li>Monitor Kubernetes audit logs for the creation or modification of Roles and ClusterRoles with wildcard permissions or escalation verbs (kubernetes.audit.requestObject.rules.verbs, kubernetes.audit.requestObject.rules.resources).</li>
<li>Implement RBAC guardrails, such as OPA Gatekeeper or Kyverno policies, to prevent the creation of overly permissive roles (references).</li>
<li>Restrict who can create or update RBAC objects and require all RBAC changes to go through code review and signed GitOps automation (references).</li>
<li>Regularly review existing Roles and ClusterRoles to identify and remove any unnecessary or overly broad permissions.</li>
<li>Enable Sysmon process creation logging on nodes to enhance detection capabilities around kubectl usage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>rbac</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Suspicious AWS EC2 Key Pair Import Activity</title><link>https://feed.craftedsignal.io/briefs/2024-12-aws-key-pair-import/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-aws-key-pair-import/</guid><description>The import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.</description><content:encoded><![CDATA[<p>The unauthorized import of SSH key pairs into Amazon Elastic Compute Cloud (EC2) is a technique that malicious actors can leverage to gain unauthorized access to EC2 instances. By importing their own key pairs, attackers can bypass existing security measures and gain persistent access to compromised systems. This activity is often part of a broader attack campaign aimed at compromising sensitive data, disrupting services, or establishing a foothold within an organization&rsquo;s cloud infrastructure. The initial publication of the detection rule was in December 2024, highlighting the ongoing relevance of this technique in cloud security. Monitoring for this activity can help defenders identify and respond to potential security breaches in a timely manner.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or exploiting a misconfigured IAM role.</li>
<li>The attacker attempts to enumerate existing EC2 instances to identify potential targets.</li>
<li>The attacker generates or obtains an SSH key pair, which they intend to use for unauthorized access.</li>
<li>The attacker uses the <code>ImportKeyPair</code> API call within the EC2 service to import the generated or obtained SSH key pair.</li>
<li>The attacker modifies the EC2 instance&rsquo;s configuration to associate the newly imported key pair with the instance. This might involve stopping and restarting the instance.</li>
<li>The attacker uses the imported SSH key pair to gain SSH access to the EC2 instance.</li>
<li>Once inside the instance, the attacker attempts to escalate privileges and move laterally within the AWS environment.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or disrupts critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful key pair import can lead to complete compromise of the affected EC2 instances, potentially impacting dozens of servers depending on the environment. Sensitive data stored on or accessible from these instances could be exfiltrated, leading to financial loss, reputational damage, and regulatory fines. Furthermore, compromised instances can be used as a launchpad for further attacks within the AWS environment, leading to a wider breach. The financial impact can range from tens of thousands to millions of dollars, depending on the scale of the breach and the sensitivity of the data compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect <code>ImportKeyPair</code> events in CloudTrail logs (logsource: aws, service: cloudtrail).</li>
<li>Review IAM policies to ensure that only authorized users and roles have the necessary permissions to import key pairs (eventSource: &rsquo;ec2.amazonaws.com&rsquo;, eventName: &lsquo;ImportKeyPair&rsquo;).</li>
<li>Investigate any detected <code>ImportKeyPair</code> events, validating the user identity, user agent, and source IP address to ensure they are expected (detection block).</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts to reduce the risk of credential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloudtrail</category><category>ec2</category><category>keypair</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Potential Web Shell ASPX File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</link><pubDate>Sat, 14 Dec 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</guid><description>The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.</description><content:encoded><![CDATA[<p>Attackers frequently deploy web shells to maintain persistence and execute arbitrary commands on compromised web servers. This rule identifies the creation of ASPX files, commonly used in Windows environments, within directories typically targeted for web shell deployment. The rule focuses on the &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo; path, a common location for web server extensions and potential web shell placements. By excluding legitimate processes such as msiexec.exe and psconfigui.exe, the rule aims to detect suspicious ASPX file creation events indicative of malicious activity. The detection logic helps defenders identify potential web shell installations, allowing for timely response and remediation to prevent further compromise. This activity has been observed in exploitation attempts targeting SharePoint servers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through exploiting a vulnerability in a web application or service running on the server (e.g., SharePoint).</li>
<li>The attacker leverages the compromised web application to upload a malicious ASPX file to a directory within the web server&rsquo;s file system, specifically targeting locations like &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo;.</li>
<li>The uploaded ASPX file contains malicious code designed to provide the attacker with remote access and control over the server.</li>
<li>The attacker triggers the execution of the ASPX file by sending a request to the web server, which processes the ASPX file and executes the embedded malicious code.</li>
<li>The web shell allows the attacker to execute arbitrary commands on the server, potentially escalating privileges and moving laterally within the network.</li>
<li>The attacker uses the web shell to establish persistence on the compromised server, ensuring continued access even after the initial vulnerability is patched.</li>
<li>The attacker may use the web shell to exfiltrate sensitive data from the server or to deploy additional malware and tools.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful web shell deployment can lead to complete compromise of the affected server, potentially impacting numerous organizations. Attackers can use web shells to execute arbitrary code, steal sensitive data, and establish persistent access to internal networks. The impact includes data breaches, financial losses, and reputational damage. Successful exploitation of SharePoint vulnerabilities leading to web shell deployment has been observed in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; to detect suspicious ASPX file creation events, filtering out legitimate processes to reduce false positives.</li>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events on Windows systems, which is a data source for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; by examining the file path, creating process, and network activity around the time of the event.</li>
<li>Monitor web server logs for suspicious requests targeting ASPX files in common web server directories, as referenced in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>web-shell</category><category>persistence</category><category>windows</category></item><item><title>Active Directory Group Modification by SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</link><pubDate>Sat, 02 Nov 2024 23:59:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</guid><description>Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.</description><content:encoded><![CDATA[<p>This detection identifies a user being added to an Active Directory (AD) group by the SYSTEM account (S-1-5-18). This behavior is significant because it can indicate an attacker who has successfully achieved SYSTEM level privileges on a domain controller. Attackers typically obtain SYSTEM privileges by exploiting vulnerabilities in the domain controller, or by abusing default group privileges such as those assigned to Server Operators. Once SYSTEM access is achieved, the attacker can then attempt to pivot to a domain account. This allows them to gain persistent access and control over the AD environment. Successful exploitation enables attackers to perform actions with the privileges of the compromised account, leading to potential data breaches, system compromise, and further lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the network through various means, such as phishing or exploiting a public-facing application.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability or misconfiguration on a system within the network to achieve local administrator or SYSTEM privileges.</li>
<li><strong>Domain Controller Compromise:</strong> The attacker uses their elevated privileges to target a domain controller, exploiting vulnerabilities or weak configurations to gain SYSTEM access on the domain controller itself.</li>
<li><strong>Group Modification:</strong> Once the attacker has SYSTEM privileges on a domain controller, they use this access to add a user account to a privileged Active Directory group. This is done by modifying the group membership using tools native to the operating system.</li>
<li><strong>Persistence:</strong> By adding a user account to a privileged group, the attacker ensures they have persistent access to the domain, even if their initial access method is discovered and blocked.</li>
<li><strong>Lateral Movement:</strong> With the newly acquired group membership, the attacker can now move laterally within the network, accessing resources and systems that were previously inaccessible.</li>
<li><strong>Data Exfiltration / Impact:</strong> The attacker leverages their access to locate and exfiltrate sensitive data, or to disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a wide range of negative consequences, including data breaches, system compromise, and disruption of critical business operations. Attackers can use the compromised account to access sensitive data, modify system configurations, or even deploy ransomware. The scope of impact depends on the permissions and privileges associated with the compromised account and the targeted resources. Furthermore, the incident can damage the organization&rsquo;s reputation and result in regulatory fines and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; to generate the necessary events for detection as detailed in the <a href="https://ela.st/audit-security-group-management">setup instructions</a>.</li>
<li>Deploy the following Sigma rule to detect potential Active Directory group modifications by the SYSTEM account and tune for your environment.</li>
<li>Investigate any event with event code 4728 where the SubjectUserSid is &ldquo;S-1-5-18&rdquo; as described in the <a href="#overview">overview</a>.</li>
<li>Review the investigation guide outlined in the rule description for triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>windows</category><category>active directory</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>Potential Privilege Escalation via SUID/SGID on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-11-suid-sgid-privilege-escalation/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suid-sgid-privilege-escalation/</guid><description>Attackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.</description><content:encoded><![CDATA[<p>The SUID (Set User ID) and SGID (Set Group ID) bits are file permission mechanisms in Unix-like operating systems that allow a program to be executed with the privileges of the file&rsquo;s owner or group, respectively. While intended for legitimate purposes, such as allowing users to perform specific administrative tasks, they can be abused by attackers to escalate privileges. Attackers can exploit misconfigured SUID/SGID binaries to gain elevated access or persistence. This detection focuses on identifying processes running with root privileges (UID/GID 0) but initiated by non-root users, flagging potential misuse of SUID/SGID permissions on Linux systems monitored by Elastic Defend. This can indicate an attacker attempting to exploit a misconfiguration in order to escalate their privileges to root, or establish a backdoor for persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system via some vulnerability or compromised credentials.</li>
<li>The attacker identifies binaries with SUID/SGID bits set.</li>
<li>The attacker executes a vulnerable SUID/SGID binary, such as <code>find</code> or <code>nmap</code>.</li>
<li>The binary executes with root privileges, even though the attacker is a non-root user.</li>
<li>The attacker leverages the elevated privileges to read sensitive files, modify system configurations, or install malicious software.</li>
<li>The attacker escalates privileges to root.</li>
<li>The attacker establishes persistence by creating a new SUID/SGID binary or modifying an existing one.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of SUID/SGID misconfigurations can lead to complete system compromise, as attackers gain root privileges. Attackers can install malware, steal sensitive data, or disrupt critical services. The impact can range from data breaches to denial-of-service attacks. Given the broad range of binaries potentially affected, this vulnerability can impact various sectors and potentially affect a large number of Linux systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Privilege Escalation via SUID/SGID</code> to your SIEM to detect potential privilege escalation attempts.</li>
<li>Enable Elastic Defend integration to ensure the necessary process execution data is available.</li>
<li>Regularly audit SUID/SGID permissions across your Linux systems and remove unnecessary SUID/SGID bits.</li>
<li>Investigate any alerts generated by the Sigma rule by checking <code>process.real_user.id</code> and <code>process.real_group.id</code> to determine if non-root users initiated the process.</li>
<li>Review the process details, including <code>process.name</code> and <code>process.args</code>, to understand the nature of the executed command and its intended function.</li>
<li>Monitor system logs for suspicious activity around the time of the alert to identify any related actions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>defense-evasion</category><category>suid</category><category>sgid</category></item><item><title>Kubernetes Admission Controller Modification</title><link>https://feed.craftedsignal.io/briefs/2024-11-kubernetes-admission-controller-modification/</link><pubDate>Fri, 01 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-kubernetes-admission-controller-modification/</guid><description>An adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.</description><content:encoded><![CDATA[<p>The Kubernetes admission controller is a crucial component that governs API requests to a Kubernetes cluster. Attackers can modify mutating or validating webhook configurations to intercept and manipulate these requests. By creating, updating, or replacing these configurations, adversaries can inject malicious code, alter resource definitions, or even exfiltrate sensitive information like access credentials. This activity can lead to privilege escalation, persistence within the cluster, and ultimately, a compromise of the entire Kubernetes environment. The attacks are typically stealthy as they operate within the legitimate Kubernetes API framework, making detection challenging. This behavior is particularly concerning for organizations relying on Kubernetes for critical applications and sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the Kubernetes cluster, potentially through compromised credentials or a vulnerability in a deployed application.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing admission controller configurations (mutatingwebhookconfigurations and validatingwebhookconfigurations) to identify potential targets.</li>
<li><strong>Configuration Modification:</strong> The attacker uses <code>kubectl</code> or the Kubernetes API to create, update, or replace a webhook configuration. This involves crafting a malicious webhook that will intercept API requests.</li>
<li><strong>Webhook Deployment:</strong> The malicious webhook is deployed as a service within the Kubernetes cluster.</li>
<li><strong>API Interception:</strong> When a user or application makes an API request that matches the webhook&rsquo;s defined rules, the webhook intercepts the request.</li>
<li><strong>Malicious Code Injection:</strong> The webhook injects malicious code or alters the API request to achieve the attacker&rsquo;s objectives (e.g., granting unauthorized permissions, modifying resource configurations).</li>
<li><strong>Persistence/Privilege Escalation/Credential Access:</strong> Depending on the injected code, the attacker achieves persistence by ensuring malicious code is always present, escalates privileges by modifying role bindings, or accesses credentials by intercepting secret creation requests.</li>
<li><strong>Lateral Movement/Data Exfiltration:</strong> The attacker leverages their gained access to move laterally within the cluster or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Kubernetes admission controllers can have severe consequences. This can result in unauthorized access to sensitive data, complete cluster compromise, and denial of service. The impact ranges from data breaches and service disruptions to long-term persistence within the environment, allowing attackers to maintain control over the cluster. The stealthy nature of this attack makes it difficult to detect, potentially allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Admission Controller Modification&rdquo; to your SIEM and tune it for your environment to detect suspicious modifications to webhook configurations (logsource: kubernetes, service: audit).</li>
<li>Monitor Kubernetes audit logs for <code>create</code>, <code>delete</code>, <code>patch</code>, <code>replace</code>, and <code>update</code> verbs on <code>mutatingwebhookconfigurations</code> and <code>validatingwebhookconfigurations</code> resources (logsource: kubernetes, service: audit).</li>
<li>Implement strong RBAC policies to limit access to Kubernetes API resources and prevent unauthorized modification of admission controller configurations.</li>
<li>Regularly review and audit existing admission controller configurations to identify any unexpected or malicious webhooks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>admission-controller</category><category>privilege-escalation</category><category>persistence</category><category>credential-access</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Unsigned DLL Loaded by DNS Service</title><link>https://feed.craftedsignal.io/briefs/2024-07-unsigned-dns-dll-load/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-unsigned-dns-dll-load/</guid><description>The rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.</description><content:encoded><![CDATA[<p>The detection rule identifies the loading of unusual DLLs by the Windows DNS Server process (dns.exe), potentially indicating the abuse of the ServerLevelPluginDll functionality, as described in public research and proof-of-concept code. This technique allows attackers to load arbitrary DLLs into the DNS service, leading to privilege escalation and remote code execution with SYSTEM privileges. The rule focuses on detecting unsigned or untrusted DLLs loaded by dns.exe, highlighting potential exploitation attempts and unauthorized modifications to the DNS service. Successful exploitation grants the attacker elevated privileges, allowing them to perform malicious actions on the system. The rule is designed for data generated by Elastic Defend and supports Sysmon Event ID 7 (Image Loaded) as an additional data source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through unspecified means.</li>
<li>The attacker modifies the DNS Server configuration to enable the loading of server-level plugin DLLs.</li>
<li>The attacker places a malicious, unsigned DLL in a location accessible to the DNS service.</li>
<li>The DNS service (dns.exe) loads the malicious DLL upon startup or configuration change.</li>
<li>The malicious DLL executes code within the context of the DNS service, inheriting SYSTEM privileges.</li>
<li>The attacker uses the elevated privileges to perform malicious actions, such as installing backdoors or modifying system settings.</li>
<li>The attacker maintains persistence by ensuring the malicious DLL is loaded on subsequent system restarts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code with SYSTEM privileges, granting them complete control over the compromised system. This can lead to data theft, system corruption, or the installation of persistent backdoors. The impact includes potential privilege escalation, remote code execution, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Unsigned DLL loaded by DNS Service&rdquo; to your SIEM and tune for your environment.</li>
<li>Ensure Sysmon Event ID 7 (Image Loaded) is enabled to provide the necessary data for the detection rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file path and code signature status.</li>
<li>Regularly review and validate the DNS server configuration to ensure that only trusted DLLs are loaded.</li>
<li>Implement code signing policies to prevent the loading of unsigned DLLs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>execution</category><category>persistence</category><category>windows</category></item><item><title>Suspicious ScreenConnect Client Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-05-screenconnect-child-process/</link><pubDate>Thu, 16 May 2024 16:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-screenconnect-child-process/</guid><description>This rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of suspicious activities related to the ScreenConnect remote access tool. ScreenConnect is a legitimate remote support software, but adversaries can exploit it to execute unauthorized commands on compromised systems. This detection identifies suspicious child processes spawned by ScreenConnect client processes, such as <code>ScreenConnect.ClientService.exe</code> or <code>ScreenConnect.WindowsClient.exe</code>, which can indicate malicious activities such as spawning PowerShell or cmd.exe with unusual arguments. This activity can indicate potential abuse of remote access capabilities, leading to data exfiltration, command and control communication, or the establishment of persistence mechanisms. Recent exploitation of CVE-2024-1709 and CVE-2024-1708 have highlighted the risk associated with ScreenConnect exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to a system with ScreenConnect installed. This could be achieved through exploiting vulnerabilities like CVE-2024-1709 and CVE-2024-1708, or through credential compromise.</li>
<li>The attacker uses ScreenConnect to connect to the compromised system remotely.</li>
<li>The attacker uses the ScreenConnect interface to execute commands on the remote system.</li>
<li>The attacker spawns a command interpreter, such as <code>cmd.exe</code>, using ScreenConnect. This process is a child process of the ScreenConnect client process.</li>
<li>The attacker uses <code>cmd.exe</code> to execute malicious commands, such as downloading and executing a malicious payload.</li>
<li>Alternatively, the attacker spawns <code>powershell.exe</code> with encoded commands or commands to download and execute malicious payloads from a remote server.</li>
<li>The attacker establishes persistence by creating a scheduled task using <code>schtasks.exe</code> or creates a new service using <code>sc.exe</code>.</li>
<li>The attacker uses tools like <code>net.exe</code> to modify user accounts or privileges to maintain access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, installation of malware, and establishment of persistent access to the compromised system. This can result in data theft, disruption of services, and further lateral movement within the network. The number of victims and specific sectors targeted varies depending on the attacker&rsquo;s objectives, but the impact can be significant for organizations relying on ScreenConnect for remote support.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious child processes spawned by ScreenConnect and tune for your environment.</li>
<li>Monitor process creation events for ScreenConnect client processes spawning suspicious child processes like <code>powershell.exe</code>, <code>cmd.exe</code>, <code>net.exe</code>, <code>schtasks.exe</code>, <code>sc.exe</code>, <code>rundll32.exe</code>, <code>mshta.exe</code>, <code>certutil.exe</code>, <code>wscript.exe</code>, <code>cscript.exe</code>, <code>curl.exe</code>, <code>ssh.exe</code>, <code>scp.exe</code>, <code>wevtutil.exe</code>, <code>wget.exe</code>, or <code>wmic.exe</code> as detailed in the Sigma rules.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data to activate the rules above.</li>
<li>Review and revoke any unauthorized user accounts or privileges that may have been created or modified using tools like <code>net.exe</code> as described in the attack chain.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>defense-evasion</category><category>execution</category><category>persistence</category><category>screenconnect</category></item><item><title>Okta Admin Console Unusual Behavior Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</guid><description>This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unusual behaviors within the Okta Admin Console, as identified by Okta&rsquo;s heuristics. While the specific campaign details are unknown, identifying anomalous access patterns to the Admin Console is crucial for detecting various malicious activities. This includes potential privilege escalation by compromised accounts or insider threats attempting to gain elevated permissions, establishing persistence through unauthorized modifications, evading existing security controls, or gaining initial access through account compromise. The detection relies on Okta&rsquo;s system logs which can signal unusual administrative activity. Defenders should prioritize monitoring and alerting on these events to quickly identify and respond to potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta account, possibly through credential phishing or brute-force attacks.</li>
<li>The attacker attempts to log in to the Okta Admin Console.</li>
<li>Okta&rsquo;s behavior detection engine analyzes the login attempt, considering factors like the user&rsquo;s location, device, and time of day.</li>
<li>The system logs record a <code>policy.evaluate_sign_on</code> event when a sign-on policy is evaluated.</li>
<li>The <code>target.displayName</code> field within the log specifies &ldquo;Okta Admin Console&rdquo; indicating the user is attempting to access the administrative interface.</li>
<li>If Okta identifies the behavior as unusual, the <code>debugContext.debugData.behaviors</code> or <code>debugContext.debugData.logOnlySecurityData</code> fields will contain &ldquo;POSITIVE&rdquo;.</li>
<li>An alert is triggered based on the identified unusual behavior.</li>
<li>The attacker, if successful in bypassing initial checks, may proceed to create new admin accounts, modify existing policies, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the Okta Admin Console can lead to significant damage, including unauthorized access to sensitive data, modification of security policies, creation of rogue administrator accounts, and ultimately, a complete takeover of the Okta environment. This can impact all applications and services integrated with Okta, potentially affecting thousands of users and causing significant financial and reputational damage. Early detection is crucial to limiting the scope and impact of such attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Okta Admin Console Unusual Behavior</code> to your SIEM to detect suspicious Okta Admin Console access based on Okta&rsquo;s internal behavior analysis.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the unusual behavior is legitimate or indicative of malicious activity.</li>
<li>Review Okta&rsquo;s System Log API documentation to understand the various event types and data fields available for monitoring and detection.</li>
<li>Implement multi-factor authentication (MFA) for all Okta accounts, especially administrator accounts, to mitigate the risk of account compromise (related to initial access).</li>
<li>Monitor Okta&rsquo;s security advisories and announcements for updates on emerging threats and recommended security practices (references).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>privilege-escalation</category><category>persistence</category><category>defense-evasion</category><category>initial-access</category></item><item><title>Azure AD Certificate-Based Authentication Enabled</title><link>https://feed.craftedsignal.io/briefs/2024-04-azure-ad-cba-enabled/</link><pubDate>Mon, 29 Apr 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-azure-ad-cba-enabled/</guid><description>Enabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.</description><content:encoded><![CDATA[<p>Certificate-Based Authentication (CBA) in Azure Active Directory allows users and services to authenticate using digital certificates instead of passwords. While intended to enhance security, misconfiguration or malicious use of CBA can lead to significant security risks. Attackers can exploit CBA to gain unauthorized access, establish persistent footholds, and escalate privileges within the Azure environment. This involves manipulating authentication policies to favor or require certificate authentication, potentially bypassing other security controls. Detection of CBA enablement is crucial as it can be a precursor to more sophisticated attacks targeting cloud resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD account with sufficient privileges to modify authentication policies (e.g., Global Administrator).</li>
<li>The attacker modifies the Azure AD authentication methods policy to enable certificate-based authentication.</li>
<li>The attacker registers a certificate authority (CA) in Azure AD, which will be used to issue certificates for authentication.</li>
<li>The attacker crafts or compromises a certificate that is trusted by the registered CA.</li>
<li>The attacker uses the crafted certificate to authenticate to Azure AD, bypassing traditional password-based authentication.</li>
<li>The attacker leverages the newly gained access to provision new resources, modify existing configurations, or access sensitive data.</li>
<li>The attacker establishes persistence by creating service principals or applications that authenticate using certificates, allowing them to maintain access even if the initial account is compromised.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CBA can lead to full compromise of an Azure AD tenant. Attackers can gain access to sensitive data, disrupt services, and deploy malicious applications. The lack of multi-factor authentication on certificate-based logins significantly increases the risk of unauthorized access. The impact can range from data breaches and financial losses to complete operational shutdown, depending on the scope of the compromised resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect when certificate-based authentication is enabled in Azure AD (<code>Authentication Methods Policy Update</code> in Audit Logs).</li>
<li>Monitor Azure AD audit logs for modifications to authentication methods policies, paying close attention to changes related to certificate-based authentication.</li>
<li>Implement strong certificate management practices, including proper key storage, certificate revocation, and monitoring of certificate usage.</li>
<li>Investigate any unexpected changes to Azure AD authentication policies or the registration of new certificate authorities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>certificate-based-authentication</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Suspicious Child Processes from Communication Applications</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</guid><description>The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying suspicious child processes of communication applications such as Slack, Cisco Webex, Microsoft Teams, Discord, WhatsApp, Zoom, and Thunderbird on Windows operating systems. Attackers may attempt to masquerade as legitimate processes or exploit vulnerabilities in these applications to execute malicious code. The rule monitors for the creation of child processes by these communication apps and checks if those child processes are unexpected, untrusted, or lack a valid code signature. This detection is crucial because successful exploitation can lead to unauthorized access, data exfiltration, or further compromise of the system. The rule has been actively maintained since August 2023, with updates as recent as May 2026, indicating its relevance and ongoing refinement to address emerging threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches a communication application (e.g., Slack, Teams, Webex).</li>
<li>The communication application executes a vulnerable or compromised component.</li>
<li>The compromised component spawns a child process (e.g., powershell.exe, cmd.exe).</li>
<li>The child process executes a malicious command or script.</li>
<li>The script attempts to download additional payloads from an external source.</li>
<li>The payload executes, establishing persistence through registry modification or scheduled tasks.</li>
<li>The attacker gains remote access to the system.</li>
<li>Data exfiltration or lateral movement within the network occurs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, installation of malware, and potential lateral movement within the organization&rsquo;s network. By exploiting communication applications, attackers can gain access to internal communications, confidential documents, and user credentials. The number of affected users and the extent of the damage depend on the compromised application and the attacker&rsquo;s objectives. If successful, this attack may lead to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Communication App Child Process</code> to your SIEM to detect anomalous child processes spawned by communication applications and tune for your environment.</li>
<li>Enable process creation logging with command line arguments in Windows to ensure that the Sigma rule has the necessary data to function correctly (logsource: <code>process_creation</code>, product: <code>windows</code>).</li>
<li>Investigate any alerts generated by the rule and review the command line arguments of the spawned processes to identify potential malicious activity.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications and reduce the attack surface.</li>
<li>Ensure that all communication applications are updated to the latest versions to patch known vulnerabilities and reduce the risk of exploitation.</li>
<li>Examine the network activity of the affected system to identify any suspicious outbound connections that may indicate data exfiltration or communication with a command and control server, referencing the setup guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>System File Ownership Change for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</guid><description>Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.</description><content:encoded><![CDATA[<p>Attackers often attempt to modify file or directory ownership to bypass access controls and gain unauthorized access to sensitive data or system resources. This involves altering permissions associated with critical files or directories, granting broader access to accounts under attacker control or resetting permissions to default values which might be more permissive. This defense evasion technique can be used to establish persistence, escalate privileges, or exfiltrate data without triggering standard security alerts. The common tools used include <code>icacls.exe</code> and <code>takeown.exe</code>, typically targeting files within the <code>C:\Windows\</code> directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromised account or vulnerability.</li>
<li>The attacker uses <code>takeown.exe /f &lt;file&gt;</code> to take ownership of a target file or directory.</li>
<li>The attacker uses <code>icacls.exe &lt;file&gt; /reset</code> to reset the ACL of the file or directory.</li>
<li>Alternatively, the attacker uses <code>icacls.exe &lt;file&gt; /grant Everyone:F</code> to grant full control to everyone, weakening security.</li>
<li>The attacker modifies the contents of the file, such as injecting malicious code or configuration changes.</li>
<li>The attacker leverages the modified file for persistence, such as a modified system DLL loaded at boot.</li>
<li>The system executes the malicious code when the compromised file is accessed or executed.</li>
<li>The attacker achieves their objective, such as maintaining persistence, escalating privileges, or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising file and directory permissions can lead to significant security breaches. Successful attacks can allow unauthorized access to sensitive data, system instability, or the execution of malicious code with elevated privileges. This can affect any Windows environment where file permissions are improperly managed, with potential for widespread system compromise and data exfiltration. The impact is most severe on systems containing sensitive data or critical infrastructure components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>icacls.exe</code> and <code>takeown.exe</code> with suspicious arguments targeting system files (e.g., <code>C:\Windows\*</code>) to detect potential permission modification attempts using the provided Sigma rules.</li>
<li>Enable Windows Security Auditing for file system changes to capture events related to permission modifications and ownership changes.</li>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment, specifically focusing on processes modifying permissions on files within the <code>C:\Windows\</code> directory.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain and the target files being modified.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item><item><title>Detection of New GitHub Actions Secrets Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</guid><description>This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies the creation of new secrets within GitHub Actions. Threat actors may create or modify secrets to gain unauthorized access, establish persistence, or escalate privileges within the GitHub environment. The activity is captured via GitHub&rsquo;s audit logs. The scope of this detection encompasses the creation of secrets at the organization, environment, codespaces, or repository level. Successful detection of this activity allows security teams to investigate potentially malicious modifications to GitHub Actions secrets, which could lead to supply chain compromise or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub account, potentially through compromised credentials or phishing (T1078.004).</li>
<li>The attacker authenticates to the GitHub organization or repository.</li>
<li>The attacker navigates to the settings for the organization, environment, codespaces, or repository.</li>
<li>The attacker creates a new secret within the GitHub Actions settings, using the GitHub API or web interface.</li>
<li>The secret is stored within GitHub&rsquo;s infrastructure, accessible to GitHub Actions workflows.</li>
<li>The attacker modifies or creates a GitHub Actions workflow that utilizes the newly created secret.</li>
<li>The workflow executes, using the secret to perform privileged actions such as accessing sensitive data or deploying malicious code.</li>
<li>The attacker achieves persistence or elevates their privileges within the GitHub environment, potentially compromising the entire software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, code injection, and supply chain compromise. The impact ranges from low, in cases where the secret is used for benign purposes, to critical if the secret is used to deploy malicious code into production environments. While the number of affected organizations is unknown, the potential for widespread impact across the software supply chain makes this a critical area for monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the events necessary for this detection (see <code>logsource</code> definition).</li>
<li>Deploy the Sigma rule <code>Github New Secret Created</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the &ldquo;actor&rdquo; involved in creating the secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>persistence</category><category>privilege-escalation</category><category>initial-access</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</guid><description>The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.</description><content:encoded><![CDATA[<p>Attackers may leverage scripting engines, such as <code>wscript.exe</code> and <code>cscript.exe</code>, to directly modify the Windows Registry. These scripting engines are often abused for malicious purposes, including establishing persistence, escalating privileges, or disabling security controls. These scripting engines can modify the registry without using standard tools like <code>regedit.exe</code> or <code>reg.exe</code>, making it harder to detect malicious registry changes. Defenders should be aware of processes using these engines to modify the registry, as this behavior is uncommon in legitimate software installations or administrative tasks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting a software vulnerability.</li>
<li>The attacker executes a script (VBScript, JScript) via <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script contains commands to modify specific registry keys, such as the Run key for persistence (T1547.001).</li>
<li>The scripting engine process (e.g., <code>wscript.exe</code>) directly interacts with the Windows Registry to set the new values.</li>
<li>Upon system restart or user logon, the modified registry key triggers the execution of a malicious payload.</li>
<li>The attacker achieves persistence on the compromised system, allowing for continued access and control.</li>
<li>The attacker leverages the persistent access to perform lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access on compromised systems, enabling attackers to execute malicious code, steal sensitive information, or disrupt critical services. The registry modifications performed by scripting engines can bypass traditional security measures and make it difficult to detect and remediate the attack. This can result in significant data loss, financial damage, and reputational harm to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect suspicious registry modifications made by scripting engines.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; for unusual or unauthorized registry changes.</li>
<li>Monitor registry events for modifications made by processes such as <code>wscript.exe</code> and <code>cscript.exe</code> (logsource: registry_event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>execution</category><category>registry-modification</category></item><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>System Shells Launched via Windows Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-shells-via-services/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-shells-via-services/</guid><description>Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.</description><content:encoded><![CDATA[<p>Attackers may configure existing Windows services or create new ones to execute system shells, in order to elevate their privileges from administrator to SYSTEM. This tactic is used to gain SYSTEM permissions and establish persistence. The detection rule focuses on identifying instances where <code>services.exe</code> is the parent process of a command shell (cmd.exe, powershell.exe, pwsh.exe, powershell_ise.exe), indicating that a service is being abused to run a shell. The rule is designed to work with data from Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with administrator privileges.</li>
<li>Attacker identifies a legitimate service or creates a new service to abuse for privilege escalation.</li>
<li>Attacker modifies the service configuration to execute a command shell (cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe). This may involve modifying the service&rsquo;s executable path or adding command-line arguments.</li>
<li>The system&rsquo;s Service Control Manager (SCM) starts the service.</li>
<li><code>services.exe</code> spawns the configured command shell process.</li>
<li>The command shell executes with SYSTEM privileges.</li>
<li>Attacker uses the SYSTEM shell to perform malicious activities, such as installing malware, accessing sensitive data, or creating new user accounts.</li>
<li>The service continues to run, providing persistent access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to privilege escalation to SYSTEM, granting the attacker complete control over the compromised system. This can result in data theft, malware installation, or further lateral movement within the network. The rule has a risk score of 47 and is categorized as medium severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>System Shells via Services</code> to detect the execution of command shells spawned by <code>services.exe</code> within your SIEM environment, and tune for your environment.</li>
<li>Investigate any process creation events where <code>services.exe</code> is the parent process of <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, or <code>powershell_ise.exe</code> using the investigation guide provided in the content section.</li>
<li>Review service creation and modification events in Windows Event Logs (Event IDs 4697 and 7045) for suspicious entries.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed process information.</li>
<li>Utilize osquery to retrieve detailed service information to identify potentially malicious services. Reference queries $osquery_0, $osquery_1, and $osquery_2 in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>privilege_escalation</category><category>windows</category></item><item><title>Detection of Malicious Browser Extension Installation</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</guid><description>This rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies the installation of browser extensions on Windows systems, which can be a sign of malicious activity. Threat actors may install malicious browser extensions through app store downloads disguised as legitimate extensions, social engineering tactics, or by directly compromising a system. These extensions can then be used for persistence, data theft, or other malicious purposes. The rule focuses on monitoring file creation events related to browser extension installations, specifically targeting the file paths and types associated with Firefox (.xpi) and Chromium-based browsers (.crx). It excludes known safe processes and extensions to reduce false positives. This detection is relevant for defenders because malicious browser extensions can provide a persistent foothold for attackers, allowing them to maintain access to compromised systems and user data. The rule is based on EQL and can be used with Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user&rsquo;s system is compromised, potentially through social engineering or existing malware.</li>
<li>The attacker gains access to the system and attempts to install a malicious browser extension.</li>
<li>The attacker drops the extension file (.xpi for Firefox, .crx for Chromium) into the appropriate browser extension directory (e.g., <code>C:\\Users\\*\\AppData\\Roaming\\*\\Profiles\\*\\Extensions\\</code> for Firefox or <code>C:\\Users\\*\\AppData\\Local\\*\\*\\User Data\\Webstore Downloads\\</code> for Chromium).</li>
<li>A file creation event is triggered as the extension file is created in the target directory.</li>
<li>The detection rule identifies this file creation event based on the file name and path, filtering out known safe processes like firefox.exe.</li>
<li>The malicious extension installs itself into the browser.</li>
<li>The extension gains persistence by loading every time the browser starts.</li>
<li>The attacker can now perform malicious actions such as monitoring browsing activity, stealing credentials, or injecting malicious content into web pages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious browser extensions can lead to persistent access to the compromised system, allowing attackers to steal sensitive information such as credentials, financial data, or personal information. This can result in financial loss, identity theft, and reputational damage. The installation of malicious extensions can also lead to the injection of malicious content into web pages, redirecting users to phishing sites or distributing malware. The scope of the impact can range from individual users to entire organizations, depending on the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture the necessary file creation events for this detection.</li>
<li>Deploy the provided Sigma rule <code>Browser Extension Install via File Creation</code> to your SIEM and tune the exclusions for your specific environment.</li>
<li>Review and update the list of known safe processes and extensions in the Sigma rule <code>Browser Extension Install via File Creation</code> to minimize false positives.</li>
<li>Implement application whitelisting policies to restrict the installation of unauthorized browser extensions.</li>
<li>Educate users on the risks associated with installing browser extensions from untrusted sources and encourage them to only install extensions from official browser stores.</li>
<li>Implement policies to regularly review installed browser extensions across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>browser-extension</category><category>windows</category></item><item><title>Persistence via BITS Job Notify Cmdline</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-bits-persistence/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-bits-persistence/</guid><description>Adversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.</description><content:encoded><![CDATA[<p>The Background Intelligent Transfer Service (BITS) is a Windows service used for asynchronous, prioritized, and throttled file transfers. Attackers can abuse BITS to establish persistence by using the <code>SetNotifyCmdLine</code> method to execute a program after a BITS job completes or enters a specific state. This technique allows adversaries to run arbitrary code with elevated privileges, bypassing traditional security measures. The detection rule identifies suspicious processes initiated by BITS, excluding known legitimate executables like <code>WerFaultSecure.exe</code>, <code>WerFault.exe</code>, <code>wermgr.exe</code>, and <code>directxdatabaseupdater.exe</code>. This behavior can be employed to maintain access to a compromised system, even after a reboot or user logout. Defenders need to monitor BITS activity for unusual command-line executions to detect and prevent potential persistence attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through other means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker uses the BITSAdmin tool or PowerShell cmdlets to create a new BITS job.</li>
<li>The attacker configures the BITS job to download a malicious payload or execute a malicious script.</li>
<li>The attacker utilizes the <code>SetNotifyCmdLine</code> method to set a command that will be executed upon job completion or a specified state change.</li>
<li>The BITS service executes the specified command, which can be a script interpreter (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>) or a malicious executable.</li>
<li>The malicious command downloads or executes further payloads, establishing persistence on the system.</li>
<li>The attacker maintains persistent access, allowing them to execute commands, steal data, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems. This can lead to data theft, further malware deployment, or complete system compromise. The BITS service runs with elevated privileges, so any command executed via <code>SetNotifyCmdLine</code> will also run with those privileges. This persistence mechanism is difficult to detect because BITS is a legitimate Windows service, and its activity can be easily masked as normal system operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for processes spawned by <code>svchost.exe</code> with arguments containing &ldquo;BITS&rdquo; but not in the exclusion list (WerFaultSecure.exe, WerFault.exe, wermgr.exe, directxdatabaseupdater.exe) using the &ldquo;Persistence via BITS Job Notify Cmdline&rdquo; rule.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious BITS Job Creation&rdquo; to identify unusual BITS job creation activities.</li>
<li>Review BITS job configurations on systems to identify and remove any unauthorized or suspicious jobs.</li>
<li>Enable Sysmon process creation logging to capture detailed information about process execution, including parent-child relationships and command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>bits</category><category>windows</category></item><item><title>Google Workspace Suspicious Login Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</guid><description>Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting suspicious login activity within Google Workspace environments, as flagged by Google&rsquo;s internal risk assessment mechanisms. Google Workspace logs login events and classifies them based on various risk factors, including the use of less secure applications, programmatic logins, and other anomalies. This detection capability is crucial for identifying potential compromises, unauthorized access attempts, and malicious activities within the Google Workspace ecosystem. Analyzing these flagged events allows security teams to proactively respond to threats before they escalate, preventing data breaches and maintaining the integrity of sensitive information. This alert focuses on logins classified as &lsquo;suspicious_login_less_secure_app&rsquo;, &lsquo;suspicious_login&rsquo;, and &lsquo;suspicious_programmatic_login&rsquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access using compromised credentials or brute-force techniques targeting Google Workspace accounts.</li>
<li><strong>Login Attempt:</strong> The attacker attempts to log in to a Google Workspace account using a less secure application (e.g., an older email client without modern authentication) or via programmatic login.</li>
<li><strong>Suspicious Activity Detection:</strong> Google&rsquo;s internal systems analyze the login attempt and flag it as suspicious based on various risk factors, such as unusual location, time of day, or login method.</li>
<li><strong>Event Logging:</strong> Google Workspace logs the suspicious login event, including the reason for the classification (e.g., &lsquo;suspicious_login_less_secure_app&rsquo;).</li>
<li><strong>Potential Privilege Escalation:</strong> Upon successful login, the attacker may attempt to escalate privileges within the Google Workspace environment to gain broader access.</li>
<li><strong>Defense Evasion:</strong> The attacker might use techniques to evade detection, such as disabling security features or modifying audit logs.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new accounts, modifying existing ones, or installing malicious apps.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> The attacker uses the compromised account to exfiltrate sensitive data or perform other malicious activities, such as sending phishing emails.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data stored within Google Workspace, including emails, documents, and other files. This can result in data breaches, financial loss, and reputational damage. The number of affected users depends on the scope of the compromised account and the attacker&rsquo;s ability to escalate privileges. Targeted sectors are broad, affecting any organization relying on Google Workspace for collaboration and data storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious login activity classified by Google Workspace (logsource: <code>gcp</code>, service: <code>google_workspace.login</code>).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the login attempt and take appropriate action, such as resetting passwords or disabling compromised accounts.</li>
<li>Enforce multi-factor authentication (MFA) for all Google Workspace accounts to mitigate the risk of credential compromise.</li>
<li>Disable or restrict the use of less secure apps within Google Workspace to reduce the attack surface.</li>
<li>Monitor Google Workspace audit logs for other suspicious activities, such as unusual file access or data exfiltration attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>gworkspace</category></item><item><title>Okta Identity Provider Creation Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-idp-created/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-idp-created/</guid><description>An adversary may create a rogue identity provider within Okta to establish persistence and potentially escalate privileges by impersonating legitimate users or bypassing multi-factor authentication.</description><content:encoded><![CDATA[<p>The creation of a new identity provider (IdP) in Okta is a sensitive action that should be closely monitored. While legitimate administrators may create IdPs for federation purposes, adversaries can abuse this functionality to establish persistence or escalate privileges within an Okta environment. This involves creating a malicious IdP that they control and configuring it to authenticate users, potentially bypassing existing security controls such as multi-factor authentication (MFA) or implementing cross-tenant impersonation. The creation of a rogue IdP within Okta can be an indicator of compromise, potentially leading to unauthorized access to applications and data protected by Okta. Defenders should monitor Okta system logs for the creation of new identity providers and validate their legitimacy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta tenant with sufficient administrative privileges, either through compromised credentials or by exploiting a vulnerability.</li>
<li>The attacker navigates to the Okta admin console.</li>
<li>The attacker creates a new identity provider (IdP) within the Okta tenant (system.idp.lifecycle.create).</li>
<li>The attacker configures the rogue IdP with attacker-controlled settings, such as SAML endpoints or OIDC configurations, potentially pointing to an attacker-controlled server.</li>
<li>The attacker configures routing rules within Okta to direct specific users or groups to authenticate through the newly created, malicious IdP.</li>
<li>Users attempting to access Okta-protected applications are redirected to the attacker-controlled IdP for authentication.</li>
<li>The attacker&rsquo;s IdP captures user credentials or issues fraudulent authentication tokens, allowing the attacker to impersonate legitimate users.</li>
<li>The attacker leverages the stolen credentials or fraudulent tokens to access sensitive applications and data protected by Okta, achieving their objective of data theft or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the creation of a rogue Okta identity provider can lead to significant consequences. Attackers can gain persistent access to the Okta environment, bypass multi-factor authentication, and impersonate legitimate users. This can result in unauthorized access to sensitive applications and data, data breaches, financial loss, and reputational damage. The scope of the impact depends on the privileges of the compromised accounts and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Okta Identity Provider Created&rdquo; to your SIEM to detect the creation of new identity providers and tune it for your environment.</li>
<li>Regularly review and validate all configured identity providers within your Okta tenant to ensure their legitimacy.</li>
<li>Implement strong access controls and multi-factor authentication for all Okta administrative accounts to prevent unauthorized creation of identity providers.</li>
<li>Monitor Okta system logs for suspicious activity related to identity provider configuration and authentication.</li>
<li>Investigate any alerts triggered by the &ldquo;Okta Identity Provider Created&rdquo; Sigma rule to determine the legitimacy of the IdP creation event.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identityprovider</category><category>okta</category><category>persistence</category></item><item><title>Potential Privilege Escalation via SUID/SGID Abuse on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-suid-sgid-privesc/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suid-sgid-privesc/</guid><description>This rule detects potential privilege escalation attempts on Linux systems by identifying processes running with root privileges but initiated by non-root users, indicative of SUID/SGID abuse.</description><content:encoded><![CDATA[<p>This detection rule, sourced from Elastic, identifies instances where a process executes with root privileges (UID/GID 0) while the real user/group ID is non-zero. This condition suggests that the process has been granted SUID/SGID permissions, potentially allowing it to run with elevated privileges. Attackers may exploit such misconfigurations to escalate their privileges to root or establish persistence mechanisms. The rule focuses on Linux systems and leverages Elastic Defend data to identify such events. The initial publication date of the rule was in June 2024, with updates made as recently as May 2026. This type of misconfiguration can lead to significant security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user (non-root) executes a binary that has the SUID or SGID bit set.</li>
<li>The system checks the permissions of the executable and identifies the SUID/SGID bit.</li>
<li>The process spawns with the effective UID/GID set to the owner/group of the executable file (typically root).</li>
<li>The process attempts to perform actions that require elevated privileges.</li>
<li>If the SUID/SGID binary is vulnerable, the attacker can leverage it to execute arbitrary commands as root.</li>
<li>The attacker escalates privileges to root, gaining full control over the system.</li>
<li>The attacker installs a backdoor for persistent access.</li>
<li>The attacker performs malicious activities, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of SUID/SGID misconfigurations can grant an attacker root-level access to a Linux system. This can lead to complete system compromise, including data theft, installation of malware, and the potential for lateral movement to other systems on the network. A single compromised system can be leveraged to attack other internal assets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potential SUID/SGID exploitation (see the <code>rules</code> section).</li>
<li>Review the SUID/SGID binaries identified by the rule and verify their configurations to ensure they are correctly set and necessary.</li>
<li>Implement enhanced monitoring and logging for SUID/SGID execution attempts to detect and respond to similar threats in the future (Data Source: Elastic Defend).</li>
<li>Consider implementing stricter access controls and reducing the number of SUID/SGID binaries on the system to minimize the attack surface.</li>
<li>Investigate the parent process of the flagged binaries to determine the origin of the execution and whether it aligns with expected behavior.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>suid</category><category>sgid</category></item><item><title>First Time Seen Remote Monitoring and Management Tool Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</guid><description>Detects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.</description><content:encoded><![CDATA[<p>Attackers commonly abuse legitimate remote monitoring and management (RMM) tools and remote access software for command and control (C2), persistence, and execution of native commands on compromised endpoints. These tools provide attackers with the ability to maintain access, execute commands, and move laterally within a network. This detection identifies when a process associated with commonly abused RMM/remote access tools is observed for the first time on a host. The rule is designed to trigger when a new process name or code signature associated with RMM software, or a child process of such software, is seen within a configured history window. This helps defenders quickly identify potentially malicious use of legitimate tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to a target system through various methods, such as exploiting vulnerabilities or using compromised credentials.</li>
<li>Tool Deployment: The attacker deploys a remote monitoring and management (RMM) tool or remote access software on the compromised endpoint. This may involve downloading and installing the tool, or exploiting existing installations.</li>
<li>Persistence: The RMM tool is configured to run persistently on the system, ensuring that the attacker maintains access even after a reboot or other disruption. This may involve creating a service or adding a registry key to ensure the tool starts automatically.</li>
<li>Command and Control: The attacker uses the RMM tool to establish a command and control (C2) channel with the compromised system. This allows them to remotely execute commands, transfer files, and monitor activity on the system.</li>
<li>Lateral Movement: Using the RMM tool, the attacker moves laterally within the network, compromising additional systems and escalating their access. This may involve using the tool to access shared resources or execute commands on other systems.</li>
<li>Data Exfiltration or Ransomware Deployment: The attacker uses their access to exfiltrate sensitive data from the compromised network or deploy ransomware to encrypt files and demand a ransom payment.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as logs or files associated with the RMM tool, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via RMM tools can lead to significant data breaches, financial losses, and reputational damage. The use of legitimate tools makes detection more difficult. Successful attacks can result in ransomware deployment, data theft, and prolonged unauthorized access to sensitive systems. Organizations in all sectors are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the process creation rule to detect the execution of RMM tools on endpoints based on <code>process.name</code> and <code>process.code_signature.subject_name</code> criteria in the query.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the collection of necessary event data for the detection rule.</li>
<li>Investigate any alerts generated by the detection rule to determine whether the execution of the RMM tool is authorized and legitimate. Refer to the references for a list of commonly abused RMM tools and associated indicators.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-access</category><category>rmm</category><category>command-and-control</category><category>persistence</category></item><item><title>Okta Admin Role Assignment Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-admin-role/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-admin-role/</guid><description>Detection of new admin role assignments in Okta, potentially indicating privilege escalation or persistence attempts by malicious actors.</description><content:encoded><![CDATA[<p>Okta is a widely used identity and access management (IAM) platform, making it a prime target for malicious actors seeking to gain unauthorized access to sensitive resources. This threat focuses on the creation of new admin role assignments within Okta. An attacker who successfully compromises an Okta account with sufficient privileges, or bypasses security controls, may attempt to escalate their privileges or establish persistence by creating new admin role assignments for themselves or other accounts they control. This activity can go unnoticed if not actively monitored, granting the attacker extended access and control over the Okta environment and connected applications. Monitoring for anomalous admin role assignments is crucial for early detection and prevention of potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attacker gains unauthorized access to an Okta account, possibly through credential phishing, brute-force attacks, or exploitation of vulnerabilities.</li>
<li><strong>Privilege Check:</strong> The attacker verifies the privileges of the compromised account to determine if it has sufficient permissions to create new admin role assignments.</li>
<li><strong>Account Impersonation:</strong> The attacker uses the compromised account to access the Okta admin dashboard.</li>
<li><strong>Role Assignment Creation:</strong> The attacker navigates to the role assignment section and initiates the creation of a new admin role assignment.</li>
<li><strong>Configuration:</strong> The attacker specifies the target user or group for the new admin role assignment.</li>
<li><strong>Audit Logging:</strong> Okta logs the event &lsquo;iam.resourceset.bindings.add&rsquo; indicating the creation of a new admin role assignment.</li>
<li><strong>Persistence:</strong> The attacker uses the newly created admin role assignment to maintain persistent access to the Okta environment even if the initial compromised account is detected and remediated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to complete control over the Okta environment, affecting all connected applications and services. An attacker with admin privileges can modify user accounts, reset passwords, access sensitive data, and potentially compromise the entire organization. The number of affected users and systems depends on the scope of the Okta deployment, but the impact can be significant, potentially affecting thousands of users and critical business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Okta Admin Role Assignment Created</code> to your SIEM and tune it for your environment to detect suspicious admin role creation activity in Okta logs.</li>
<li>Investigate any alerts generated by the <code>Okta Admin Role Assignment Created</code> rule to determine if the role assignment was legitimate and authorized.</li>
<li>Implement multi-factor authentication (MFA) for all Okta accounts, especially those with administrative privileges, to mitigate the risk of credential compromise.</li>
<li>Regularly review and audit Okta admin role assignments to identify and remove any unnecessary or unauthorized privileges.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>identity</category><category>okta</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure Authentication Method Change Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-azure-auth-method-change/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-azure-auth-method-change/</guid><description>An attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.</description><content:encoded><![CDATA[<p>Attackers often target cloud environments to establish persistence and maintain unauthorized access. One technique involves adding their own authentication methods to compromised user accounts. By registering a new security info, such as a phone number or email address, an attacker can bypass multi-factor authentication and regain access even if the original credentials are changed. This activity is typically logged within Azure Audit Logs, specifically under the &lsquo;Authentication Methods&rsquo; service and &lsquo;UserManagement&rsquo; category. Detecting these changes is crucial for identifying potentially compromised accounts and preventing further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the Azure environment is gained, potentially through credential phishing or other means.</li>
<li>The attacker identifies a target user account with sufficient privileges.</li>
<li>The attacker accesses the Azure Active Directory (Azure AD) settings for the compromised user.</li>
<li>The attacker navigates to the &ldquo;Security info&rdquo; section of the user&rsquo;s profile.</li>
<li>The attacker registers a new authentication method, such as a phone number or email address, controlled by the attacker. This action generates an audit log event with OperationName &ldquo;User registered security info&rdquo;.</li>
<li>The attacker can now use the newly added authentication method to bypass multi-factor authentication.</li>
<li>The attacker leverages the compromised account to access sensitive data, applications, or resources within the Azure environment.</li>
<li>The attacker maintains persistent access to the Azure environment, even if the original account password is changed.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of rogue authentication methods allows attackers to maintain persistent access to compromised accounts within Azure environments. This can lead to data breaches, unauthorized access to sensitive applications, privilege escalation, and lateral movement within the cloud infrastructure. The impact can range from data exfiltration to complete control over the targeted Azure resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect changes to authentication methods within Azure audit logs (logsource: azure, service: auditlogs).</li>
<li>Investigate any instances where the <code>OperationName</code> is <code>User registered security info</code> in the Azure Audit Logs, as this indicates a change in authentication method.</li>
<li>Review the referenced Microsoft documentation on privileged account security to understand best practices for securing administrative accounts (references).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Detect Suspicious Windows Service Installation</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-service-installation/</link><pubDate>Fri, 12 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-service-installation/</guid><description>This detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.</description><content:encoded><![CDATA[<p>Attackers frequently abuse Windows services for persistence and privilege escalation. By creating or modifying services with malicious configurations, they can execute code with SYSTEM privileges. This rule detects suspicious service creations based on the image path, looking for services that point to command interpreters, scripts, or unusual locations. This activity is indicative of malicious actors attempting to establish persistence or escalate privileges within a compromised system. The detection focuses on identifying unusual command lines and file paths associated with newly created services based on Windows Event IDs 4697 and 7045.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through various means.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges to SYSTEM.</li>
<li>Service Creation: The attacker creates a new Windows service using tools like <code>sc.exe</code> or modifies an existing one.</li>
<li>Image Path Modification: The attacker sets the service&rsquo;s <code>ImagePath</code> to point to a command interpreter (e.g., cmd.exe, powershell.exe) or a script file.</li>
<li>Command Execution: The service executes the command interpreter or script with SYSTEM privileges.</li>
<li>Persistence: The attacker configures the service to start automatically on system boot, ensuring persistent access.</li>
<li>Malicious Activity: The attacker uses the elevated privileges to perform malicious activities, such as installing malware, stealing credentials, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the compromised system with SYSTEM privileges. This can lead to complete system compromise, data theft, installation of ransomware, and lateral movement to other systems within the network. The impact includes potential data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logs and Windows System Event Logs to capture service creation events (Event IDs 4697 and 7045).</li>
<li>Deploy the Sigma rule <code>Suspicious Service Installation via ImagePath</code> to your SIEM to detect suspicious service creations.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the service&rsquo;s <code>ImagePath</code> and associated processes.</li>
<li>Use the Osquery queries provided in the source to investigate existing services, unsigned executables, and drivers for suspicious characteristics.</li>
<li>Monitor for registry changes related to service creation or modification.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>windows</category><category>service_creation</category></item><item><title>Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</link><pubDate>Tue, 09 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</guid><description>Adversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.</description><content:encoded><![CDATA[<p>Attackers may attempt to load malicious, unsigned DLLs into <code>svchost.exe</code>, a legitimate Windows service host process, to maintain persistence or escalate privileges. This technique abuses the shared service host process to execute arbitrary code with SYSTEM privileges. The <code>svchost.exe</code> process, which typically hosts multiple Windows services, can be targeted to load malicious DLLs from unusual file paths, potentially bypassing security measures that rely on code signing validation. This is especially concerning because <code>svchost.exe</code> is a trusted process, making detection more challenging. The loading of unsigned DLLs by <code>svchost.exe</code> from atypical directories is a strong indicator of potential malicious activity, as legitimate Windows services rarely load unsigned libraries from such locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to the system through an undisclosed method (e.g., exploitation of a vulnerability or social engineering).</li>
<li>The attacker creates a malicious, unsigned DLL on the compromised system in a non-standard directory like <code>C:\ProgramData\</code>.</li>
<li>The attacker modifies the Windows Registry to configure a service hosted by <code>svchost.exe</code> to load the malicious DLL. This often involves manipulating service dependencies or service parameters.</li>
<li>The system is restarted, or the targeted service is manually restarted, causing <code>svchost.exe</code> to load the specified DLL.</li>
<li><code>svchost.exe</code> executes the code within the malicious DLL, now running with the privileges of the hosted service (typically SYSTEM).</li>
<li>The malicious DLL performs actions such as installing backdoors, escalating privileges further, or establishing command and control (C2) communication.</li>
<li>The attacker uses the established C2 channel to remotely control the compromised system, exfiltrate data, or perform other malicious activities.</li>
<li>The attacker maintains persistence on the system by ensuring the malicious DLL is loaded each time the service or system starts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain persistent access to the compromised system with elevated (SYSTEM) privileges. This can lead to complete system compromise, data theft, installation of backdoors, and lateral movement within the network. The use of <code>svchost.exe</code> as a host for malicious DLLs makes detection more difficult, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unsigned DLLs loaded by <code>svchost.exe</code>, focusing on the specified file paths and code signature status.</li>
<li>Examine <code>dll.Ext.relative_file_creation_time</code> to identify DLLs created shortly before being loaded to catch newly created malicious files.</li>
<li>Review and validate the legitimacy of all DLLs loaded by <code>svchost.exe</code>, focusing on those located in unusual paths.</li>
<li>Update endpoint detection and response (EDR) systems to specifically monitor for the loading of unsigned DLLs by system processes like <code>svchost.exe</code>.</li>
<li>Continuously update the exclusion list of known good DLL hashes to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>execution</category><category>windows</category><category>dll-injection</category></item><item><title>Uncommon Destination Port Connection by Web Server on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</link><pubDate>Tue, 09 Jan 2024 18:28:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</guid><description>The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying potentially malicious activity stemming from Linux-based web servers. The rule is triggered when a web server process, such as Apache, Nginx, or others, initiates an outbound network connection to a destination port that is considered non-standard. This activity can signal the presence of a web shell, a malicious script uploaded to a web server to enable remote access and control. Attackers may exploit compromised web servers to establish covert communication channels, exfiltrate data, or launch further attacks on internal systems. The rule leverages data from Elastic Defend to monitor network connections and filter out legitimate traffic based on a predefined list of common ports and internal IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via exploitation of a vulnerability in a web application or web server component running on a Linux system (e.g., through SQL injection or remote code execution).</li>
<li>A web shell is uploaded to the compromised web server, often disguised as a legitimate file or hidden within existing directories.</li>
<li>The attacker interacts with the web shell through HTTP requests, using it as a command and control interface.</li>
<li>The web shell executes commands on the server, initiating outbound network connections to non-standard ports.</li>
<li>These connections may be used to communicate with external C2 servers, download additional payloads, or exfiltrate sensitive data.</li>
<li>The attacker uses the web shell to move laterally within the network, targeting other systems and services.</li>
<li>The attacker attempts to establish persistence on the compromised server, ensuring continued access even after system reboots.</li>
<li>The final objective is data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised web servers can lead to significant data breaches, system downtime, and reputational damage. While this rule triggers on low-severity behavior, successful exploitation can lead to complete system compromise. The number of affected systems depends on the scope of the initial vulnerability and the attacker&rsquo;s ability to move laterally. Organizations in all sectors that rely on web-based applications are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect web server processes initiating connections to unusual destination ports and tune for your environment.</li>
<li>Enable Elastic Defend integration to collect the necessary network event data from Linux endpoints to activate the rule.</li>
<li>Review and customize the list of excluded destination ports and internal IP ranges in the Sigma rule to match your organization&rsquo;s specific network configuration and legitimate traffic patterns.</li>
<li>Investigate any alerts generated by the rule to determine if the activity is malicious or benign, focusing on the process name, user, destination IP, and destination port.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>command-and-control</category><category>web shell</category><category>linux</category></item><item><title>Unauthorized Removal of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</guid><description>An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.</description><content:encoded><![CDATA[<p>The unauthorized removal of a Conditional Access (CA) policy in Azure Active Directory can significantly weaken an organization&rsquo;s security posture. Conditional Access policies are critical for enforcing multi-factor authentication, device compliance, and other security controls based on user, location, device, and application conditions. When a non-approved actor removes such a policy, it can open the door for privilege escalation, credential access, and persistence by malicious actors. This activity is often performed after an initial compromise to disable security controls and move laterally within the environment. Identifying and responding to such removals promptly is essential to maintain a strong security posture.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an account with sufficient privileges to view and modify Azure Active Directory settings. This could be through phishing, password spraying, or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges within Azure AD to gain the necessary permissions to manage Conditional Access policies. This might involve adding themselves to a privileged role or exploiting misconfigurations in existing roles.</li>
<li>Discovery: The attacker enumerates existing Conditional Access policies to identify targets for removal. They may focus on policies that enforce MFA or restrict access based on location.</li>
<li>Defense Evasion: The attacker disables or modifies logging configurations to reduce the likelihood of detection.</li>
<li>Policy Removal: The attacker removes the targeted Conditional Access policy using the Azure portal, PowerShell, or the Azure CLI. The audit logs will record a &ldquo;Delete conditional access policy&rdquo; event.</li>
<li>Credential Access: With the CA policy removed, the attacker may attempt to access sensitive resources or applications without MFA, potentially gaining access to credentials or sensitive data.</li>
<li>Persistence: The attacker establishes persistence by creating new user accounts or modifying existing ones to maintain access even if their initial entry point is discovered.</li>
<li>Lateral Movement: The attacker leverages the compromised credentials and weakened security controls to move laterally to other systems and resources within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful removal of a Conditional Access policy can lead to widespread compromise. Attackers can bypass multi-factor authentication, gain unauthorized access to sensitive data, and escalate privileges within the organization. The impact can range from data breaches and financial losses to reputational damage and compliance violations. Depending on the scope of the compromised policy, the number of affected users could range from dozens to thousands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect the &ldquo;Delete conditional access policy&rdquo; event in Azure audit logs, indicating a CA policy removal.</li>
<li>Regularly review and audit Azure Active Directory role assignments to minimize the risk of unauthorized privilege escalation.</li>
<li>Implement multi-factor authentication for all user accounts, especially those with administrative privileges.</li>
<li>Monitor Azure audit logs for unusual activity, such as changes to user accounts, role assignments, and Conditional Access policies.</li>
<li>Investigate any detected instances of CA policy removal to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Review and harden Conditional Access policies to ensure they are effectively protecting critical resources and applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category><category>credential-access</category><category>persistence</category><category>defense-impairment</category></item><item><title>Persistence via Scheduled Job Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</guid><description>This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.</description><content:encoded><![CDATA[<p>Adversaries may abuse scheduled tasks to maintain persistence on a compromised system. This involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. This activity can be used to ensure that the attacker&rsquo;s code remains active even after a system restart or user logout. The detection rule identifies suspicious job creation by monitoring specific file paths and extensions, excluding known legitimate processes to flag potential abuse. The rule is designed for data generated by Elastic Defend, but also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker attempts to establish persistence.</li>
<li>The attacker uses a script or program to create a new scheduled job within the <code>C:\Windows\Tasks\</code> directory.</li>
<li>The scheduled job is configured to execute a malicious payload at a specified time or interval.</li>
<li>The malicious payload could be a script (e.g., PowerShell) or an executable.</li>
<li>The scheduled job executes, triggering the malicious payload.</li>
<li>The attacker maintains persistent access to the system.</li>
<li>The attacker performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain a persistent presence on the compromised system. This allows them to execute malicious code, steal sensitive information, or perform other malicious activities over an extended period. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to monitor file creation events on Windows systems.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Scheduled Job Creation&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on scheduled jobs created in the <code>C:\Windows\Tasks\</code> directory with a &ldquo;.job&rdquo; extension.</li>
<li>Review and update exclusion lists for known legitimate scheduled job creation processes (e.g., CCleaner, ManageEngine) to minimize false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category></item><item><title>Suspicious WerFault Child Process Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</guid><description>This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by WerFault.exe, the Windows Error Reporting tool. Attackers can abuse WerFault by manipulating the <code>SilentProcessExit</code> registry key to execute malicious processes. This technique allows for defense evasion, persistence, and privilege escalation. The detection focuses on WerFault processes with specific command-line arguments (<code>-s</code>, <code>-t</code>, and <code>-c</code>) known to be used in SilentProcessExit exploitation, while excluding legitimate executables like <code>Initcrypt.exe</code> and <code>Heimdal.Guard.exe</code>. The rule helps defenders identify potential attempts to hijack the error reporting mechanism for malicious purposes. The monitored data sources include Windows Event Logs, Sysmon, Elastic Defend, Microsoft Defender XDR, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the <code>SilentProcessExit</code> registry key to specify a malicious process to be executed when a target application crashes. This involves setting the <code>ReportingMode</code> and <code>Debugger</code> values under the <code>SilentProcessExit</code> key for the target application.</li>
<li>The attacker triggers a crash in the target application or waits for a legitimate crash to occur.</li>
<li>WerFault.exe is invoked to handle the application crash.</li>
<li>Due to the registry modification, WerFault.exe spawns the attacker-controlled process, passing command-line arguments such as <code>-s</code>, <code>-t</code>, and <code>-c</code>.</li>
<li>The attacker-controlled process executes with the privileges of WerFault.exe, potentially achieving privilege escalation.</li>
<li>The malicious process performs actions such as injecting code into other processes, establishing persistence, or exfiltrating data.</li>
<li>The attacker achieves their objectives, such as maintaining persistence, escalating privileges, or evading detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistence, privilege escalation, and defense evasion. Attackers can use this technique to execute malicious code with elevated privileges, potentially bypassing security controls and gaining unauthorized access to sensitive data and system resources. The number of victims and affected sectors can vary depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture WerFault.exe child processes (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;WerFault Child Process Masquerading&rdquo; to your SIEM and tune for your environment.</li>
<li>Review the <code>SilentProcessExit</code> registry key for unauthorized modifications (registry_set event).</li>
<li>Investigate any WerFault.exe processes with command-line arguments <code>-s</code>, <code>-t</code>, and <code>-c</code> (process_creation event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>privilege-escalation</category><category>masquerading</category></item><item><title>Detection of Custom Shim Database Installation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</guid><description>Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.</description><content:encoded><![CDATA[<p>Attackers can exploit the Windows Application Compatibility Shim functionality to maintain persistence and execute arbitrary code within legitimate Windows processes. This is achieved by installing custom shim databases, which are designed to ensure older applications run smoothly on newer operating systems. By manipulating these databases, attackers can stealthily inject malicious code into trusted processes. The rule detects changes in specific registry paths associated with the installation of these databases, excluding known legitimate processes to minimize false positives. This technique allows for the execution of malicious code without directly modifying the target application&rsquo;s executable, making it difficult to detect with traditional methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the registry to create a new entry for a custom shim database. The registry path targeted is typically under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\</code>.</li>
<li>The attacker writes a malicious <code>.sdb</code> file containing the custom shim database to a location on disk.</li>
<li>The registry entry created points to the malicious <code>.sdb</code> file.</li>
<li>When a targeted application is launched, Windows checks the AppCompatFlags registry keys.</li>
<li>The system loads the malicious shim database specified in the registry.</li>
<li>The malicious code within the shim database is executed in the context of the targeted application.</li>
<li>The attacker achieves persistence, as the malicious shim database is loaded every time the targeted application is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the system, even after reboots or software updates. The injected code runs within the context of a legitimate process, which can evade detection by traditional security tools. This can lead to data theft, system compromise, or further malicious activities, such as lateral movement within the network. The use of application shimming for persistence affects systems running Windows and can impact organizations of any size or sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Custom Shim Database Installation</code> to your SIEM to identify suspicious registry modifications related to application shimming.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not in the exclusion list.</li>
<li>Block or quarantine any identified malicious <code>.sdb</code> files to prevent further execution.</li>
<li>Review and update the exclusion list in the Sigma rule with any newly identified legitimate applications that use shim databases, reducing false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>app-compat</category><category>shim</category><category>windows</category></item><item><title>Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment</title><link>https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</link><pubDate>Fri, 05 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-apache-struts-cve-2023-50164-webshell/</guid><description>Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.</description><content:encoded><![CDATA[<p>CVE-2023-50164 is a critical path traversal vulnerability affecting Apache Struts 2 versions prior to 2.5.33 or 6.3.0.2. The vulnerability resides in the file upload functionality, allowing attackers to manipulate file upload parameters and write malicious files, such as JSP web shells, to arbitrary locations on the web server. Successful exploitation leads to remote code execution. Detection focuses on correlating suspicious file upload requests to Struts endpoints with subsequent creation of JSP files in web-accessible directories, indicating successful exploitation. The attack involves crafting malicious multipart/form-data POST requests with WebKitFormBoundary to Struts .action upload endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious HTTP POST request to a vulnerable Apache Struts endpoint (e.g., <code>*.action</code>).</li>
<li>The HTTP POST request contains a <code>multipart/form-data</code> content type with a <code>WebKitFormBoundary</code> string.</li>
<li>The request exploits CVE-2023-50164, leveraging a path traversal vulnerability in the file upload process.</li>
<li>The attacker bypasses security controls due to the path traversal vulnerability.</li>
<li>The attacker uploads a malicious JSP file (web shell) to a web-accessible directory, such as Tomcat&rsquo;s <code>webapps</code> directory.</li>
<li>A Java process (e.g., Tomcat) creates the JSP web shell file in the webapps directory.</li>
<li>The attacker accesses the deployed web shell via HTTP.</li>
<li>The attacker executes arbitrary commands on the server through the web shell.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-50164 allows attackers to achieve remote code execution on the affected server. This can lead to complete system compromise, data exfiltration, deployment of malware, and lateral movement within the network. The vulnerability affects Apache Struts 2 applications using the file upload feature, potentially impacting numerous organizations across various sectors using the framework.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Webshell Creation&rdquo; to detect JSP file creation events in webapps directories following suspicious POST requests as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;Apache Struts CVE-2023-50164 Suspicious POST Request&rdquo; to detect suspicious POST requests to Struts endpoints with <code>multipart/form-data</code> content containing <code>WebKitFormBoundary</code>, as indicated in the Attack Chain.</li>
<li>Patch Apache Struts 2 to version 2.5.33, 6.3.0.2, or higher to remediate the CVE-2023-50164 vulnerability, as noted in the References.</li>
<li>Enable HTTP request body capture in network traffic monitoring tools to detect the multipart/form-data content containing WebKitFormBoundary indicators, as required by the rule setup.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apache-struts</category><category>webshell</category><category>cve-2023-50164</category><category>initial-access</category><category>persistence</category><category>command-and-control</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>Persistence via Malicious Microsoft Outlook VBA Template</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-vba-persistence/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-vba-persistence/</guid><description>Attackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.</description><content:encoded><![CDATA[<p>Attackers can leverage Microsoft Outlook&rsquo;s VBA scripting capabilities to establish persistence on compromised systems. This is achieved by installing malicious VBA templates within the Outlook environment. These templates are designed to execute upon application startup, granting the attacker sustained access and control. The attack centers around unauthorized modifications to the <code>VbaProject.OTM</code> file, a critical component for VBA script storage in Outlook. This technique allows threat actors to maintain a foothold even after system restarts or user logoffs. Defenders need to monitor for suspicious changes to this file to identify and mitigate potential compromises.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or other social engineering methods (not detailed in source).</li>
<li>The attacker identifies a user with Microsoft Outlook installed and running on a Windows system.</li>
<li>The attacker modifies or replaces the existing <code>VbaProject.OTM</code> file located in the user&rsquo;s Outlook profile (<code>C:\Users\*\AppData\Roaming\Microsoft\Outlook\</code>).</li>
<li>The modified <code>VbaProject.OTM</code> file contains malicious VBA code designed to execute when Outlook starts.</li>
<li>The victim launches Microsoft Outlook.</li>
<li>The malicious VBA code within <code>VbaProject.OTM</code> executes automatically upon Outlook startup, establishing persistence.</li>
<li>The VBA script can perform various malicious actions, such as downloading and executing additional payloads, establishing command and control, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access to the compromised system, allowing attackers to steal sensitive information, deploy ransomware, or use the system as a staging ground for further attacks within the network. The number of victims and specific sectors targeted depends on the attacker&rsquo;s objectives and scope of the campaign. If the attack succeeds, an attacker could gain complete control over the user&rsquo;s email account and associated data, leading to significant data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Outlook VBA Template Modification</code> to your SIEM to identify unauthorized modifications to the <code>VbaProject.OTM</code> file based on file creation events.</li>
<li>Enable Sysmon file creation logging (Event ID 11) to activate the <code>Detect Outlook VBA Template Modification</code> rule.</li>
<li>Implement application control policies to restrict unauthorized modifications to Outlook VBA files as described in the &ldquo;Response and remediation&rdquo; section of the source.</li>
<li>Monitor file creation events related to <code>VbaProject.OTM</code> in the specified paths (<code>C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Outlook\\VbaProject.OTM</code>) as highlighted in the rule query.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>vba</category><category>outlook</category><category>windows</category></item><item><title>Kubernetes Sensitive Role Creation or Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-sensitive-role-creation/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-sensitive-role-creation/</guid><description>Detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs, potentially leading to privilege escalation or unauthorized access within the cluster.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying suspicious activities related to Kubernetes Role-Based Access Control (RBAC). It specifically targets the creation, update, or patching of Kubernetes Roles or ClusterRoles that introduce high-risk permissions. These include wildcard access, where a single rule grants access to all resources, and escalation verbs like &lsquo;bind&rsquo;, &rsquo;escalate&rsquo;, or &lsquo;impersonate&rsquo;, which can be used to elevate privileges. The rule is designed to alert security teams to potential privilege escalation or unauthorized access attempts within Kubernetes environments. The Elastic detection rule was last updated on April 27, 2026, and aims to detect malicious actors attempting to gain cluster-admin-equivalent access by creating new ClusterRoles with <code>*</code> verbs/resources and binding them to their accounts or service accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the Kubernetes cluster, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker attempts to create or modify a Role or ClusterRole.</li>
<li>The attacker adds high-risk permissions to the Role or ClusterRole, such as wildcard verbs/resources (<code>*</code>) or escalation verbs (bind, escalate, impersonate).</li>
<li>The Kubernetes API server authorizes the request, potentially due to misconfigured RBAC policies.</li>
<li>The attacker creates or modifies a RoleBinding or ClusterRoleBinding to associate the modified Role or ClusterRole with a target user, group, or service account.</li>
<li>The target user, group, or service account now possesses the elevated privileges granted by the modified Role or ClusterRole.</li>
<li>The attacker leverages the elevated privileges to perform unauthorized actions within the cluster, such as accessing sensitive data or deploying malicious workloads.</li>
<li>The attacker achieves persistence by maintaining the modified Role or ClusterRole and its associated bindings, allowing continued access to elevated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to significant security breaches within a Kubernetes environment. Attackers can gain unauthorized access to sensitive data, deploy malicious workloads, disrupt services, and potentially compromise the entire cluster. This can result in data breaches, financial losses, and reputational damage. The rule aims to prevent attackers from silently expanding privileges, enabling persistence, or facilitating lateral movement across the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubernetes Creation of Sensitive Role</code> to your SIEM to detect the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions.</li>
<li>Enable Kubernetes audit logging to capture the necessary events for the Sigma rules to function effectively (reference: Kubernetes audit logs in <code>logsource</code>).</li>
<li>Implement RBAC guardrails using tools like OPA Gatekeeper or Kyverno to prevent the creation of Roles/ClusterRoles with wildcard or escalation verbs (reference: harden recommendation in the content).</li>
<li>Regularly review and audit RBAC configurations to identify and remediate overly permissive roles and bindings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>rbac</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure AD Bitlocker Key Retrieval</title><link>https://feed.craftedsignal.io/briefs/2024-01-bitlocker-key-retrieval/</link><pubDate>Wed, 03 Jan 2024 18:29:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bitlocker-key-retrieval/</guid><description>An adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.</description><content:encoded><![CDATA[<p>Attackers with access to Azure Active Directory, either through compromised credentials or an insider threat, can retrieve BitLocker recovery keys stored within the Azure environment. This allows them to decrypt volumes protected with BitLocker encryption. While retrieving BitLocker keys is a legitimate administrative function, anomalous or unauthorized access can indicate malicious activity. Attackers may leverage this to gain unauthorized access to encrypted data, escalate privileges, or move laterally within the compromised environment. Defenders need to monitor BitLocker key retrieval events for unusual patterns or unauthorized access attempts to detect and prevent potential data breaches or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains unauthorized access to an Azure Active Directory account with sufficient privileges, possibly via credential phishing or password spraying (T1078.004).</li>
<li>Privilege Escalation (if needed): The attacker escalates privileges within Azure AD if the initially compromised account lacks the necessary permissions to read BitLocker keys.</li>
<li>Discovery: The attacker uses Azure AD tools or PowerShell cmdlets to identify devices with BitLocker encryption enabled.</li>
<li>Key Retrieval: The attacker uses the Azure portal or PowerShell to retrieve the BitLocker recovery key for a specific device. This generates an audit log event.</li>
<li>Offline Access: The attacker uses the retrieved BitLocker recovery key to unlock the encrypted drive on a compromised system or a copied disk image.</li>
<li>Data Exfiltration or Lateral Movement: With the drive unlocked, the attacker can access sensitive data, install malware, or use the system for lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful BitLocker key retrieval can lead to unauthorized access to sensitive data stored on encrypted drives. This could result in data breaches, financial loss, reputational damage, and legal liabilities. The impact depends on the sensitivity and volume of data stored on the encrypted volumes, as well as the attacker&rsquo;s subsequent actions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect BitLocker key retrieval events in Azure Audit Logs.</li>
<li>Review Azure AD access logs for suspicious activity related to user accounts that have permissions to read BitLocker keys (reference: Sigma rule).</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges in Azure AD, to prevent unauthorized access (T1078.004).</li>
<li>Implement Conditional Access policies to restrict access to sensitive Azure resources, including BitLocker recovery keys, based on factors such as location, device, and user risk.</li>
<li>Regularly review and audit Azure AD roles and permissions to ensure that users only have the necessary privileges to perform their job functions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>bitlocker</category><category>key-retrieval</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Azure PIM Elevation Approved or Denied</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</link><pubDate>Wed, 03 Jan 2024 18:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-pim-elevation/</guid><description>Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.</description><content:encoded><![CDATA[<p>The compromise of privileged accounts within cloud environments is a significant risk. Azure Privileged Identity Management (PIM) is designed to mitigate this risk by enforcing time-bound and approval-based role activation. This brief focuses on the detection of PIM elevation requests that are either approved or denied. While legitimate administrator actions will trigger these events, unexpected or unauthorized approvals/denials, especially those occurring outside of normal business hours or originating from unusual locations, warrant immediate investigation. This activity can indicate attempts at unauthorized privilege escalation, lateral movement, or data exfiltration within the Azure environment. Monitoring these events provides an opportunity to identify and respond to potential breaches before significant damage can occur.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a low-privileged Azure account, possibly through credential phishing or password reuse.</li>
<li>The attacker attempts to activate a privileged role (e.g., Global Administrator, Security Administrator) through Azure PIM.</li>
<li>The PIM request triggers an approval workflow, requiring authorization from designated approvers.</li>
<li>An attacker compromises an approver account, enabling them to approve their own malicious PIM request or deny a legitimate one.</li>
<li>Alternatively, an unwitting approver approves a malicious request, potentially due to social engineering.</li>
<li>Upon approval, the attacker&rsquo;s account is temporarily elevated to the requested privileged role.</li>
<li>The attacker leverages the elevated privileges to perform malicious actions, such as creating new accounts, modifying security policies, or accessing sensitive data.</li>
<li>The attacker attempts to maintain persistence by creating backdoor accounts or modifying access controls, potentially circumventing PIM restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full control over the Azure environment, potentially impacting hundreds or thousands of users and services. A compromised Global Administrator role grants the attacker the ability to access and modify all resources within the Azure tenant, leading to data breaches, service disruptions, and financial losses. The targeted sectors include any organization leveraging Azure PIM for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Azure PIM Elevation Approved or Denied</code> to your SIEM to detect unusual PIM activity.</li>
<li>Investigate any PIM approval or denial events occurring outside of normal business hours or originating from unexpected locations, focusing on the <code>properties.message</code> field in the logs.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with approval permissions for PIM requests.</li>
<li>Regularly review and audit PIM role assignments and approval workflows to ensure they align with the principle of least privilege.</li>
<li>Enable alerting on changes to PIM policies and configurations to detect any unauthorized modifications.</li>
<li>Monitor Azure Audit Logs for suspicious activity following PIM role activation, looking for actions associated with common attack techniques (e.g., account creation, policy modification).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure AD User Added to Global or Device Admin Role</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azuread-role-assignment/</link><pubDate>Wed, 03 Jan 2024 18:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azuread-role-assignment/</guid><description>An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.</description><content:encoded><![CDATA[<p>Attackers often target identity and access management systems like Azure Active Directory (Azure AD) to gain control over an organization&rsquo;s resources. By adding users to highly privileged roles such as Global Administrator or Device Administrator, adversaries can achieve persistence, allowing them to regain access even after initial compromises are remediated. This activity often occurs after an initial foothold has been established, enabling privilege escalation and stealthy movement within the cloud environment. Monitoring role assignments in Azure AD is crucial for detecting and preventing unauthorized access and maintaining the integrity of the organization&rsquo;s cloud infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD account, possibly through credential theft or phishing.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell with compromised credentials.</li>
<li>The attacker enumerates existing Azure AD roles and identifies potential targets like Global Administrator or Device Administrator.</li>
<li>The attacker uses the <code>Add-AzureADGroupMember</code> or similar cmdlets to add a compromised or newly created user account to the target role.</li>
<li>The Azure AD audit logs record the &ldquo;Add member to role&rdquo; operation with the specific role GUIDs (e.g., &lsquo;7698a772-787b-4ac8-901f-60d6b08affd2&rsquo; or &lsquo;62e90394-69f5-4237-9190-012177145e10&rsquo;).</li>
<li>The newly added user account inherits the privileges associated with the Global Administrator or Device Administrator role.</li>
<li>The attacker leverages the elevated privileges to access sensitive data, modify configurations, or deploy malicious applications.</li>
<li>The attacker establishes persistent access by creating new administrative accounts or modifying existing ones to maintain control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of a user to a Global Administrator or Device Administrator role grants the attacker unrestricted access to the Azure AD tenant, potentially impacting all resources connected to it. This can lead to data breaches, service disruptions, financial losses, and reputational damage. The scope of the impact depends on the extent to which the attacker leverages the compromised privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious additions of users to Global or Device Admin roles in Azure AD Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the context of the user account being added and the source of the role assignment operation.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts, especially those with administrative privileges, to mitigate the risk of credential theft (T1078.004).</li>
<li>Regularly review Azure AD role assignments to identify and remove any unauthorized or unnecessary privileges.</li>
<li>Monitor for other suspicious Azure AD activity, such as unusual sign-in patterns, application registrations, and resource deployments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>role-assignment</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Suspicious AWS SAML Activity Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</link><pubDate>Wed, 03 Jan 2024 18:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</guid><description>This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious Security Assertion Markup Language (SAML) activity within Amazon Web Services (AWS). The activity includes monitoring for <code>AssumeRoleWithSAML</code> and <code>UpdateSAMLProvider</code> events. An adversary might exploit SAML to gain unauthorized access, escalate privileges, move laterally within the AWS environment, or establish persistent backdoor access. The focus is on detecting unusual or unauthorized modifications to SAML configurations and role assumptions, which could indicate a compromised identity provider or malicious actor leveraging SAML for illicit purposes. Defenders should prioritize monitoring SAML-related API calls to identify and mitigate potential threats early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or creates a malicious SAML identity provider.</li>
<li>The attacker configures the AWS environment to trust the malicious SAML provider using <code>UpdateSAMLProvider</code>.</li>
<li>The attacker crafts a SAML assertion to assume a specific role within the AWS environment.</li>
<li>The attacker uses the <code>AssumeRoleWithSAML</code> API call to authenticate with AWS using the crafted SAML assertion.</li>
<li>AWS STS validates the SAML assertion and, if valid, provides temporary credentials for the assumed role.</li>
<li>The attacker uses the temporary credentials to perform actions within AWS, potentially escalating privileges.</li>
<li>The attacker moves laterally within the AWS environment, accessing resources and services authorized for the assumed role.</li>
<li>The attacker establishes persistent access by creating backdoors or modifying existing IAM policies, leveraging the initially gained access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via SAML manipulation can lead to a complete compromise of the AWS environment. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and deploy malicious infrastructure. The impact includes potential data breaches, financial losses, and reputational damage. The number of affected resources depends on the permissions associated with the roles assumed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for <code>AssumeRoleWithSAML</code> events to detect suspicious role assumptions (see &ldquo;AssumeRoleWithSAML Detection Rule&rdquo;).</li>
<li>Deploy the Sigma rule for <code>UpdateSAMLProvider</code> events to detect unauthorized SAML provider modifications (see &ldquo;UpdateSAMLProvider Detection Rule&rdquo;).</li>
<li>Investigate any <code>AssumeRoleWithSAML</code> events originating from unfamiliar user agents or IP addresses by reviewing CloudTrail logs.</li>
<li>Monitor <code>UpdateSAMLProvider</code> events for unexpected changes to SAML provider configurations. Review associated CloudTrail logs for user identity, user agent, and hostname to ensure authorized access.</li>
<li>Tune the provided Sigma rules for your environment, addressing false positives by exempting known, legitimate behavior.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>saml</category><category>cloudtrail</category><category>initial-access</category><category>lateral-movement</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category></item><item><title>Outlook Security Settings Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-outlook-registry-security-settings/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-outlook-registry-security-settings/</guid><description>Attackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.</description><content:encoded><![CDATA[<p>Attackers are known to modify Outlook security settings by directly manipulating registry values. This tactic allows them to bypass built-in security controls and enable potentially malicious functionalities such as running unsafe mail client rules. This circumvention of security measures can be leveraged for various malicious purposes, including persistence, data exfiltration, and further compromise of the victim&rsquo;s system. The specific registry keys targeted reside under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code>. This technique has been observed in various attack scenarios and poses a significant risk to organizations relying on Outlook for email communication. The modification of these registry settings may be performed by various means, ranging from manually executed commands to automated scripts deployed as part of a larger attack campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as phishing or exploiting vulnerabilities.</li>
<li>The attacker establishes persistence on the compromised system.</li>
<li>The attacker identifies the specific registry keys controlling Outlook security settings, located under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code>.</li>
<li>The attacker uses a command-line tool or script (e.g., <code>reg.exe</code>, PowerShell) to modify the registry values related to Outlook security settings.</li>
<li>Specifically, values are modified to enable the execution of &ldquo;unsafe&rdquo; mail client rules, potentially allowing arbitrary code execution via crafted emails.</li>
<li>The attacker crafts a malicious email designed to trigger the newly enabled, unsafe mail rules.</li>
<li>Upon receiving the email, Outlook processes the rules, executing the attacker&rsquo;s payload.</li>
<li>The attacker achieves code execution, enabling further malicious activities, such as data exfiltration or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Outlook security settings allows attackers to execute arbitrary code within the context of the user account running Outlook. This can lead to the compromise of sensitive information contained within emails, the installation of malware, and further propagation of the attack throughout the organization. The scope of the impact depends on the privileges of the user account and the attacker&rsquo;s objectives, potentially affecting all users within an organization if the attacker gains domain administrator access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Outlook Security Settings Updated - Registry&rdquo; to your SIEM to detect unauthorized modifications to Outlook security-related registry keys (logsource: registry_set/windows).</li>
<li>Monitor process creation events for suspicious processes (e.g., <code>reg.exe</code>, <code>powershell.exe</code>) modifying registry keys under <code>\SOFTWARE\Microsoft\Office\Outlook\Security\</code> (Sigma rule below, logsource: process_creation/windows).</li>
<li>Implement strict application control policies to prevent unauthorized execution of scripts and executables that could be used to modify registry settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>registry_modification</category><category>outlook</category><category>email</category></item><item><title>Suspicious Execution via Scheduled Task</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-scheduled-task-runtime/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-scheduled-task-runtime/</guid><description>This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious program executions initiated by scheduled tasks on Windows systems. Adversaries often exploit scheduled tasks for persistence and to execute malicious programs. This rule focuses on detecting known malicious executables, such as PowerShell, Cmd, and MSHTA, when launched from unusual file paths like user directories or temporary folders. It leverages process lineage analysis, specifically looking for processes spawned by <code>svchost.exe</code> with the &ldquo;Schedule&rdquo; argument, to determine if the execution originated from a scheduled task. The rule aims to pinpoint potential threats effectively by excluding benign processes and focusing on suspicious combinations of executables and paths. The rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker creates or modifies a scheduled task to execute a malicious payload. This task is designed to run at a specific time or event.</li>
<li>The Windows Task Scheduler service (<code>svchost.exe</code> with &ldquo;Schedule&rdquo; argument) initiates the scheduled task.</li>
<li>The scheduled task executes a suspicious executable, such as <code>powershell.exe</code>, <code>cmd.exe</code>, or <code>mshta.exe</code>.</li>
<li>The suspicious executable is launched from an unusual or suspicious path, such as <code>C:\\Users\\</code>, <code>C:\\ProgramData\\</code>, or <code>C:\\Windows\\Temp\\</code>.</li>
<li>The executed payload performs malicious activities, such as downloading additional malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker maintains persistence on the system through the scheduled task, allowing for repeated execution of the malicious payload.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the compromised system, execute malicious code, and potentially escalate privileges. This can lead to data theft, system compromise, and further lateral movement within the network. The damage includes potential data exfiltration, malware installation, and disruption of normal system operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect suspicious executions (logs-endpoint.events.process-* and logs-windows.sysmon_operational-*).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Execution via Scheduled Task&rdquo; to your SIEM to identify potentially malicious processes executed via scheduled tasks. Tune the rule to exclude legitimate software installations or updates (see rule section below).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes with suspicious original file names and command line arguments (process.pe.original_file_name, process.args).</li>
<li>Monitor scheduled tasks for unauthorized modifications or additions, as this is a common technique for persistence (registry_set).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category></item><item><title>SeEnableDelegationPrivilege Assignment Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</link><pubDate>Wed, 03 Jan 2024 17:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-se-enable-delegation/</guid><description>Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.</description><content:encoded><![CDATA[<p>The SeEnableDelegationPrivilege user right, when assigned to a security principal, allows that principal to be trusted for delegation within Active Directory. Attackers can abuse this right to compromise accounts and elevate privileges by impersonating other users or services. This technique can be used for lateral movement, persistence, and ultimately, domain dominance. Defenders should monitor for the assignment of this privilege, especially to accounts that should not have it. The targeted behavior is logged as event ID 4704 in Windows Security logs. This activity is critical to monitor as it represents a powerful tool for attackers to move laterally and maintain persistence within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised account with sufficient privileges to modify user rights.</li>
<li>The attacker assigns the SeEnableDelegationPrivilege to a target account using tools like <code>ntrights.exe</code> or PowerShell cmdlets.</li>
<li>Windows Security Event 4704 is generated, logging the privilege assignment.</li>
<li>The attacker modifies the target account&rsquo;s attributes, such as <code>userAccountControl</code> or <code>msDS-AllowedToDelegateTo</code>, to enable delegation.</li>
<li>The attacker leverages Kerberos delegation to impersonate other users or services.</li>
<li>Using the impersonated credentials, the attacker accesses sensitive resources or performs privileged actions.</li>
<li>The attacker moves laterally within the network, compromising additional systems and accounts.</li>
<li>The attacker achieves their final objective, such as data exfiltration or domain dominance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise Active Directory accounts and elevate privileges, potentially leading to full control over the domain. The impact includes unauthorized access to sensitive data, lateral movement to critical systems, and the potential for long-term persistence. Depending on the compromised accounts, the entire organization can be at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Authorization Policy Change&rdquo; to generate Windows Security Event ID 4704 (Setup instructions: <a href="https://ela.st/audit-authorization-policy-change)">https://ela.st/audit-authorization-policy-change)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Sensitive Privilege SeEnableDelegationPrivilege assigned to a Principal&rdquo; to your SIEM to detect the assignment of this privilege.</li>
<li>Investigate any instances where SeEnableDelegationPrivilege is assigned, focusing on the targeted account and the source of the change.</li>
<li>Monitor for modifications to delegation-related attributes on user and computer objects.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>windows</category><category>active-directory</category></item><item><title>Malicious Azure Kubernetes Admission Controller Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-admission-controller/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-admission-controller/</guid><description>An adversary can exploit Kubernetes Admission Controllers in Azure to achieve persistence, privilege escalation, or credential access by manipulating webhook configurations.</description><content:encoded><![CDATA[<p>Kubernetes Admission Controllers are critical components that intercept and potentially modify requests to the Kubernetes API server. These controllers rely on admission webhooks (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) deployed within the cluster. A malicious actor can abuse these webhooks to establish persistence by modifying pod creation operations and injecting malicious containers into new pods via MutatingAdmissionWebhook. Alternatively, ValidatingAdmissionWebhook can be used to intercept API server requests, potentially exposing secrets and sensitive information. This activity allows for credential access and privilege escalation, impacting the overall security posture of the Kubernetes cluster.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure Kubernetes cluster, possibly through compromised credentials or a vulnerability in a deployed application.</li>
<li>The attacker identifies the existing Admission Controller configuration within the Kubernetes cluster.</li>
<li>The attacker crafts a malicious MutatingAdmissionWebhook configuration to intercept pod creation requests.</li>
<li>The malicious webhook is deployed to the cluster, configured to modify pod specifications.</li>
<li>When new pods are created, the webhook injects a malicious container into the pod specification before deployment.</li>
<li>The malicious container executes within the newly created pod, providing the attacker with persistent access to the cluster.</li>
<li>Alternatively, the attacker crafts a malicious ValidatingAdmissionWebhook to intercept API requests.</li>
<li>The webhook captures sensitive data, such as secrets, and sends it to an attacker-controlled server, resulting in credential access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising the Kubernetes Admission Controller can lead to persistent access within the cluster. The attacker can inject malicious containers into numerous pods, potentially affecting all applications deployed in the cluster. Sensitive information, like secrets, can be stolen, enabling lateral movement and privilege escalation within the Azure environment. The impact ranges from data breaches to complete cluster compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Kubernetes Admission Controller Configuration Change&rdquo; to detect unauthorized modifications to Admission Controller configurations in Azure Activity Logs.</li>
<li>Regularly review and audit existing Admission Controller configurations for any unexpected or malicious webhooks.</li>
<li>Implement strong RBAC policies to restrict access to Admission Controller configuration and prevent unauthorized modifications.</li>
<li>Monitor Azure Activity Logs for <code>MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO</code> and <code>MICROSOFT.CONTAINERSERVICE/MANAGEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO</code> operations to identify potential abuse.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>kubernetes</category><category>admission-controller</category><category>persistence</category><category>privilege-escalation</category><category>credential-access</category></item><item><title>Azure AD Temporary Access Pass Added to Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-tap-added/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-tap-added/</guid><description>Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.</description><content:encoded><![CDATA[<p>This alert identifies when a temporary access pass (TAP) is added to an Azure Active Directory (Azure AD) account. TAPs are intended for temporary use, allowing users to access resources or perform actions without needing a password. While legitimate use cases exist, adversaries can leverage TAPs to gain unauthorized access, escalate privileges, establish persistence, or move laterally within an Azure environment. This activity warrants investigation, especially if the TAP is added to a privileged account. The source material does not indicate a specific campaign or threat actor, but the technique aligns with common cloud-based attack vectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (Optional):</strong> An attacker gains initial access to an Azure AD account through compromised credentials or other means.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges to an account with sufficient permissions to manage TAPs.</li>
<li><strong>TAP Generation:</strong> The attacker, using an account with appropriate permissions, generates a temporary access pass (TAP) for a target account.</li>
<li><strong>TAP Activation:</strong> The attacker uses the TAP to authenticate to the target account.</li>
<li><strong>Resource Access:</strong> Once authenticated, the attacker gains access to resources and applications associated with the target account.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised account to access other resources or accounts within the environment.</li>
<li><strong>Persistence (Optional):</strong> The attacker establishes persistence by creating new credentials or modifying existing ones, if permissions allow.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and applications within the Azure environment. Compromised privileged accounts can grant attackers control over critical infrastructure, leading to data breaches, service disruptions, and reputational damage. The impact depends on the permissions associated with the compromised account and the resources accessible through the TAP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect TAP additions in Azure AD audit logs (see rules).</li>
<li>Investigate any instances where TAPs are added to privileged accounts in Azure AD, as highlighted in the rule description and references.</li>
<li>Review Azure AD audit logs for suspicious activity surrounding the TAP generation event, including the source IP address and user agent (see rules).</li>
<li>Monitor for anomalous sign-in activity using TAPs, specifically focusing on unusual locations or devices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>temporary-access-pass</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category></item><item><title>Windows Time-Based Evasion via Choice Exec</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</guid><description>Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of <code>choice.exe</code> being used within batch files as a time-delay tactic, a technique notably employed by the SnakeKeylogger malware. The analysis leverages data from Endpoint Detection and Response (EDR) agents, scrutinizing process names and command-line executions. This behavior is significant because it suggests the implementation of time-based evasion techniques designed to circumvent detection mechanisms. Successful evasion could enable attackers to execute malicious code covertly, remove incriminating files, and establish persistent access on compromised systems. The use of <code>choice.exe</code> for such purposes warrants immediate investigation by security operations center (SOC) analysts due to the potential for significant system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access via an unknown vector.</li>
<li>A batch script is executed on the target system.</li>
<li>The batch script uses <code>choice.exe</code> with the <code>/T</code> and <code>/N</code> parameters to introduce a time delay. The <code>/T</code> parameter specifies a timeout period, and the <code>/N</code> parameter suppresses the display of choices.</li>
<li>This delay allows the malware to evade time-sensitive detection mechanisms.</li>
<li>After the delay, the script executes further commands, potentially downloading and executing a payload.</li>
<li>The payload executes, installing a keylogger such as SnakeKeylogger or 0bj3ctivity Stealer.</li>
<li>The keylogger captures sensitive information such as keystrokes and clipboard data.</li>
<li>The stolen data is exfiltrated to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data theft, intellectual property loss, and financial fraud. SnakeKeylogger and similar malware have been used to steal credentials and sensitive information from various targets. Successful exploitation could result in significant financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the compromised systems&rsquo; value.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Choice.exe Time Delay</code> to your SIEM to detect the use of <code>choice.exe</code> with time-delay parameters (log source: <code>process_creation</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution data for the Sigma rule.</li>
<li>Investigate any instances of <code>choice.exe</code> being used with the <code>/T</code> and <code>/N</code> parameters to determine if it is part of a malicious script.</li>
<li>Block the execution of unsigned or untrusted batch scripts to prevent the initial execution of the malicious code.</li>
<li>Monitor endpoint activity for suspicious processes and network connections originating from systems where <code>choice.exe</code> has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>time-based-evasion</category><category>malware</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Modification of Sensitive Linux Files</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</guid><description>This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.</description><content:encoded>&lt;p>Attackers often target sensitive and critical files on Linux systems to maintain persistence, escalate privileges, or disrupt system operations. These files include system configuration files, authentication files, and critical application files. Monitoring changes to these files is crucial for detecting malicious activity. This brief focuses on identifying suspicious process executions that could indicate unauthorized modification of sensitive files. The detection strategy covers processes…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>file-integrity</category><category>privilege-escalation</category><category>persistence</category><category>linux</category></item><item><title>Execution of Persistent Suspicious Programs via Run Keys</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-susp-proc-startup/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-susp-proc-startup/</guid><description>This analytic identifies suspicious programs such as script interpreters, rundll32, or MSBuild being executed shortly after user logon, indicating potential persistence mechanisms abusing the registry run keys.</description><content:encoded><![CDATA[<p>This rule detects a common persistence technique where attackers configure malicious scripts or programs to run automatically after a user logs on to a Windows system. The technique abuses the Registry Run keys and Startup folders to achieve persistence. The rule specifically identifies processes launched shortly after the userinit.exe and explorer.exe processes start, focusing on processes known to be used for malicious purposes, such as cscript.exe, wscript.exe, PowerShell.exe, MSHTA.exe, RUNDLL32.exe, REGSVR32.exe, RegAsm.exe, MSBuild.exe, and InstallUtil.exe. Additionally, it checks if these processes are launched from or access suspicious paths like C:\Users*, C:\ProgramData*, and C:\Windows\Temp*. This detection is crucial because it helps identify potentially malicious activities that bypass standard security measures by leveraging legitimate system tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, typically through phishing, exploiting vulnerabilities, or using stolen credentials (not covered in the source).</li>
<li>The attacker modifies the Windows Registry Run keys (HKCU\Software\Microsoft\Windows\CurrentVersion\Run or HKLM\Software\Microsoft\Windows\CurrentVersion\Run) to execute a malicious program or script.</li>
<li>The system starts, and the winlogon.exe process initiates userinit.exe.</li>
<li>userinit.exe starts explorer.exe, loading the user&rsquo;s profile and desktop environment.</li>
<li>The Registry Run keys are processed, and the malicious program or script is executed as a child process of explorer.exe. This often involves suspicious processes like <code>cscript.exe</code>, <code>powershell.exe</code>, or <code>rundll32.exe</code>.</li>
<li>The malicious process executes from a suspicious location, such as <code>C:\\Users\\*</code>, <code>C:\\ProgramData\\*</code>, or <code>C:\\Windows\\Temp\\*</code>.</li>
<li>The malicious process performs its intended actions, such as downloading additional malware, establishing command and control, or exfiltrating data.</li>
<li>The system remains infected, with the malicious process running every time the user logs on, ensuring persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistent malware infections, data theft, and complete system compromise. Attackers can maintain long-term access to the compromised system, potentially leading to further lateral movement within the network. This can result in significant financial losses, reputational damage, and operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Persistent Suspicious Program Execution&rdquo; to detect suspicious processes executed shortly after user logon (rule).</li>
<li>Enable process creation logging via Sysmon or Elastic Defend to provide the data required for the Sigma rule to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process lineage and command-line arguments of the suspicious processes.</li>
<li>Implement strict access controls and regularly audit user accounts to prevent unauthorized modifications to the Registry Run keys.</li>
<li>Block execution of the listed suspicious processes (<code>cscript.exe</code>, <code>wscript.exe</code>, <code>PowerShell.EXE</code>, <code>MSHTA.EXE</code>, <code>RUNDLL32.EXE</code>, <code>REGSVR32.EXE</code>, <code>RegAsm.exe</code>, <code>MSBuild.exe</code>, <code>InstallUtil.exe</code>) from suspicious paths (<code>C:\\Users\\*</code>, <code>C:\\ProgramData\\*</code>, <code>C:\\Windows\\Temp\\*</code>) via application control policies (overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>threat-detection</category></item><item><title>Azure AD User Password Reset Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-user-password-reset/</guid><description>Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting user-initiated password resets within Azure Active Directory (Azure AD). While legitimate password resets are common, monitoring this activity can help identify potentially malicious behavior, such as an attacker attempting to gain unauthorized access to an account or an insider threat actor escalating privileges. Attackers may leverage compromised credentials or social engineering to initiate password resets, bypassing multi-factor authentication (MFA) if it is not properly configured or enforced. This detection is important for defenders because successful password resets can lead to a complete account takeover, allowing attackers to access sensitive data, resources, and systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, credential stuffing, or malware.</li>
<li>The attacker attempts to log in to an Azure AD-protected resource using the compromised credentials.</li>
<li>The attacker fails to authenticate, either because they do not have the correct password or MFA is enabled.</li>
<li>The attacker initiates a password reset request using the &ldquo;Forgot password&rdquo; feature or a similar mechanism.</li>
<li>Azure AD sends a password reset verification code or link to the user&rsquo;s registered email address or phone number.</li>
<li>If the attacker controls the registered email address or phone number (due to prior compromise), they can access the verification code or link.</li>
<li>The attacker uses the verification code or link to set a new password for the user&rsquo;s Azure AD account.</li>
<li>The attacker logs in to the Azure AD account with the new password, gaining unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets by attackers can lead to complete account takeover, allowing them to access sensitive data, resources, and systems protected by Azure AD. This can result in data breaches, financial loss, reputational damage, and disruption of business operations. The impact depends on the privileges and permissions assigned to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Password Reset By User Account</code> to your SIEM to detect user-initiated password resets in Azure AD audit logs.</li>
<li>Investigate any detected password resets, especially those initiated by users who have not recently requested a password change.</li>
<li>Review and enforce multi-factor authentication (MFA) policies to prevent attackers from bypassing password-based authentication.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to password resets, such as multiple failed login attempts followed by a successful reset.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>password-reset</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>credential-access</category><category>stealth</category></item><item><title>Attrib.exe Used to Hide Files and Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-attrib-hide-files/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-attrib-hide-files/</guid><description>Detection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on the abuse of the native Windows utility <code>attrib.exe</code> to hide files and directories. Attackers use this technique to conceal malicious payloads, tools, or command-and-control infrastructure from both users and security software. By setting the hidden attribute (+h flag), attackers make it more difficult to detect their presence and maintain persistence on compromised systems. This activity is typically observed post-exploitation and can be indicative of more advanced persistent threats. The detection specifically looks for <code>attrib.exe</code> command-line arguments including the &ldquo;+h&rdquo; flag. While legitimate uses of <code>attrib.exe</code> exist, the use of the &lsquo;+h&rsquo; flag, particularly in sensitive directories, should be investigated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker executes arbitrary code on the compromised system.</li>
<li>The attacker uploads or creates malicious files (e.g., backdoors, scripts) on the system.</li>
<li>The attacker uses <code>attrib.exe</code> with the &ldquo;+h&rdquo; flag to hide these malicious files and directories, evading detection. Example: <code>attrib +h C:\Windows\Temp\evil.exe</code></li>
<li>The attacker may also hide associated log files or other artifacts to further conceal their activities.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots.</li>
<li>The attacker moves laterally within the network, compromising additional systems and escalating privileges.</li>
<li>The attacker achieves their objective, which may include data theft, ransomware deployment, or espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious files and directories, hindering incident response and forensic investigations. This can lead to prolonged periods of undetected malicious activity, increasing the risk of data breaches, financial loss, and reputational damage. The consequences can range from minor disruptions to significant operational impact, depending on the attacker&rsquo;s objectives and the scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious usage of <code>attrib.exe</code> with the &lsquo;+h&rsquo; flag.</li>
<li>Enable process-creation logging with command-line arguments on Windows endpoints to ensure the detection rules can be effectively applied (Sysmon Event ID 1 or Windows Event Log Security 4688).</li>
<li>Investigate any alerts generated by the Sigma rules, paying close attention to the parent processes and the context in which <code>attrib.exe</code> is being executed.</li>
<li>Implement file integrity monitoring (FIM) on critical system directories to detect unauthorized file modifications, including attribute changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Suspicious Scripts in the Startup Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-startup-folder-persistence/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-startup-folder-persistence/</guid><description>This rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Startup folder to maintain persistence in an environment. The Startup folder is a special folder in Windows where programs added to this folder are executed during account logon without user interaction. This rule identifies script engines (wscript.exe, cscript.exe) creating files or the creation of script files with specific extensions (vbs, vbe, wsh, wsf, js, jse, sct, hta, ps1, bat, cmd) in the Startup folder. The rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system.</li>
<li>The attacker creates a malicious script (e.g., VBScript, PowerShell) designed to execute arbitrary commands.</li>
<li>The attacker identifies the Startup folder path for a specific user or all users.</li>
<li>The attacker creates a shortcut file (e.g., .lnk) or a script file directly within the Startup folder.</li>
<li>The shortcut or script is configured to execute the malicious script.</li>
<li>The system is restarted or the user logs in.</li>
<li>The operating system automatically executes the script located in the Startup folder.</li>
<li>The malicious script executes, allowing the attacker to perform actions such as installing malware, establishing persistence, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging the Startup folder persistence mechanism allows the attacker to maintain unauthorized access to a compromised system. This can lead to the execution of malicious code, installation of malware, data theft, and further compromise of the network. The impact is significant, potentially affecting all users who log into the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Script Creation in Startup Directory&rdquo; to your SIEM and tune for your environment to identify the creation of suspicious scripts in the Startup folder.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution via Startup Directory&rdquo; to your SIEM and tune for your environment to identify script execution from the Startup directory.</li>
<li>Enable Sysmon Event ID 11 (File Create) to collect necessary data for the detections above.</li>
<li>Investigate any alerts generated by these rules promptly to identify and remediate potential persistence attempts.</li>
<li>Block the file extensions listed in the rule query (vbs, vbe, wsh, wsf, js, jse, sct, hta, ps1, bat, cmd) from being written to the startup folder via application control policies where possible.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>startup</category><category>windows</category><category>attack.persistence</category></item><item><title>Linux Cron File Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-linux-cron-persistence/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-linux-cron-persistence/</guid><description>An attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.</description><content:encoded><![CDATA[<p>Attackers can leverage cron jobs to schedule malicious tasks for persistence, privilege escalation, and execution of arbitrary code on compromised Linux systems. This involves creating or modifying cron files in specific directories such as <code>/etc/cron.d/</code>, <code>/etc/cron.daily/</code>, <code>/var/spool/cron/crontabs/</code>, and others. The creation of unexpected cron files by non-administrative users or during suspicious timeframes warrants investigation. While not all cron file creations are malicious, the potential for abuse necessitates monitoring for anomalous activity. Detecting the creation of new cron files can help identify potential persistence mechanisms being deployed by malicious actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker identifies cron job directories, such as <code>/etc/cron.d/</code> or <code>/var/spool/cron/crontabs/</code>.</li>
<li>The attacker creates a new cron file within one of these directories.</li>
<li>The cron file contains malicious commands or scripts designed to execute at a specific time or interval. This could include commands to download and execute malware or establish a reverse shell.</li>
<li>The cron daemon automatically executes the commands specified in the newly created cron file according to the defined schedule.</li>
<li>The attacker gains persistent access to the system, allowing them to maintain control even after reboots.</li>
<li>The attacker may escalate privileges by scheduling commands that run with elevated permissions.</li>
<li>The attacker uses the persistent access to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can grant attackers persistent access to compromised Linux systems, potentially leading to privilege escalation and unauthorized execution of arbitrary code. This can lead to data breaches, system compromise, and disruption of services. The impact is magnified if the compromised system has access to sensitive information or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect New Cron File Creation&rdquo; to your SIEM to detect the creation of cron files in cron directories and tune for your environment.</li>
<li>Monitor file creation events in cron directories such as <code>/etc/cron.d/</code>, <code>/etc/cron.daily/</code>, <code>/etc/cron.hourly/</code>, <code>/etc/cron.monthly/</code>, <code>/etc/cron.weekly/</code>, <code>/var/spool/cron/crontabs/</code>, and <code>/var/spool/cron/root</code> using file_event logs.</li>
<li>Baseline normal cron file creation activity and apply additional filters to reduce false positives based on the specific environment, as mentioned in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>linux</category></item><item><title>Detection of Privileged Identity Management (PIM) Settings Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-pim-settings-change/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-pim-settings-change/</guid><description>Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.</description><content:encoded><![CDATA[<p>Privileged Identity Management (PIM) is a critical component of Azure Active Directory, enabling organizations to manage, control, and monitor access to important resources. Attackers often target PIM configurations to escalate privileges, establish persistence, or move laterally within a compromised environment. This activity focuses on detecting changes to PIM role settings, which could indicate malicious activity aimed at weakening security controls. Defenders must monitor these changes to prevent unauthorized access and maintain the integrity of their Azure environment. This includes understanding who is making these changes, the scope of the modifications, and whether the changes align with established security policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> The attacker gains initial access to an account with sufficient privileges to view PIM settings.</li>
<li><strong>Discovery:</strong> The attacker enumerates existing PIM role settings within the Azure Active Directory environment.</li>
<li><strong>Modification:</strong> The attacker modifies existing PIM role settings, such as extending the maximum activation time or removing approval requirements, using the Azure portal, PowerShell, or the Azure CLI.</li>
<li><strong>Privilege Escalation:</strong> By modifying PIM settings, the attacker escalates their privileges, granting themselves elevated access to sensitive resources or administrative functions.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new or modifying existing role assignments to maintain access even if their initial account is compromised.</li>
<li><strong>Lateral Movement:</strong> With escalated privileges, the attacker moves laterally to access other resources or accounts within the Azure environment.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker leverages their escalated privileges to exfiltrate sensitive data, disrupt services, or cause other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of PIM settings can have severe consequences, including unauthorized access to sensitive data, disruption of critical services, and privilege escalation leading to complete compromise of the Azure environment. A single compromised PIM setting can affect multiple users and resources, amplifying the impact of the attack. Early detection of PIM setting modifications can prevent attackers from gaining a foothold and causing significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect changes to PIM settings based on the <code>properties.message</code> field within Azure audit logs.</li>
<li>Regularly review Azure audit logs for events related to PIM configuration changes, paying close attention to the user accounts making the changes and the scope of the modifications.</li>
<li>Implement multi-factor authentication (MFA) for all accounts with privileges to manage PIM settings.</li>
<li>Enforce the principle of least privilege by granting users only the minimum permissions required to perform their job functions.</li>
<li>Establish a baseline of normal PIM settings and alert on any deviations from this baseline.</li>
<li>Investigate any alerts triggered by the Sigma rule by correlating them with other security events and user activity.</li>
<li>Implement automated responses to detected PIM setting modifications, such as disabling the affected user account or reverting the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>pim</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Detection of Azure Service Principal Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</guid><description>Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.</description><content:encoded><![CDATA[<p>The creation of service principals in Azure can be a legitimate administrative task, but it can also be an indicator of malicious activity. Attackers may create service principals to establish persistence, move laterally within the Azure environment, or gain unauthorized access to resources. This activity is particularly concerning when performed by unfamiliar users or from unusual locations. Monitoring for unexpected service principal creation is crucial for detecting potential security breaches in Azure environments. This alert focuses on detecting the &ldquo;Add service principal&rdquo; message within Azure Activity Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI with the compromised credentials.</li>
<li>The attacker executes commands to create a new service principal using tools like Azure CLI or PowerShell.</li>
<li>Azure Activity Logs record the &ldquo;Add service principal&rdquo; event.</li>
<li>The attacker assigns roles and permissions to the newly created service principal, granting it access to specific resources.</li>
<li>The attacker leverages the service principal for lateral movement, accessing resources or services within the Azure environment.</li>
<li>The service principal is used for persistence, allowing the attacker to maintain access even if the initial access method is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation and misuse of a service principal can lead to unauthorized access to sensitive data, resources, and services within the Azure environment. The impact can range from data breaches and service disruption to complete control over the Azure subscription, potentially affecting hundreds or thousands of resources and users. The attacker can leverage the compromised service principal to perform actions with the permissions assigned to it, leading to significant damage and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Created&rdquo; to your SIEM and tune for your environment to detect suspicious service principal creations.</li>
<li>Investigate any alerts generated by the &ldquo;Azure Service Principal Created&rdquo; rule (logsource: azure) by verifying the user identity, user agent, and hostname associated with the event.</li>
<li>Review and audit existing service principals and their assigned permissions to identify any anomalies or overly permissive configurations.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise and unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>service principal</category><category>persistence</category><category>lateral movement</category></item><item><title>AWS Identity Center Identity Provider Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-idp-change/</guid><description>An adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.</description><content:encoded><![CDATA[<p>AWS Identity Center (formerly AWS SSO) enables centralized management of access to AWS accounts and applications. Attackers can manipulate the configured identity provider to gain unauthorized access. The modification of the configured Identity Provider (IdP) within AWS Identity Center can lead to a full compromise of the AWS environment. By associating a malicious directory or disabling/disassociating legitimate directories, attackers can potentially establish persistent access, escalate privileges, and impersonate legitimate users. This can be achieved by utilizing compromised AWS credentials or exploiting vulnerabilities in the AWS environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via compromised AWS credentials or by exploiting an AWS vulnerability.</li>
<li>The attacker enumerates the current AWS Identity Center configuration to identify the currently associated directory.</li>
<li>The attacker disassociates the existing, legitimate directory using <code>DisassociateDirectory</code>.</li>
<li>The attacker associates a malicious directory they control using <code>AssociateDirectory</code>. This malicious directory is configured to impersonate legitimate users.</li>
<li>Alternatively, the attacker disables external IdP configuration for the directory using <code>DisableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker enables external IdP configuration for the directory, pointing to an attacker-controlled IdP, using <code>EnableExternalIdPConfigurationForDirectory</code>.</li>
<li>The attacker uses the malicious or attacker-controlled IdP to authenticate as legitimate users, gaining access to AWS resources.</li>
<li>The attacker performs malicious actions within the AWS environment, such as data exfiltration or resource destruction.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the AWS Identity Center identity provider can lead to complete compromise of an AWS environment. Attackers can gain persistent access, escalate privileges, and impersonate legitimate users. This can result in data breaches, service disruption, financial loss, and reputational damage. The impact can extend to all AWS accounts and applications managed by the compromised Identity Center instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized changes to the AWS Identity Center identity provider.</li>
<li>Investigate any detected events related to <code>AssociateDirectory</code>, <code>DisableExternalIdPConfigurationForDirectory</code>, <code>DisassociateDirectory</code>, or <code>EnableExternalIdPConfigurationForDirectory</code> in AWS CloudTrail logs.</li>
<li>Implement multi-factor authentication (MFA) for all AWS accounts and users to reduce the risk of credential compromise.</li>
<li>Review and restrict IAM permissions to minimize the blast radius of compromised credentials.</li>
<li>Monitor AWS CloudTrail logs for unusual activity patterns that might indicate malicious directory association attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>identity</category><category>persistence</category><category>credential-access</category><category>defense-evasion</category></item><item><title>AWS IAM User or Access Key Creation via S3 Browser</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-s3browser-iam/</guid><description>The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.</description><content:encoded><![CDATA[<p>The S3 Browser utility, a Windows-based client for managing Amazon S3 storage and other cloud services, can be abused by threat actors to create new IAM users or access keys within compromised AWS environments. This activity, if unauthorized, can lead to privilege escalation, persistence, or even initial access, depending on the context of the compromise. The use of S3 Browser is identifiable via the userAgent string in AWS CloudTrail logs. While legitimate use of S3 Browser for administrative tasks exists, its unexpected appearance in user activity, particularly in sensitive accounts, should be investigated. This activity is particularly concerning because it can allow attackers to establish a foothold in the cloud environment and move laterally.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised credentials or an exploited vulnerability.</li>
<li>The attacker installs and configures S3 Browser on a compromised host or uses an existing installation.</li>
<li>The attacker authenticates S3 Browser to the AWS environment using existing compromised credentials or an assumed role.</li>
<li>The attacker uses S3 Browser to execute the <code>CreateUser</code> API call within AWS IAM.</li>
<li>The attacker configures the new IAM user with elevated privileges, potentially granting administrator access.</li>
<li>Alternatively, the attacker uses S3 Browser to execute the <code>CreateAccessKey</code> API call for an existing IAM user.</li>
<li>The attacker uses the newly created access key to perform actions within the AWS environment.</li>
<li>The attacker leverages the new user or access key for persistence, lateral movement, and data exfiltration within the AWS environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and IAM creation can lead to complete compromise of the AWS environment. An attacker with escalated privileges can access sensitive data, modify configurations, disrupt services, and deploy malicious infrastructure. Depending on the permissions granted to the created user or access key, the attacker could potentially pivot to other AWS accounts or services, leading to widespread damage. This can result in significant financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS IAM S3Browser User or AccessKey Creation&rdquo; to your SIEM and tune for your environment to detect anomalous IAM activity originating from S3 Browser.</li>
<li>Investigate any instances of <code>CreateUser</code> or <code>CreateAccessKey</code> events in AWS CloudTrail logs where the <code>userAgent</code> contains &ldquo;S3 Browser&rdquo;.</li>
<li>Implement multi-factor authentication (MFA) for all IAM users to mitigate the risk of credential compromise.</li>
<li>Review and enforce the principle of least privilege for all IAM users and roles to limit the impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>iam</category><category>privilege-escalation</category><category>persistence</category></item><item><title>Azure Application URI Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</link><pubDate>Wed, 03 Jan 2024 14:21:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-azure-app-uri-modification/</guid><description>Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers may modify application URIs within Azure Active Directory to redirect users or applications to malicious resources, obtain unauthorized access, or establish persistence. The modification of an application&rsquo;s URI can be a subtle but effective technique for gaining a foothold in an environment. By manipulating the URI settings, attackers can redirect traffic to attacker-controlled servers, intercept credentials, or perform other malicious actions. This activity is often difficult to detect because it can blend in with legitimate administrative tasks. Investigation is merited if URIs for domain names no longer exist, are not using HTTPS, have wildcards at the end of the domain, are not unique to that app, or point to domains that the organization does not control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure account with sufficient privileges to modify application registrations.</li>
<li>The attacker navigates to the Azure Active Directory portal.</li>
<li>The attacker locates a target application registration.</li>
<li>The attacker modifies the application&rsquo;s URI settings, such as the reply URLs or identifier URIs.</li>
<li>The attacker configures the URI to point to a malicious server or a phishing page.</li>
<li>Users or applications are redirected to the malicious URI when attempting to authenticate or access the application.</li>
<li>The attacker intercepts credentials or performs other malicious actions.</li>
<li>The attacker establishes persistence by maintaining control over the application&rsquo;s URI settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to credential theft, data breaches, or unauthorized access to sensitive resources. By compromising application URIs, attackers can redirect users to phishing pages, intercept credentials, or gain a foothold in the environment for further exploitation. This activity can be difficult to detect and can have a significant impact on the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Application URI Configuration Changes</code> to your SIEM to detect suspicious modifications to application URIs in Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Application URI Configuration Changes</code> to determine if the URI modification is legitimate or malicious.</li>
<li>Monitor Azure Audit Logs for any changes to application URI settings (as indicated by <code>properties.message: Update Application Sucess- Property Name AppAddress</code>) and validate the legitimacy of the changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>azure</category><category>application</category><category>uri</category><category>modification</category><category>persistence</category><category>credential-access</category><category>privilege-escalation</category></item><item><title>Windows User Account Creation via Net.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</guid><description>This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.</description><content:encoded><![CDATA[<p>Attackers may create new accounts (both local and domain) to maintain access to victim systems. This rule identifies the usage of <code>net.exe</code> to create new accounts on Windows systems. The detection logic focuses on process execution events where <code>net.exe</code> or <code>net1.exe</code> are executed with arguments indicative of user creation, specifically the &lsquo;user&rsquo; argument in conjunction with either the &lsquo;/ad&rsquo; or &lsquo;/add&rsquo; flags. While account creation is a common administrative task, suspicious executions, especially those initiated by unusual parent processes or accounts, warrant further investigation. This rule is designed for data generated by Elastic Defend but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, enhancing its applicability across various security environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker opens a command prompt or PowerShell session.</li>
<li>The attacker uses <code>net.exe</code> or <code>net1.exe</code> to create a new user account. The command includes the <code>user</code> argument along with <code>/add</code> or <code>/ad</code> flags. For example: <code>net user &lt;username&gt; &lt;password&gt; /add</code>.</li>
<li>The attacker may add the newly created user to privileged groups, such as <code>Administrators</code> or <code>Domain Admins</code>, to elevate privileges.</li>
<li>The attacker uses the new account to move laterally within the network, accessing sensitive data or systems.</li>
<li>The attacker establishes persistence by configuring the new account to be a service account or adding it to local administrator groups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and long-term persistence on compromised systems. The impact is often determined by the privileges assigned to the newly created account. If the attacker adds the account to the <code>Administrators</code> group, they can effectively take full control of the affected system. In a domain environment, creating a domain account can lead to wider compromise across the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to capture the necessary events for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>net.exe</code> or <code>net1.exe</code> creating user accounts, especially when initiated by unusual parent processes.</li>
<li>Monitor for newly created accounts being added to privileged groups.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s original documentation for guidance on investigating and responding to potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>user-account-creation</category><category>windows</category></item><item><title>Suspicious Process Writing to Startup Folder for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</guid><description>Adversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.</description><content:encoded><![CDATA[<p>Attackers often leverage the Windows Startup folder to maintain persistence, as any executable placed in this folder will automatically run when a user logs into the system. This technique is particularly effective because it requires no user interaction and can easily be automated. This rule detects when processes commonly abused by attackers, such as cmd.exe, powershell.exe, or mshta.exe, write or modify files within the Startup folders. The rule focuses on identifying unauthorized persistence mechanisms and helps defenders uncover potentially compromised systems. By monitoring file creation events in the Startup folders by suspicious processes, this detection aims to catch malicious activity early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a command shell (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) on the compromised system.</li>
<li>The attacker uses the command shell to write a malicious executable or script file to one of the Windows Startup folders (<code>C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\*</code> or <code>C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\*</code>).</li>
<li>The attacker modifies the file attributes (e.g., using <code>attrib.exe</code>) to hide the file or make it more difficult to detect.</li>
<li>The attacker schedules a reboot or waits for the user to log off and back on.</li>
<li>Upon user logon, the malicious executable or script in the Startup folder is automatically executed.</li>
<li>The malicious code establishes persistence, potentially downloading additional payloads or establishing a command and control (C2) channel.</li>
<li>The attacker maintains persistent access to the compromised system, enabling further malicious activities such as data theft or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistent access on the compromised system, allowing attackers to maintain their foothold even after system reboots. This can lead to data exfiltration, installation of ransomware, or further propagation within the network. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally. Sectors commonly targeted by persistence techniques include finance, healthcare, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events, as referenced in the <a href="#setup">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>Suspicious Process Writing to Startup Folder</code> to your SIEM to detect suspicious processes creating files in the startup folder, and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious, referencing the <a href="#note">investigation guide</a>.</li>
<li>Block the processes listed in the rule (<code>cmd.exe</code>, <code>powershell.exe</code>, etc.) from writing to the startup folders if legitimate use is not required.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>startup</category><category>windows</category></item><item><title>Potential RemoteMonologue Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</guid><description>This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.</description><content:encoded><![CDATA[<p>The RemoteMonologue attack technique abuses Component Object Model (COM) objects to coerce authentication from a remote system. This is achieved by modifying the <code>RunAs</code> registry value associated with a COM object. Setting this value to &ldquo;Interactive User&rdquo; forces the COM object to run under the context of the interactive user, enabling attackers to hijack sessions and potentially escalate privileges. This technique is often used as a defense evasion or persistence mechanism by adversaries after gaining initial access to a system. The attack involves modifying registry keys associated with COM objects to trigger NTLM authentication coercion. This can be used for lateral movement and gaining access to sensitive resources. This rule is designed to detect registry modifications indicative of the RemoteMonologue attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through unspecified means.</li>
<li>Identify COM Objects: The attacker identifies suitable COM objects for abuse.</li>
<li>Modify Registry: The attacker modifies the registry to set the <code>RunAs</code> value for the selected COM object to <code>Interactive User</code>. This involves modifying the registry path <code>HKCR\AppID\{Clsid}\RunAs</code>.</li>
<li>Trigger COM Object Execution: The attacker triggers the execution of the modified COM object, potentially through a remote procedure call or other inter-process communication mechanisms.</li>
<li>Authentication Coercion: The execution of the COM object triggers NTLM authentication to a system controlled by the attacker.</li>
<li>Relay Attack: The attacker relays the coerced NTLM authentication to gain access to other resources on the network.</li>
<li>Session Hijacking: Successful relay leads to session hijacking, allowing the attacker to impersonate the user.</li>
<li>Lateral Movement/Privilege Escalation: The attacker uses the hijacked session for lateral movement or privilege escalation within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful RemoteMonologue attack can lead to unauthorized access to sensitive systems and data. By coercing authentication and hijacking sessions, attackers can bypass security controls and escalate their privileges within the network. The scope of the impact depends on the privileges of the hijacked user account and the resources accessible to that account. This attack can enable lateral movement, data exfiltration, and other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect RemoteMonologue Registry Modification</code> to your SIEM to identify suspicious registry modifications related to COM object hijacking.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the registry event logs and identifying the user account and process responsible for the registry modification.</li>
<li>Implement enhanced monitoring on critical systems to detect any attempts to modify COM object registry settings.</li>
<li>Block the attack by ensuring &ldquo;RunAs&rdquo; value is not set to &ldquo;Interactive User&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remotemonologue</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Detecting Remote Windows Service Installation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</guid><description>This rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.</description><content:encoded><![CDATA[<p>This detection rule identifies a potential lateral movement technique where an attacker establishes a network logon to a Windows system and subsequently installs a service using the same LogonId. This behavior is flagged as suspicious because it deviates from typical administrative practices and can indicate unauthorized access and persistence within the network. The rule is designed to filter out common legitimate services and administrative activities, focusing on anomalies that could signify malicious intent. This detection is crucial for defenders as it can uncover attackers attempting to move laterally and establish persistent access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker performs network reconnaissance to identify target systems for lateral movement.</li>
<li>Using valid credentials or pass-the-hash techniques, the attacker authenticates to a remote Windows host over the network (e.g., SMB).</li>
<li>The attacker attempts to install a new service on the remote host, potentially using tools like <code>sc.exe</code> or PowerShell.</li>
<li>The service installation event is logged with a specific LogonId that matches the earlier network logon event, indicating a relationship between the two activities.</li>
<li>The newly installed service is configured to execute a malicious payload or establish a reverse shell.</li>
<li>The attacker uses the service to execute commands or deploy further malicious tools on the compromised host.</li>
<li>The attacker achieves persistence and lateral movement within the network, enabling further compromise and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using this technique can lead to widespread compromise of systems within a network. Attackers can use the newly installed service to execute arbitrary code, install malware, or move laterally to other systems. This can result in data theft, system disruption, or ransomware deployment. The impact can be significant, potentially affecting numerous systems and causing substantial financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logs with necessary auditing policies, specifically Audit Logon and Audit Security System Extension, to capture relevant logon and service installation events.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious remote service installations based on matching LogonIds from network logons.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual service file paths and user accounts.</li>
<li>Review the list of excluded service file paths in the Sigma rules and customize them based on your environment&rsquo;s known legitimate services.</li>
<li>Monitor network connections for suspicious SMB activity, particularly connections originating from unusual or untrusted sources.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of credential theft and unauthorized network access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>persistence</category><category>windows</category></item><item><title>Windows System Restore Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</guid><description>Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.</description><content:encoded><![CDATA[<p>Attackers may disable the Windows System Restore feature to prevent victims from easily reverting their systems to a clean state after an infection or other malicious activity. This action complicates incident response and remediation efforts, forcing more complex and time-consuming recovery procedures. Disabling system restore is often performed post-compromise to ensure persistence and hinder forensic analysis. This technique can be implemented manually through the registry editor or via automated scripts, making it accessible to a wide range of threat actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through various methods (e.g., phishing, exploitation).</li>
<li>The attacker escalates privileges to Administrator or SYSTEM.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify registry keys.</li>
<li>The attacker targets the <code>HKLM\Software\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig</code> registry key.</li>
<li>Alternatively, the attacker targets the <code>HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore\DisableSR</code> registry key.</li>
<li>The attacker sets the value of the targeted registry key to <code>DWORD:00000001</code>.</li>
<li>The attacker confirms the System Restore feature is disabled.</li>
<li>The attacker proceeds with further malicious activities, knowing that recovery is hindered.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling System Restore can significantly impede recovery efforts following a cyber incident. Organizations may face longer downtimes and increased costs associated with manual system reimaging or advanced forensic analysis. The absence of readily available restore points can also lead to data loss if systems are severely damaged or encrypted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Disable System Restore</code> to your SIEM to detect malicious attempts to disable System Restore via registry modification.</li>
<li>Monitor registry modifications related to System Restore configurations, focusing on the keys <code>\Policies\Microsoft\Windows NT\SystemRestore</code> and <code>\Microsoft\Windows NT\CurrentVersion\SystemRestore</code>, and values set to <code>DWORD (0x00000001)</code>.</li>
<li>Implement strict access controls to prevent unauthorized modification of registry settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>t1490</category><category>persistence</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Windows Root Certificate Modification Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-root-cert-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-root-cert-modification/</guid><description>The modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.</description><content:encoded><![CDATA[<p>Attackers can install malicious root certificates to subvert trust controls and bypass security measures. Once a malicious root certificate is installed, attackers can sign malicious files, making them appear as legitimate software from trusted vendors like Microsoft. This allows the attacker to execute code undetected and maintain persistence on the system. Furthermore, a rogue root certificate can be used in adversary-in-the-middle attacks to decrypt SSL traffic, enabling the collection of sensitive data. This activity is typically achieved through registry modifications. Monitoring for these modifications can help security teams identify potential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to administrator or SYSTEM level, required to modify the trusted root certificate store.</li>
<li>The attacker uses tools like certutil.exe or PowerShell to import a malicious root certificate into the Windows registry.</li>
<li>The registry keys <code>HKLM\Software\Microsoft\SystemCertificates\Root\Certificates</code> or <code>HKLM\Software\Policies\Microsoft\SystemCertificates\Root\Certificates</code> are modified to add the new certificate.</li>
<li>The attacker uses the newly installed root certificate to sign malicious executables or scripts.</li>
<li>The signed malicious files are executed, bypassing signature-based detection mechanisms.</li>
<li>The attacker intercepts and decrypts SSL traffic, collecting sensitive data like credentials or financial information.</li>
<li>The attacker maintains persistence by using the trusted certificate to repeatedly sign and execute malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful installation of a malicious root certificate allows attackers to bypass security controls, leading to the execution of arbitrary code and potential data theft. This can result in significant data breaches, financial losses, and reputational damage. Attackers can use this technique to maintain a long-term presence on compromised systems, making detection and remediation more challenging. While no specific victim counts are available, the technique is broadly applicable across many sectors and can affect any organization running Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Root Certificate Modification&rdquo; to your SIEM to detect registry modifications related to root certificate installation.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on processes modifying the registry keys related to root certificates.</li>
<li>Review the &ldquo;False Positives&rdquo; section in the rule documentation to tune the Sigma rule for your environment.</li>
<li>Monitor network traffic for suspicious SSL decryption activity following the detection of a root certificate modification.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>root certificate</category><category>mitm</category></item><item><title>Windows Files and Dirs Access Rights Modification via Icacls</title><link>https://feed.craftedsignal.io/briefs/2024-01-icacls-access-rights-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-icacls-access-rights-modification/</guid><description>Detection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.</description><content:encoded><![CDATA[<p>This analytic detects the modification of file and directory security permissions through command-line tools like icacls.exe, cacls.exe, and xcacls.exe. These tools are legitimate Windows utilities but are often abused by threat actors, including APT groups and coinminer scripts, to evade detection, maintain persistence, and hinder incident response. The detection focuses on command-line arguments indicating modifications to access rights (e.g., granting full control or modifying permissions). Detecting this activity is crucial as it can lead to unauthorized access, data exfiltration, and system compromise, ultimately impeding remediation efforts and prolonging the attacker&rsquo;s presence on the compromised system. The detection leverages endpoint detection and response (EDR) data focusing on process execution and command-line analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to obtain necessary permissions for modifying file and directory access rights. This can be achieved through exploiting system vulnerabilities or using stolen credentials with elevated privileges.</li>
<li>Tool Deployment: The attacker deploys or utilizes existing system tools like <code>icacls.exe</code>, <code>cacls.exe</code>, or <code>xcacls.exe</code> to modify access control lists (ACLs) on files and directories.</li>
<li>Access Rights Modification: The attacker uses the deployed tools to modify the ACLs of critical system files or directories, potentially granting themselves full control or restricting access for legitimate users and security software. Specific command-line arguments like <code>*:R*</code>, <code>*:W*</code>, <code>*:F*</code>, <code>*:C*</code>, <code>*:N*</code>, <code>*/P*</code>, and <code>*/E*</code> are used to manipulate access rights.</li>
<li>Defense Evasion: By modifying access rights, the attacker attempts to evade detection by security software and hinders incident response efforts by restricting access to forensic data or security tools.</li>
<li>Persistence: The attacker establishes persistence by modifying the access rights of startup scripts or registry keys, ensuring that their malicious code executes even after system reboots.</li>
<li>Lateral Movement: The attacker uses the modified access rights to access files and directories on other systems within the network, facilitating lateral movement and further compromise.</li>
<li>Impact: The attacker achieves their final objective, such as data exfiltration, system disruption, or deploying ransomware, by leveraging the modified access rights to access and manipulate sensitive data or critical system resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to persist on the system, evade detection, and potentially move laterally within the network. Modification of file and directory permissions can hinder investigation, impede remediation efforts, and maintain persistent access to the compromised environment. The impact ranges from data theft to complete system compromise and denial of service. This activity is often associated with APT groups and coinminer operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of <code>icacls.exe</code>, <code>cacls.exe</code>, and <code>xcacls.exe</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Icacls Usage&rdquo; to your SIEM to identify instances of access right modifications via icacls.exe, cacls.exe, and xcacls.exe.</li>
<li>Investigate any instances where these tools are used to modify access rights, especially when command-line arguments include <code>*:R*</code>, <code>*:W*</code>, <code>*:F*</code>, <code>*:C*</code>, <code>*:N*</code>, <code>*/P*</code>, and <code>*/E*</code>.</li>
<li>Monitor Windows Event Log Security (4688) for process creation events to correlate with Sysmon data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>access-control</category></item><item><title>Werfault ReflectDebugger Persistence via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</guid><description>Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Error Reporting (Werfault) service to establish persistence on a compromised system. This is achieved by modifying the ReflectDebugger registry key. When Werfault is executed with the <code>-pr</code> parameter, it will execute the debugger specified in the ReflectDebugger registry key. This allows attackers to execute arbitrary code every time the Windows Error Reporting utility is triggered. The technique involves modifying specific registry paths associated with the ReflectDebugger. This behavior has been documented as a persistence mechanism in malware analysis reports.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means.</li>
<li>The attacker attempts to modify the Windows Error Reporting ReflectDebugger registry key.</li>
<li>The attacker modifies the ReflectDebugger value within one of the following registry paths: <code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, <code>\REGISTRY\MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, or <code>MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>.</li>
<li>The attacker sets the ReflectDebugger value to a malicious executable or script.</li>
<li>The attacker triggers Werfault.exe with the <code>-pr</code> parameter, either manually or through a system event.</li>
<li>Werfault.exe executes the attacker-controlled code specified in the ReflectDebugger registry value.</li>
<li>The attacker achieves persistence, as the malicious code is executed each time Werfault is triggered with the <code>-pr</code> parameter.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the targeted system. This can lead to the execution of arbitrary code, potentially resulting in data theft, further malware installation, or complete system compromise. The impact is limited by the permissions of the Werfault process. While no specific victim counts are available, this technique can affect any Windows system where the attacker can modify the registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Werfault ReflectDebugger Registry Modification</code> to detect unauthorized modifications to the ReflectDebugger registry key (logsource: <code>registry_set</code>, rule title).</li>
<li>Enable Sysmon process creation logging to detect the execution of Werfault with the <code>-pr</code> parameter.</li>
<li>Monitor registry events for changes to the specific ReflectDebugger paths mentioned in the overview section (<code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry_modification</category><category>werfault</category></item><item><title>User Added to Privileged Group in Active Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ad-privileged-group-addition/</guid><description>Adversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.</description><content:encoded><![CDATA[<p>Attackers often target Active Directory (AD) to gain control over a network. Adding a user account to a highly privileged group, such as Domain Admins or Enterprise Admins, is a common tactic for establishing persistence and escalating privileges. By compromising an account with the ability to manage group memberships or exploiting vulnerabilities, an attacker can add their own rogue account to a privileged group, granting them extensive control over the AD domain. This activity might go unnoticed amidst legitimate administrative actions, making it a stealthy method of maintaining unauthorized access. This is a common technique employed after initial compromise to ensure long-term access to critical systems and data. Detecting such additions requires careful monitoring of AD security logs for specific events related to group membership changes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a low-privileged user account through phishing or credential theft.</li>
<li>Lateral movement to a system with access to Active Directory management tools.</li>
<li>Privilege escalation to an account with permissions to modify group memberships (e.g., leveraging exploits or credential dumping).</li>
<li>Use of AD management tools (e.g., Active Directory Users and Computers, PowerShell with AD module) to add the attacker-controlled user account to a privileged group, such as Domain Admins (RID 512).</li>
<li>The attacker logs in with the newly privileged account.</li>
<li>The attacker uses their elevated privileges to access sensitive data, install backdoors, or perform other malicious activities.</li>
<li>The attacker may attempt to remove the initially compromised account to remove traces of their activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful addition of an attacker-controlled user to a privileged AD group grants them near-total control over the domain. This can lead to widespread data breaches, ransomware deployment across the entire network, compromise of sensitive systems, and long-term disruption of business operations. The impact can extend to all domain-joined systems and resources, potentially affecting thousands of users and devices. Remediation often requires a complete rebuild of the Active Directory environment, resulting in significant downtime and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; in Active Directory to generate the necessary security events for detecting group membership changes.</li>
<li>Deploy the Sigma rule &ldquo;User Added to Privileged Group in Active Directory&rdquo; to your SIEM to detect suspicious additions to privileged groups, tuning the rule for known administrative accounts.</li>
<li>Monitor for unexpected use of AD management tools, such as <code>Active Directory Users and Computers</code> or <code>PowerShell</code> with the <code>AD</code> module, especially from unusual source hosts.</li>
<li>Investigate any alerts generated by the Sigma rule by verifying the legitimacy of the user adding members to the group and validating the need for the new member to have those privileges.</li>
<li>Regularly review the membership of privileged groups and remove any unauthorized or unnecessary accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege_escalation</category><category>active_directory</category></item><item><title>Unusual Scheduled Task Update</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</guid><description>This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.</description><content:encoded><![CDATA[<p>This detection identifies first-time modifications to scheduled tasks by non-system users on Windows systems. Adversaries frequently abuse scheduled tasks to achieve persistence by modifying existing tasks or creating new ones that execute malicious code at recurring intervals. This rule focuses on detecting unauthorized changes to existing tasks by filtering out known system accounts (SYSTEM, Local Service, Network Service) and machine accounts, thereby highlighting potentially suspicious user activity. The rule leverages Windows Security Event Logs (event code 4702) to monitor task modifications. The goal is to aid in the early detection of threats where attackers are attempting to establish persistence on a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker enumerates existing scheduled tasks on the system using tools like <code>schtasks.exe</code> or PowerShell cmdlets.</li>
<li>The attacker identifies a suitable scheduled task to modify for persistence.</li>
<li>The attacker modifies the task&rsquo;s settings, such as the trigger time, the executable to run, or the arguments passed to the executable. This modification is logged as event ID 4702.</li>
<li>The scheduled task is updated using <code>schtasks.exe /change</code> or PowerShell&rsquo;s <code>Set-ScheduledTask</code> cmdlet.</li>
<li>The modified scheduled task executes at the specified time, launching the attacker&rsquo;s malicious payload.</li>
<li>The malicious payload establishes a reverse shell to the attacker&rsquo;s command and control (C2) server.</li>
<li>The attacker uses the reverse shell to perform further actions on the compromised system, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the modification of scheduled tasks can lead to persistent access to a compromised system. The attacker can use this access to steal sensitive data, install malware, or perform other malicious activities. While this rule is low severity, it can uncover attackers attempting to persist in a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the required Windows Security Event Logs (event ID 4702) as described in the setup instructions.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect unusual scheduled task updates.</li>
<li>Investigate any alerts generated by this rule to determine if the scheduled task modification is legitimate or malicious.</li>
<li>Review the references provided to understand the underlying event IDs and attacker techniques related to scheduled tasks.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Unusual Persistence via Services Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</guid><description>Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.</description><content:encoded><![CDATA[<p>This detection identifies processes that modify the Windows services registry key directly, bypassing the standard Windows APIs. This behavior can signify an adversary&rsquo;s attempt to establish persistence stealthily by creating new services or altering existing ones in an unexpected manner. The detection logic focuses on changes to the <code>ServiceDLL</code> and <code>ImagePath</code> values within specific registry paths associated with service configurations. This rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon Registry Events. The rule helps security analysts identify potentially malicious activity related to service manipulation, which can lead to persistent access and control over compromised systems. The rule excludes known legitimate processes and paths to minimize false positives, focusing on anomalous registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative access, allowing them to modify the registry.</li>
<li>The attacker directly modifies the <code>HKLM\SYSTEM\ControlSet*\Services\*\ServiceDLL</code> or <code>HKLM\SYSTEM\ControlSet*\Services\*\ImagePath</code> registry keys to point to a malicious DLL or executable.</li>
<li>The attacker&rsquo;s malicious DLL or executable is configured to run as a service, ensuring persistence across system reboots.</li>
<li>The compromised service starts automatically during system startup or manually when triggered by the attacker.</li>
<li>The malicious service executes arbitrary code, providing the attacker with persistent control over the system.</li>
<li>The attacker may use the compromised service to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the compromised system, maintaining access even after reboots or user logoffs. This can lead to long-term control over the system, enabling attackers to perform various malicious activities, including data theft, deployment of ransomware, or use of the system as a foothold for further attacks within the network. The severity is further amplified if critical services are targeted, potentially leading to system instability or denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture the necessary data for this detection (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect unusual service registry modifications (Sigma rules).</li>
<li>Tune the Sigma rules by adding exceptions for legitimate software installations or updates that modify service registry keys directly (Sigma rules).</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on processes modifying the <code>ServiceDLL</code> or <code>ImagePath</code> registry values (Sigma rules).</li>
<li>Review endpoint protection policies to ensure that similar unauthorized registry modifications are detected and blocked in the future (Response and remediation).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>registry modification</category></item><item><title>Uncommon Registry Persistence Change Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</guid><description>This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.</description><content:encoded><![CDATA[<p>This detection identifies unusual modifications to less commonly altered registry keys, which may indicate stealthy persistence attempts on Windows systems. Adversaries exploit registry keys for persistence, ensuring malicious code executes on startup or during specific events. The rule filters out benign changes by excluding known legitimate processes and paths, focusing on suspicious alterations. The rule focuses on changes to registry keys such as <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell</code> and <code>HKEY_USERS\\*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Run</code>. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as Sysmon. The rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes code on the system, potentially using a dropper or exploit.</li>
<li>The attacker identifies uncommon registry keys suitable for persistence.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This may involve adding a new entry or modifying an existing one.</li>
<li>The system restarts, or the user logs in, triggering the execution of the malicious code through the modified registry key.</li>
<li>The malicious code executes with the privileges of the user or system, depending on the registry key modified.</li>
<li>The attacker achieves persistence, allowing them to maintain access to the system even after restarts.</li>
<li>The attacker performs malicious activities such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistent access to the compromised system, allowing the attacker to maintain control and execute malicious activities. This can lead to data theft, system disruption, or further compromise of the network. The impact can range from a single workstation being compromised to a widespread enterprise-level breach, depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Uncommon Registry Persistence Change&rdquo; Sigma rule to your SIEM to detect modifications to uncommon registry persistence keys and tune for your environment.</li>
<li>Enable Sysmon registry event logging to ensure the visibility required for the Sigma rule to function effectively (see references).</li>
<li>Review and tune the filter conditions in the Sigma rule to reduce false positives, specifically excluding legitimate software installations, system maintenance processes, and administrative scripts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process responsible for the registry modification and correlating it with other suspicious activities.</li>
<li>Block execution of known malicious executables and scripts identified during the investigation to prevent further compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Unauthorized Guest User Invitation Attempt in Azure</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-guest-invite-failure/</guid><description>Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.</description><content:encoded><![CDATA[<p>This alert detects instances where a user attempts to invite an external guest user to an Azure environment but fails due to insufficient permissions. This activity can signify several potential security risks, including unauthorized privilege escalation attempts by internal users or malicious insiders attempting to expand access without proper authorization. While legitimate failed attempts may occur, repeated or targeted failures should be investigated. The activity is logged within the Azure Audit Logs. Detecting this activity is crucial for maintaining control over user access and preventing potential data breaches. The relevant log data resides within Azure&rsquo;s audit logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal user (either compromised or malicious) attempts to invite an external guest user via the Azure portal or API.</li>
<li>The Azure Active Directory service checks the inviter&rsquo;s permissions against the organization&rsquo;s guest invitation policies.</li>
<li>The system determines the user lacks the necessary permissions to invite guest users.</li>
<li>Azure Audit Logs record the &ldquo;Invite external user&rdquo; event with a &ldquo;failure&rdquo; status.</li>
<li>The failed invitation attempt is blocked, preventing the external user from gaining access.</li>
<li>The attacker may retry the invitation with different accounts or methods, attempting to bypass access controls.</li>
<li>If successful through other means (not detected by this rule), the guest user could be used for lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation could grant unauthorized access to sensitive data and resources within the Azure environment. While this specific detection focuses on failed attempts, repeated failures may indicate a concerted effort to bypass security controls. If successful, unauthorized guest users could be used for lateral movement, data exfiltration, or other malicious activities. The number of affected resources depends on the permissions granted to the guest user if the invitation had been successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Guest User Invited By Non Approved Inviters&rdquo; to your SIEM to detect unauthorized invitation attempts within Azure Audit Logs.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the invitation attempt and the intent of the user.</li>
<li>Review and enforce the principle of least privilege for user roles and permissions within Azure Active Directory.</li>
<li>Monitor for repeated failed invitation attempts from the same user account (correlate with the Azure Audit Logs data).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>initial-access</category><category>persistence</category><category>stealth</category><category>azure</category></item><item><title>Suspicious Process Execution from Unusual File Paths</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-process-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-process-path/</guid><description>Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.</description><content:encoded><![CDATA[<p>This threat brief addresses the tactic of executing processes from suspicious file paths within Windows environments, a common technique used by adversaries to bypass security controls and execute malicious code without requiring elevated privileges. This activity is often observed in post-exploitation scenarios, where attackers have already gained initial access and are attempting to establish persistence or escalate their privileges. Attackers often leverage these unconventional locations to avoid detection by traditional security solutions that rely on whitelisting or reputation-based analysis. The detection focuses on identifying processes running from paths like <code>\Windows\Fonts\</code>, <code>\Users\Public\</code>, <code>\Windows\Debug\</code>, and others, as these are not typically associated with legitimate software execution. This technique has been associated with malware families like AsyncRAT, RedLine Stealer, and LockBit Ransomware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through phishing, exploitation of a vulnerability, or other means.</li>
<li>The attacker uploads or creates a malicious executable or script (e.g., PowerShell script) in a suspicious directory such as <code>C:\Windows\Fonts\</code>.</li>
<li>The attacker uses a dropper or loader to execute the malicious file. This can be achieved through various methods, including command-line execution or scheduled tasks.</li>
<li>The malicious process begins execution from the unusual file path.</li>
<li>The process performs malicious activities, such as downloading additional payloads, establishing command and control (C2) communication, or conducting reconnaissance.</li>
<li>The attacker leverages the compromised process to escalate privileges or move laterally within the network.</li>
<li>Data exfiltration or encryption may occur, depending on the attacker&rsquo;s objectives.</li>
<li>The attacker attempts to maintain persistence by creating scheduled tasks or modifying registry keys to ensure the malicious process restarts upon system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of malicious code from unusual file paths can lead to a variety of negative impacts, including system compromise, data theft, and ransomware infection. Organizations may experience data breaches, financial losses, and reputational damage. The references indicate this technique is associated with various malware families, including information stealers, remote access trojans (RATs), and ransomware, affecting numerous organizations across different sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Event ID 4688 or Sysmon Event ID 1) to capture process execution events, including the process path, command line, and parent process information to enable the rules below.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Executing from Common Non-Executable Paths&rdquo; to your SIEM to detect processes running from unusual file paths. Tune the rule to filter out any legitimate exceptions in your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the process name, command line, and parent process.</li>
<li>Implement application control policies to restrict the execution of unauthorized software in your environment.</li>
<li>Monitor network traffic for suspicious outbound connections originating from processes running from unusual file paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Suspicious Mofcomp Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mofcomp-activity/</guid><description>This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.</description><content:encoded><![CDATA[<p>The rule detects suspicious usage of <code>mofcomp.exe</code>, a command-line tool used to compile Managed Object Format (MOF) files. Attackers can abuse MOF files to manipulate the Windows Management Instrumentation (WMI) repository by building malicious WMI scripts for persistence or execution. This can be achieved by creating their own namespaces and classes within WMI or establishing persistence through WMI Event Subscriptions. The rule identifies unusual mofcomp.exe activity by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes like <code>ScenarioEngine.exe</code> and system accounts (<code>S-1-5-18</code>). This detection is designed to work with data from Elastic Defend, Microsoft Defender XDR, Crowdstrike, and Windows Security Event Logs. The rule aims to detect potential misuse of WMI for malicious purposes, enhancing the visibility of attacker techniques for execution and persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker uploads a malicious MOF file to the compromised system.</li>
<li>The attacker executes <code>mofcomp.exe</code> to compile the malicious MOF file.</li>
<li><code>mofcomp.exe</code> processes the MOF file, creating new namespaces and classes or modifying existing ones in the WMI repository.</li>
<li>If the MOF file creates a WMI Event Subscription, it triggers the execution of a malicious script or binary when a specific event occurs.</li>
<li>The malicious script or binary executes, performing actions such as installing malware, creating backdoors, or exfiltrating data.</li>
<li>The attacker maintains persistence through the WMI Event Subscription, ensuring continued access even after system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via malicious MOF files can lead to persistent access, code execution, and system compromise. Attackers can use this technique to install malware, create backdoors, or steal sensitive data. The rule aims to detect early stages of such attacks, preventing significant damage. By establishing persistence, attackers can maintain long-term control over the compromised system, evading traditional detection methods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious <code>mofcomp.exe</code> activity and tune for your environment.</li>
<li>Enable process creation logging and command-line auditing on Windows systems to capture necessary events for the provided Sigma rules.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual MOF file paths, parent processes, and user accounts.</li>
<li>Review and monitor WMI namespaces and classes for unauthorized modifications or additions following any detected suspicious <code>mofcomp.exe</code> activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>persistence</category><category>windows</category></item><item><title>Suspicious Modifications to Windows Security Support Provider (SSP) Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</guid><description>Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code>. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).</li>
<li>The attacker escalates privileges to gain administrative rights on the system.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> to include a path to a malicious DLL.</li>
<li>Alternatively, the attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> to include a path to a malicious DLL.</li>
<li>The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.</li>
<li>The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.</li>
<li>The attacker maintains persistent access to the system, even after reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious SSP Registry Modification&rdquo; to your SIEM to detect unauthorized modifications to SSP registry keys.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Continuously monitor for unexpected processes writing to the <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> registry keys.</li>
<li>Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.</li>
<li>Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry-modification</category><category>ssp</category></item><item><title>Suspicious Image Load (taskschd.dll) from MS Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</guid><description>Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious image load (<code>taskschd.dll</code>) originating from Microsoft Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE). The behavior suggests potential adversarial activity involving the creation of scheduled tasks through the Windows Component Object Model (COM). Attackers may exploit this technique to establish persistence, circumventing traditional monitoring focused on the <code>schtasks.exe</code> utility. The use of COM for scheduled task management allows for stealthier operation and evasion of standard security controls, making it a valuable persistence mechanism for malicious actors. The rule is designed for data generated by Elastic Defend, Sysmon, and other endpoint detection platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User opens a malicious Microsoft Office document (e.g., Word, Excel).</li>
<li>The document executes embedded macro code or exploits a vulnerability.</li>
<li>The macro or exploit leverages the Component Object Model (COM).</li>
<li>The Office application (e.g., WINWORD.EXE) loads the <code>taskschd.dll</code> library, providing access to the Task Scheduler service.</li>
<li>The COM interface is used to programmatically create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a later time or on a recurring basis.</li>
<li>The malicious payload could be a script, executable, or command-line instruction.</li>
<li>Upon execution, the payload achieves the attacker&rsquo;s objective, such as establishing persistence, downloading additional malware, or compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging this technique can allow adversaries to maintain persistent access to a compromised system. This can lead to long-term data exfiltration, lateral movement within the network, and deployment of ransomware. The low severity score assigned to the original rule may underestimate the potential impact, as persistence is a critical component of many advanced attacks. Affected systems may require extensive remediation to remove all traces of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Office Application Loading Task Scheduler DLL&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging on Windows endpoints to provide visibility into DLL loading events, which is a prerequisite for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific scheduled tasks that are created and the payloads they execute.</li>
<li>Monitor for scheduled task creation events (Event ID 4698) and deletion events (Event ID 4699) in the Windows Event Logs, as referenced in the rule&rsquo;s investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>image_load</category><category>scheduled_task</category></item><item><title>Suspicious AWS EC2 Key Pair Creation from Non-Cloud AS</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-ec2-keypair-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-ec2-keypair-creation/</guid><description>An AWS EC2 CreateKeyPair event triggered by a new principal originating from a network autonomous system (AS) organization not associated with major cloud providers, indicating potential unauthorized access or persistence activity.</description><content:encoded><![CDATA[<p>This alert identifies suspicious activity related to the creation of EC2 key pairs within an AWS environment. Specifically, it focuses on instances where a new IAM principal (user) creates an EC2 key pair from a network source (IP address) whose autonomous system organization is not commonly associated with major cloud providers like Amazon, Google, or Microsoft. Adversaries often create key pairs for persistence or to enable unauthorized access to EC2 instances, potentially leading to data exfiltration or further malicious activities. The rule uses a new terms approach to baseline user activity, reducing noise from repeated actions while still flagging the initial suspicious key pair creation. This activity is flagged as suspicious due to originating from outside trusted ASNs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or a misconfigured IAM role.</li>
<li>The attacker attempts to enumerate existing EC2 instances and associated key pairs.</li>
<li>The attacker uses the <code>CreateKeyPair</code> API call to generate a new SSH key pair within the AWS account. The request originates from a network with an autonomous system organization not attributed to common cloud providers.</li>
<li>The attacker stores the private key material for later use in accessing EC2 instances.</li>
<li>The attacker may then use the new key pair to launch new EC2 instances or import the key to existing instances. This can be done through <code>RunInstances</code> or <code>ImportKeyPair</code> operations.</li>
<li>The attacker uses the new key pair to SSH into the newly created or compromised EC2 instances.</li>
<li>Once inside the instances, the attacker performs malicious activities, such as data exfiltration, lateral movement, or installing malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to EC2 instances, potentially compromising sensitive data and disrupting services. A compromised AWS account can allow the attacker to steal data, establish persistence, and move laterally within the cloud environment. The lack of expected cloud provider ASN for the source IP of the <code>CreateKeyPair</code> event raises the risk profile.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 CreateKeyPair from Non-Cloud AS Organization&rdquo; to your SIEM and tune the <code>source.as.organization.name</code> exclusions based on your environment.</li>
<li>Review AWS CloudTrail logs for any <code>CreateKeyPair</code> events and correlate with other suspicious activity, as mentioned in the investigation steps in this brief.</li>
<li>Implement stricter IAM policies to limit the ability to create key pairs to only authorized users and roles.</li>
<li>Monitor for <code>RunInstances</code> or <code>ImportKeyPair</code> events using the newly created key names as identified from <code>aws.cloudtrail.request_parameters</code> / <code>response_elements</code>.</li>
<li>Enable and review AWS Config rules to detect and remediate misconfigurations related to IAM and EC2 key pair management.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ec2</category><category>keypair</category><category>persistence</category><category>credential_access</category><category>lateral_movement</category></item></channel></rss>