<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ransomware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ransomware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 19:02:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ransomware/feed.xml" rel="self" type="application/rss+xml"/><item><title>Trigona Ransomware Employing Custom Data Exfiltration Tool</title><link>https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</link><pubDate>Thu, 23 Apr 2026 19:02:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</guid><description>Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.</description><content:encoded><![CDATA[<p>Trigona ransomware, initially launched in October 2022, has been observed using a custom command-line tool named &ldquo;uploader_client.exe&rdquo; to exfiltrate data from compromised environments. This shift, observed in March 2026, suggests an effort to avoid detection by security solutions that commonly flag publicly available tools like Rclone and MegaSync. Symantec researchers believe this indicates a strategic investment in proprietary malware to maintain a lower profile during critical phases of attacks. The custom tool supports five simultaneous connections per file for faster data exfiltration via parallel uploads, rotates TCP connections after 2GB of traffic to evade monitoring, offers options for selective file type exfiltration, and utilizes an authentication key to restrict access to stolen data. Despite disruptions in October 2023, Trigona has resumed operations, incorporating additional techniques like installing the Huorong Network Security Suite tool HRSword and disabling security products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the target system through unspecified means.</li>
<li>Installation of the Huorong Network Security Suite tool HRSword as a kernel driver service.</li>
<li>Deployment of tools such as PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd to disable security-related products by leveraging vulnerable kernel drivers to terminate endpoint protection processes.</li>
<li>Execution of utilities with PowerRun to launch apps, executables, and scripts with elevated privileges, bypassing user-mode protections.</li>
<li>Deployment of AnyDesk for direct remote access to the breached systems.</li>
<li>Execution of Mimikatz and Nirsoft utilities for credential theft and password recovery operations.</li>
<li>Use of the custom &ldquo;uploader_client.exe&rdquo; to exfiltrate valuable documents such as invoices and PDFs from network drives via parallel uploads, rotating TCP connections to evade monitoring, and using an authentication key to restrict data access.</li>
<li>Final stage involving the deployment of Trigona ransomware, demanding ransom payment in Monero cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Trigona ransomware attacks result in significant data theft and encryption, disrupting business operations and causing financial losses. The group has demonstrated the capability to resume operations even after suffering disruptions, indicating a persistent threat. Observed data exfiltration has included high-value documents such as invoices and PDFs, demonstrating a targeted approach to data theft. Victims face potential regulatory penalties, reputational damage, and recovery costs associated with restoring systems and data. The number of victims and specific financial impact varies per campaign, but the potential for severe disruption and financial strain is consistent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of &ldquo;uploader_client.exe&rdquo; with command-line arguments indicative of data exfiltration (see Sigma rule below).</li>
<li>Implement network monitoring to detect connections to unusual or hardcoded server addresses used by the &ldquo;uploader_client.exe&rdquo; exfiltration tool (see IOC table).</li>
<li>Deploy endpoint detection rules to identify the installation of Huorong Network Security Suite (HRSword) as a kernel driver service and tools like PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd.</li>
<li>Monitor for processes launched via PowerRun, especially if followed by credential dumping or remote access tool execution.</li>
<li>Review AnyDesk usage for unusual connections or after-hours access, as this tool is used for remote access.</li>
<li>Enable robust logging for credential access attempts and password recovery activity associated with Mimikatz and Nirsoft tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>trigona</category><category>ransomware</category><category>data exfiltration</category><category>custom tool</category></item><item><title>Payouts King Ransomware Abusing QEMU VMs for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</guid><description>The Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.</description><content:encoded><![CDATA[<p>The Payouts King ransomware, associated with the GOLD ENCOUNTER threat group, is utilizing QEMU, an open-source CPU emulator, to run hidden Alpine Linux virtual machines (VMs) on compromised Windows systems, effectively bypassing endpoint security solutions. This technique allows attackers to execute malicious payloads, store sensitive data, and create covert remote access tunnels over SSH without being detected by host-based security tools. Observed since November 2025 (tracked as STAC4713), this campaign initially exploited exposed SonicWall VPNs and the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). More recent attacks have leveraged exposed Cisco SSL VPNs and Microsoft Teams phishing campaigns to deliver payloads. The attackers are likely tied to former BlackBasta affiliates based on similar initial access methods. This tactic enables persistence, elevated privileges, and data exfiltration while evading detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attackers gain initial access through exposed SonicWall VPNs, Cisco SSL VPNs, or by exploiting the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). Alternatively, they use Microsoft Teams phishing, tricking employees into downloading and executing malicious files via QuickAssist.</li>
<li><strong>Payload Delivery:</strong> In some instances, a legitimate ADNotificationManager.exe binary is used to sideload a Havoc C2 payload (vcruntime140_1.dll).</li>
<li><strong>QEMU Deployment:</strong> A scheduled task named ‘TPMProfiler’ is created to launch a hidden QEMU VM as SYSTEM, utilizing virtual disk files disguised as databases and DLL files.</li>
<li><strong>VM Configuration:</strong> The QEMU VM runs Alpine Linux (version 3.22.0), containing attacker tools such as AdaptixC2, Chisel, BusyBox, and Rclone.</li>
<li><strong>Reverse SSH Tunnel:</strong> Port forwarding is set up to establish a reverse SSH tunnel, providing covert access to the infected host.</li>
<li><strong>Credential Access:</strong> Attackers use VSS (vssuirun.exe) to create a shadow copy, then use the print command over SMB to copy NTDS.dit, SAM, and SYSTEM hives to temp directories.</li>
<li><strong>Data Exfiltration:</strong> Rclone is leveraged to exfiltrate data to a remote SFTP location or other exfiltration methods, such as FTP, are used.</li>
<li><strong>Encryption and Extortion:</strong> The Payouts King ransomware encrypts systems using AES-256 (CTR) with RSA-4096 with intermittent encryption for larger files. Ransom notes are dropped, directing victims to leak sites on the dark web.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Payouts King ransomware attacks can result in significant data loss, system downtime, and financial repercussions for victim organizations. The use of QEMU VMs provides an additional layer of stealth, making detection and remediation more challenging. Targeted sectors are not specified in this report, but the use of exposed VPNs and phishing suggests a broad targeting scope. The ransom demands and potential data leaks on the dark web further compound the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unauthorized QEMU installations and suspicious scheduled tasks running with SYSTEM privileges, as these are key indicators of compromise (see Overview).</li>
<li>Implement network monitoring to detect unusual SSH port forwarding and outbound SSH tunnels on non-standard ports, which could indicate a reverse SSH tunnel (see Attack Chain).</li>
<li>Deploy the Sigma rule &ldquo;Detect ADNotificationManager Sideloading Havoc C2&rdquo; to identify instances where ADNotificationManager.exe is used to sideload the Havoc C2 payload (vcruntime140_1.dll) (see Rules).</li>
<li>Review and patch CVE-2025-26399 in SolarWinds Web Help Desk and apply necessary security measures for exposed SonicWall and Cisco SSL VPNs to prevent initial access (see Attack Chain).</li>
<li>Monitor for processes creating shadow copies (vssuirun.exe) followed by unusual file access patterns (NTDS.dit, SAM, SYSTEM hives) via SMB, indicative of credential theft (see Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>payouts-king</category><category>ransomware</category><category>qemu</category><category>vm</category><category>defense-evasion</category></item><item><title>SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-04-saas-phishing/</link><pubDate>Thu, 09 Apr 2026 18:00:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-saas-phishing/</guid><description>Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.</description><content:encoded><![CDATA[<p>This threat brief highlights two significant attack vectors observed by Cisco Talos. First, threat actors are exploiting legitimate SaaS notification pipelines (e.g., GitHub, Jira) to deliver phishing and spam, bypassing traditional email security measures by using a &ldquo;Platform-as-a-Proxy&rdquo; (PaaP) technique. This abuses the implicit trust placed in system-generated notifications from trusted enterprise tools, primarily targeting credential harvesting. Second, the Storm-1175 group is actively deploying Medusa ransomware, rapidly exploiting n-day vulnerabilities, including CVE-2026-1731, a critical remote code execution flaw in BeyondTrust Remote Support and older versions of BeyondTrust Privileged Remote Access. Defenders must adapt to these evolving tactics, as they bypass standard perimeter defenses and require more nuanced detection strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a legitimate SaaS account (e.g., GitHub, Jira) or creates a malicious project.</li>
<li>Attacker configures the SaaS platform to send notifications (e.g., project updates, issue assignments).</li>
<li>The SaaS platform generates an email notification, appearing to originate from a trusted source.</li>
<li>The email bypasses traditional email security checks (SPF, DKIM, DMARC) due to its legitimate source.</li>
<li>The email contains a malicious link or attachment designed to harvest credentials or deliver malware.</li>
<li>The user clicks the link, leading to a phishing page or malware download.</li>
<li>If the user enters credentials, the attacker gains access to their account.</li>
<li>The attacker uses the compromised account for further malicious activities or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of SaaS notification pipelines can lead to widespread credential compromise, potentially affecting numerous users within an organization. The &ldquo;automation fatigue&rdquo; associated with these notifications increases the likelihood of users falling victim to phishing attacks. Regarding Medusa ransomware, organizations face data encryption, system downtime, and potential financial losses from ransom demands, as Storm-1175 rapidly exploits vulnerabilities like CVE-2026-1731. The impact includes significant disruption to business operations and potential data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest SaaS API logs into your SIEM to detect anomalous activities, such as suspicious project creation or mass invitations (see Overview).</li>
<li>Implement instance-level verification and cross-reference notifications against internal SaaS directories to detect PaaP attacks (see Overview).</li>
<li>Apply semantic intent analysis to identify notifications that deviate from a platform&rsquo;s established functional baseline (see Overview).</li>
<li>Patch CVE-2026-1731 on all BeyondTrust Remote Support instances immediately to prevent Medusa ransomware deployment (see Overview).</li>
<li>Deploy the Sigma rule to detect Coinminer malware via SHA256 hash (see Rules).</li>
<li>Monitor network connections for VID001.exe to identify potential Coinminer infections (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>saas</category><category>phishing</category><category>ransomware</category><category>medusa</category></item><item><title>Qilin Ransomware EDR Killer Infection Chain</title><link>https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</link><pubDate>Thu, 02 Apr 2026 10:00:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</guid><description>Qilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.</description><content:encoded><![CDATA[<p>The Qilin ransomware group is actively deploying a sophisticated EDR killer as part of their attack chain. The initial stage involves a malicious &ldquo;msimg32.dll&rdquo; that is likely side-loaded by a legitimate application. This DLL version triggers its malicious logic from within its DllMain function, leading to immediate execution upon loading. The EDR killer employs advanced evasion techniques, including neutralizing user-mode hooks, suppressing Event Tracing for Windows (ETW) event generation, and utilizing structured exception handling (SEH) and vectored exception handling (VEH) to obfuscate control flow. Once active, the EDR killer component loads helper drivers to access physical memory and terminate EDR processes. This allows the malware to disable over 300 different EDR drivers across a wide range of vendors, hindering incident response and enabling further malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A legitimate application loads the malicious &ldquo;msimg32.dll&rdquo;, likely through DLL side-loading, triggering execution from within the DllMain function.</li>
<li>The DLL allocates a heap buffer in process memory acting as a slot-policy table based on ntdll.dll&rsquo;s OptionalHeader.SizeOfCode, dividing the code region into 16-byte slots.</li>
<li>The malware iterates over the export table of &ldquo;ntdll.dll&rdquo; to resolve virtual addresses of syscall stubs, specifically targeting those starting with &ldquo;Nt&rdquo;.</li>
<li>Based on resolved addresses, the malware marks corresponding entries in the slot-policy table with default or special policies, specifically targeting NtTraceEvent, NtTraceControl, and NtAlpcSendWaitReceivePort.</li>
<li>The malware dynamically resolves ntdll!LdrProtectMrdata and invokes it to change the protection of the .mrdata section to writable.</li>
<li>The loader overwrites the dispatcher slot within the .mrdata section with its own custom exception handler to intercept and modify exception handling.</li>
<li>The custom exception handler manages breakpoint exceptions (0xCC), potentially as an anti-emulation technique.</li>
<li>The EDR killer component loads helper drivers, &ldquo;rwdrv.sys&rdquo; for physical memory access and &ldquo;hlpdrv.sys&rdquo; to terminate EDR processes, after unregistering monitoring callbacks to prevent interference.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the Qilin EDR killer can disable over 300 different EDR drivers, severely impairing the ability of security teams to detect and respond to threats. This can lead to increased dwell time for ransomware and other malicious activities, resulting in significant data breaches, financial losses, and reputational damage. With telemetry collection disabled, defenders lose visibility into process, memory, and network activity, making it difficult to investigate and contain the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for DLLs loaded from non-standard locations, specifically &ldquo;msimg32.dll,&rdquo; using process creation logs to detect potential DLL side-loading attempts (rules in this brief).</li>
<li>Implement the Sigma rules provided in this brief to detect the modification of exception handler dispatchers, which is a key component of the EDR killer&rsquo;s evasion techniques.</li>
<li>Monitor for the loading of unsigned or untrusted drivers like &ldquo;rwdrv.sys&rdquo; and &ldquo;hlpdrv.sys&rdquo; using driver load events, as these are used to gain system privileges and terminate EDR processes.</li>
<li>Enable Sysmon process creation logging to capture detailed information about process execution, including command-line arguments and parent processes, to aid in the detection of malicious DLL loading.</li>
<li>Analyze process memory for evidence of user-mode hooks being neutralized or ETW event generation being suppressed. This requires more advanced memory forensics capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qilin</category><category>edr-killer</category><category>ransomware</category><category>defense-evasion</category><category>windows</category></item><item><title>M-Trends 2026: Evolving Threat Landscape</title><link>https://feed.craftedsignal.io/briefs/2026-06-mtrends-2026/</link><pubDate>Wed, 25 Mar 2026 10:45:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-mtrends-2026/</guid><description>The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.</description><content:encoded><![CDATA[<p>The Mandiant M-Trends 2026 report analyzes over 500,000 hours of incident investigations, revealing significant shifts in the cyber threat landscape. Cybercriminal groups are optimizing for immediate impact and recovery denial, while cyber espionage groups and insider threats prioritize extreme persistence, leveraging unmonitored edge devices and native network functionalities to evade detection. Voice phishing has surged, replacing email as a primary initial access vector, particularly targeting SaaS environments. The time between initial access and the hand-off to secondary actors deploying ransomware has collapsed dramatically. Targeted industries include the high-tech sector (17%) and the financial sector (14.6%). Ransomware groups are now actively targeting backup infrastructure, identity services, and virtualization management planes to ensure recovery is impossible without paying a ransom. Espionage groups are exploiting zero-day vulnerabilities in edge devices for long-term persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attackers use voice phishing (vishing) to target IT help desks, bypassing MFA and gaining initial access to SaaS environments. Malicious advertisements or the ClickFix social engineering technique are also used to gain a foothold.</li>
<li><strong>Privilege Escalation:</strong> Exploitation of misconfigured Active Directory Certificate Services templates to create admin accounts that bypass password rotation.</li>
<li><strong>Credential Access:</strong> Harvesting long-lived OAuth tokens and session cookies to bypass standard defenses. Stealing hard-coded keys and personal access tokens from compromised third-party SaaS vendors. Leveraging native packet-capturing functionality on network appliances to intercept sensitive data and plaintext credentials.</li>
<li><strong>Lateral Movement:</strong> Using stolen credentials and tokens to pivot into downstream customer environments. Exploiting the &ldquo;Tier-0&rdquo; nature of hypervisors to bypass guest-level defenses.</li>
<li><strong>Defense Evasion:</strong> Deploying custom, in-memory malware like BRICKSTORM directly onto network appliances to establish deep persistence that survives standard remediation efforts. Targeting edge and core network devices lacking EDR telemetry.</li>
<li><strong>Impact:</strong> Encrypting hypervisor datastores to render all associated virtual machines inoperable simultaneously. Deleting backup objects from cloud storage.</li>
<li><strong>Exfiltration:</strong> Large-scale data theft from SaaS environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>M-Trends 2026 highlights that ransomware groups are actively destroying the ability to recover data, impacting organizations across more than 16 industry verticals. The high-tech and financial sectors are particularly targeted. The collapse of the hand-off window from hours to seconds means organizations have less time to respond to initial intrusions before ransomware is deployed. The increasing dwell time of threats like BRICKSTORM, reaching nearly 400 days, leaves organizations blind to the full scope of the intrusion due to standard log retention policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for detecting PowerShell commands from uncommon locations to identify potential malicious activity related to post-compromise actions (reference: Sigma rule &ldquo;Detect PowerShell from Uncommon Location&rdquo;).</li>
<li>Implement network monitoring on edge devices and VPNs to detect unauthorized packet capturing and credential interception attempts (reference: overview section about edge devices).</li>
<li>Review and harden Active Directory Certificate Services configurations to prevent the exploitation of misconfigured templates (reference: attack chain step 2).</li>
<li>Monitor for modifications to cloud storage backup objects, especially deletion attempts, to detect ransomware groups attempting to destroy recovery capabilities (reference: attack chain step 6).</li>
<li>Increase log retention policies beyond 90 days to improve visibility into long-term persistent threats like BRICKSTORM (reference: Overview section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>threat-report</category><category>ransomware</category><category>phishing</category><category>saas</category></item><item><title>Interlock Ransomware Campaign Targeting Enterprise Firewalls</title><link>https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</link><pubDate>Thu, 19 Mar 2026 05:33:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</guid><description>The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.</description><content:encoded><![CDATA[<p>The Interlock ransomware campaign specifically targets enterprise firewalls. The campaign&rsquo;s objective is to encrypt sensitive data residing on or accessible through these firewalls, rendering systems inoperable and creating significant business disruption. While specific details about the initial discovery and scope of the campaign remain limited, its focus on firewalls suggests a targeted approach aimed at organizations heavily reliant on these devices for network security and perimeter defense. The lack of specific details about delivery mechanisms and exploited vulnerabilities underscores the need for proactive threat hunting and vulnerability management to detect and mitigate potential Interlock ransomware infections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the targeted network, potentially through exploiting vulnerabilities in the firewall&rsquo;s management interface or VPN services.</li>
<li><strong>Firewall Compromise:</strong> The attacker exploits the initial access to compromise the firewall device. This may involve exploiting known vulnerabilities or using stolen credentials.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised firewall as a pivot point to move laterally within the internal network. Tools like <code>ssh</code> or <code>PsExec</code> may be used.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify valuable data stores accessible through the firewall. This may involve scanning network shares or querying databases.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges to gain administrative access to critical systems. This could involve exploiting vulnerabilities or using credential harvesting techniques.</li>
<li><strong>Data Encryption:</strong> The attacker deploys the Interlock ransomware payload to encrypt sensitive data on systems accessible via the firewall.</li>
<li><strong>Ransom Demand:</strong> After encryption, the attacker delivers a ransom note demanding payment for decryption keys.</li>
<li><strong>Exfiltration (Possible):</strong> Depending on the attacker&rsquo;s goals, data exfiltration may occur prior to encryption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Interlock ransomware attack can lead to significant data loss, business disruption, and financial damage. Organizations can suffer reputational damage and legal repercussions due to data breaches. The targeted nature of the attack suggests a focus on organizations where firewall compromise would have a widespread impact, potentially affecting hundreds or thousands of users or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable enhanced logging on all enterprise firewalls to capture detailed activity, including login attempts, configuration changes, and network traffic. This enhances the effectiveness of the detection rules below.</li>
<li>Implement multi-factor authentication (MFA) for all firewall administrative access to mitigate the risk of credential theft.</li>
<li>Regularly patch and update firewall firmware to address known vulnerabilities.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>firewall</category><category>network</category></item><item><title>Warlock Group Deploys Web Shells, Tunnels, and Ransomware</title><link>https://feed.craftedsignal.io/briefs/2024-05-warlock-webshell-ransomware/</link><pubDate>Thu, 19 Mar 2026 05:26:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-warlock-webshell-ransomware/</guid><description>The Warlock group utilizes web shells and tunneling to deploy ransomware within compromised environments, impacting victim data confidentiality and availability.</description><content:encoded><![CDATA[<p>This brief describes a Warlock attack, as detailed in a Trend Micro analysis, involving the use of web shells, tunneling, and ransomware deployment. The Warlock group compromises systems by leveraging web shells for initial access and establishing tunnels for persistent access and command and control. This access is then used to deploy ransomware, encrypting critical data and demanding ransom payments from victims. The specific ransomware family and web shell variants employed are not detailed in the provided context, but the overall attack flow is consistent with financially motivated cybercrime operations. Defenders should prioritize detection of web shell activity, unauthorized tunneling, and ransomware execution to mitigate the risk of compromise by the Warlock group.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains access to the target system by exploiting vulnerabilities to deploy a web shell (details of the vulnerability are not provided).</li>
<li><strong>Web Shell Execution:</strong> The attacker executes commands through the web shell to perform reconnaissance and identify valuable targets within the network.</li>
<li><strong>Tunnel Establishment:</strong> A tunnel is established to maintain persistent access and bypass security controls (specific tunneling technology not provided).</li>
<li><strong>Lateral Movement:</strong> The attacker leverages the established tunnel to move laterally within the network, compromising additional systems.</li>
<li><strong>Credential Access:</strong> The attacker attempts to harvest credentials to gain elevated privileges and access to critical resources (specific tools/techniques not provided).</li>
<li><strong>Ransomware Deployment:</strong> The attacker deploys ransomware across the network, encrypting files and rendering systems unusable.</li>
<li><strong>Ransom Demand:</strong> A ransom note is left on the compromised systems, demanding payment for decryption keys.</li>
<li><strong>Data Exfiltration (Possible):</strong> Prior to encryption, the attacker may exfiltrate sensitive data to further pressure victims into paying the ransom (not explicitly stated, but a common practice).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Warlock attack results in significant disruption to victim organizations through ransomware deployment. Systems are rendered unusable due to encryption, potentially leading to operational downtime and financial losses. If data exfiltration occurs, the confidentiality of sensitive information is also compromised, increasing the potential for reputational damage and legal liabilities. The lack of specific victim counts and sector targeting data in the provided context limits a comprehensive impact assessment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy a web shell detection rule (see below) to identify suspicious web shell activity on web servers based on process creation.</li>
<li>Implement a network monitoring rule (see below) to detect unusual tunneling activity based on network connections from web servers.</li>
<li>Enable file integrity monitoring to detect unauthorized modifications to web server files that could indicate web shell installation (reference file_event log source).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>webshell</category><category>ransomware</category><category>tunneling</category></item><item><title>Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)</title><link>https://feed.craftedsignal.io/briefs/2026-02-activemq-rce/</link><pubDate>Wed, 25 Feb 2026 09:22:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-activemq-rce/</guid><description>CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.</description><content:encoded>&lt;p>CVE-2023-46604 is a critical remote code execution (RCE) vulnerability affecting Apache ActiveMQ message brokers. This vulnerability allows a remote attacker with network access to the ActiveMQ broker to execute arbitrary shell commands by manipulating serialized class types within the OpenWire protocol. The vulnerability affects Apache ActiveMQ versions 5.16.0 before 5.16.7, 5.17.0 before 5.17.6, 5.18.0 before 5.18.3, and before 5.15.16, as well as corresponding versions of the Legacy OpenWire…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>activemq</category><category>rce</category><category>cve-2023-46604</category><category>ransomware</category></item><item><title>Potential Veeam Credential Access via SQL Commands</title><link>https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</guid><description>Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting backup infrastructure to maximize the impact of ransomware and data exfiltration attacks. Veeam, a popular backup and disaster recovery solution, stores credentials for backup operations in MSSQL databases. An attacker who gains access to these databases may attempt to use tools like <code>sqlcmd.exe</code> or PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to extract and decrypt these credentials. This tactic allows the attacker to compromise the backups themselves, preventing recovery and increasing pressure on the victim. This activity has been observed in real-world incidents, such as those involving the Diavol ransomware. Defenders should monitor for suspicious command-line activity targeting Veeam credentials within MSSQL environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the target environment is gained through methods such as phishing or exploiting a vulnerability in a public-facing application.</li>
<li>The attacker performs reconnaissance to identify the location of the Veeam MSSQL database server.</li>
<li>The attacker obtains valid credentials or exploits a vulnerability to gain access to the Veeam MSSQL database server.</li>
<li>The attacker executes <code>sqlcmd.exe</code> or uses PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to query the <code>[VeeamBackup].[dbo].[Credentials]</code> table.</li>
<li>The attacker retrieves the encrypted Veeam credentials from the database.</li>
<li>The attacker decrypts the Veeam credentials using custom scripts or tools, potentially leveraging the Veeam backup server itself.</li>
<li>The attacker uses the compromised Veeam credentials to access and delete or encrypt backup data.</li>
<li>The attacker deploys ransomware on the remaining systems, knowing that recovery from backups is now impossible.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful compromise of Veeam credentials can have devastating consequences. Attackers can encrypt or delete backup data, making recovery impossible and significantly increasing the impact of ransomware attacks. This can lead to prolonged downtime, data loss, financial losses, and reputational damage. Organizations relying on Veeam for backup and recovery should prioritize monitoring and securing their Veeam infrastructure to prevent credential access and backup compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture command-line activity, specifically <code>sqlcmd.exe</code> and PowerShell.</li>
<li>Deploy the Sigma rule &ldquo;Potential Veeam Credential Access Command&rdquo; to detect suspicious command executions targeting Veeam credentials in MSSQL databases.</li>
<li>Review and restrict access controls to the Veeam MSSQL database, ensuring only authorized personnel and services have access.</li>
<li>Monitor for unusual login activity and failed login attempts to the Veeam MSSQL database server.</li>
<li>Implement multi-factor authentication for all accounts with access to Veeam infrastructure.</li>
<li>Regularly audit Veeam backup configurations and logs to identify any unauthorized modifications or access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>veeam</category><category>credential-access</category><category>mssql</category><category>windows</category><category>ransomware</category></item><item><title>JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)</title><link>https://feed.craftedsignal.io/briefs/2024-04-teamcity-path-traversal/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-teamcity-path-traversal/</guid><description>A relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.</description><content:encoded><![CDATA[<p>CVE-2024-27199 is a relative path traversal vulnerability affecting JetBrains TeamCity, a continuous integration and deployment server. This vulnerability allows attackers to perform limited administrative actions by manipulating file paths. JetBrains released a patch for this vulnerability in version 2023.11.4. CISA has added CVE-2024-27199 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild, including its use in ransomware attacks. The vulnerability poses a significant risk to organizations using TeamCity, potentially leading to unauthorized access, data breaches, and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable TeamCity server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing a relative path traversal sequence (e.g., <code>../../</code>) within a URL parameter related to administrative functions.</li>
<li>The TeamCity server processes the crafted request without proper sanitization of the file path.</li>
<li>The relative path traversal allows the attacker to access or modify restricted files or directories outside the intended scope.</li>
<li>The attacker leverages the ability to perform limited admin actions, potentially modifying user permissions or injecting malicious code.</li>
<li>The attacker escalates privileges, gaining full control over the TeamCity server.</li>
<li>The attacker deploys ransomware to connected systems, encrypting data and demanding a ransom for its release.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-27199 can lead to complete compromise of the TeamCity server and connected build agents. Due to TeamCity&rsquo;s central role in software development and deployment pipelines, this can lead to significant disruption, data loss, and potential supply chain attacks. The vulnerability has been linked to ransomware attacks, causing financial losses, reputational damage, and operational downtime for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch by upgrading to TeamCity version 2023.11.4 or later to remediate CVE-2024-27199 (<a href="https://www.jetbrains.com/privacy-security/issues-fixed/">https://www.jetbrains.com/privacy-security/issues-fixed/</a>).</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts against TeamCity servers.</li>
<li>Follow CISA&rsquo;s BOD 22-01 guidance for cloud services to ensure proper security configurations and monitoring are in place.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2024-27199</category><category>path-traversal</category><category>ransomware</category><category>jetbrains</category></item><item><title>Potential Ransomware Behavior - Note Files Dropped via SMB</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</guid><description>This rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.</description><content:encoded><![CDATA[<p>This detection identifies potential ransomware activity through the rapid creation of ransom notes via SMB shares. The rule focuses on file creation events originating from the SYSTEM account (PID 4), targeting common ransom note file extensions like .txt, .html, .pdf, and image files. This activity suggests an attacker has achieved lateral movement and is deploying ransom notes across multiple systems. The rule aggregates events within a 60-second window to reduce false positives and focus on high-frequency creation patterns indicative of automated ransomware deployment. Successful detection can help defenders quickly identify and contain ransomware outbreaks before widespread encryption occurs. The original Elastic detection rule was published on 2024-05-03 and updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit or compromised credentials.</li>
<li>The attacker moves laterally to other systems on the network using valid accounts or exploits. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The attacker uses a tool to remotely create files over SMB. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The SYSTEM account (PID 4) on a compromised host is used to create multiple files with the same name but different paths (C:*) over SMB.</li>
<li>The created files have file extensions commonly associated with ransom notes: .txt, .htm, .html, .hta, .pdf, .jpg, .bmp, .png.</li>
<li>The files are dropped into at least 3 unique paths within a short time frame (60 seconds).</li>
<li>The attacker encrypts data and leaves the ransom notes to instruct victims on how to pay the ransom. (T1486 - Data Encrypted for Impact)</li>
<li>The organization experiences data loss, financial damage, and reputational harm.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful ransomware attacks can lead to significant data loss, financial costs associated with ransom payments, recovery efforts, and reputational damage. Organizations may experience business disruption, regulatory fines, and legal liabilities. The Akira ransomware group, referenced in the original rule&rsquo;s documentation, has been known to target various sectors, demanding substantial ransoms from victims. The widespread distribution of ransom notes indicates an advanced stage of the ransomware attack, necessitating immediate containment to prevent further data encryption and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Ransomware Note File Dropped via SMB</code> to your SIEM to detect suspicious file creation activity indicative of ransomware deployment.</li>
<li>Enable Elastic Defend for enhanced endpoint detection and response capabilities, as recommended in the rule&rsquo;s setup instructions.</li>
<li>Monitor incoming network connections to port 445 (SMB) on critical assets, as suggested in the rule&rsquo;s triage analysis.</li>
<li>Investigate file names with unusual extensions to identify potential ransom notes, as mentioned in the triage analysis.</li>
<li>Isolate any hosts identified as creating multiple note files over SMB to prevent further lateral movement and data encryption, as described in the rule&rsquo;s response and remediation steps.</li>
<li>Review and enforce network segmentation policies to limit lateral movement and reduce the impact of potential ransomware attacks (TA0008).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ransomware</category><category>impact</category><category>lateral-movement</category><category>windows</category></item><item><title>PowerShell Share Enumeration via ShareFinder or Native APIs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</guid><description>Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts utilizing ShareFinder functions (Invoke-ShareFinder/Invoke-ShareFinderThreaded) or native Windows API calls for share enumeration. These techniques are commonly used by attackers to map accessible network shares within an environment. This reconnaissance is often a precursor to data collection, lateral movement, or the deployment of ransomware. The activity is detected via script block logging, and focuses on identifying specific function calls and API usage within the PowerShell script content. Defenders should be aware of this activity, particularly when performed by unexpected users or on unusual systems, as it may indicate malicious reconnaissance within the network. The references indicate that this activity can lead to corporate insurance policy exfiltration or Conti ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or compromised credentials.</li>
<li>The attacker executes a PowerShell script, either directly or through a fileless execution method.</li>
<li>The PowerShell script utilizes ShareFinder functions (Invoke-ShareFinder, Invoke-ShareFinderThreaded) or Windows share enumeration APIs (NetShareEnum, NetApiBufferFree) to discover network shares.</li>
<li>The script identifies accessible network shares by leveraging API calls and parsing the results for share names (shi1_netname) and remarks (shi1_remark).</li>
<li>The attacker analyzes the identified shares to determine those that are accessible and contain valuable data.</li>
<li>The attacker may then attempt to access these shares using compromised credentials or exploiting existing vulnerabilities.</li>
<li>Once access is gained, the attacker may collect sensitive data from the shares, move laterally to other systems, or deploy ransomware.</li>
<li>The ultimate goal is data exfiltration, system compromise, or financial gain through ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reconnaissance technique can lead to significant data breaches, lateral movement within the network, and potential ransomware deployment. Organizations that fail to detect and prevent share enumeration may suffer financial losses, reputational damage, and operational disruption. The referenced &ldquo;Stolen Images&rdquo; campaign led to Conti ransomware deployment, and the &ldquo;Hunting for corporate insurance policies&rdquo; post highlights data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell script block logging to capture the necessary events for detection (as referenced in the rule setup).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration Script via Invoke-ShareFinder&rdquo; to your SIEM and tune for your environment.</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration via NetShareEnum API&rdquo; to detect share enumeration using native Windows APIs.</li>
<li>Investigate any alerts generated by these rules, focusing on the PowerShell launch context and the scope of the share discovery (see triage steps in the original rule).</li>
<li>Review and restrict PowerShell execution policies to prevent unauthorized script execution, especially from user-writable locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>discovery</category><category>powershell</category><category>share-enumeration</category><category>lateral-movement</category><category>ransomware</category></item><item><title>Detection of Wevtutil.exe Used to Disable Event Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</link><pubDate>Thu, 04 Jan 2024 16:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</guid><description>The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.</description><content:encoded><![CDATA[<p>Attackers, particularly ransomware groups, often disable or manipulate event logs to cover their tracks and hinder forensic investigations. This activity typically occurs post-compromise as part of an attacker&rsquo;s defense evasion strategy. The use of <code>wevtutil.exe</code>, a legitimate Windows command-line utility, makes this technique challenging to detect without specific monitoring. Ransomware actors disable logging to operate undetected, making it difficult for security teams to trace malicious activities and respond effectively. This can prolong the dwell time of the attacker within the environment and increase the potential for widespread damage, data exfiltration, or system encryption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through typical methods like phishing or exploiting public-facing vulnerabilities.</li>
<li>The attacker executes code on the compromised system, achieving initial foothold.</li>
<li>Privilege escalation techniques are employed to gain elevated permissions (e.g., using exploits, token manipulation).</li>
<li>The attacker uses <code>wevtutil.exe</code> with specific commands to disable or clear event logs. Example commands include <code>wevtutil.exe sl &lt;logname&gt; false</code> or <code>wevtutil.exe set-log &lt;logname&gt; /enabled:false</code>.</li>
<li>The attacker disables specific event channels to remove evidence of their activity.</li>
<li>Persistence mechanisms are established to maintain access across reboots (e.g., creating scheduled tasks, modifying registry keys).</li>
<li>Lateral movement is initiated to compromise additional systems within the network using tools like PsExec or SMB shares.</li>
<li>The final objective, such as ransomware deployment or data exfiltration, is executed, with logging disabled to minimize the chances of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of event logs allows attackers to operate undetected, hindering forensic investigations and incident response efforts. This can lead to delayed detection of breaches, prolonged dwell time for attackers, and increased damage to affected organizations. Ransomware groups frequently use this technique to maximize the impact of their attacks, resulting in data encryption, exfiltration, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to detect the execution of <code>wevtutil.exe</code> with suspicious parameters.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect specific command-line arguments used to disable event logs.</li>
<li>Monitor Windows Event Log Security (4688) for process creation events of <code>wevtutil.exe</code> with arguments related to disabling or clearing logs.</li>
<li>Investigate any instances where <code>wevtutil.exe</code> is executed with parameters like <code>sl</code> or <code>set-log</code> and <code>/e:false</code> or <code>/enabled:false</code> in the command line, as highlighted in the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ransomware</category><category>windows</category></item><item><title>Third-party Backup Files Deleted via Unexpected Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 18:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-backup-deletion/</guid><description>This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.</description><content:encoded><![CDATA[<p>This rule identifies the deletion of backup files, specifically those created by Veeam and Veritas Backup Exec, through unexpected processes on Windows systems. The rule aims to detect potential attempts to inhibit system recovery by adversaries, particularly in the context of ransomware attacks. Attackers often target backup files to eliminate recovery options for victims. This detection focuses on identifying file deletion events where the process responsible for the deletion does not belong to the trusted backup software suite. The rule excludes known legitimate processes and directories like Trend Micro&rsquo;s, Microsoft Exchange Mailbox Assistants, and the Recycle Bin to minimize false positives. The original Elastic detection rule was created in October 2021 and last updated May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to the target Windows system.</li>
<li>The attacker performs reconnaissance to identify backup file locations.</li>
<li>The attacker uses a non-backup related process (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to delete backup files.</li>
<li>The attacker targets Veeam backup files with extensions <code>VBK</code>, <code>VIB</code>, and <code>VBM</code>.</li>
<li>The attacker targets Veritas Backup Exec files with the <code>BKF</code> extension.</li>
<li>The deletion events are logged by the endpoint detection system.</li>
<li>The detection rule triggers, identifying the anomalous deletion activity based on file extension and process context.</li>
<li>Successful deletion of backups impairs the victim&rsquo;s ability to recover from ransomware or other destructive attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup files can severely impact an organization&rsquo;s ability to recover from a ransomware attack or other data loss events. Without viable backups, the victim organization may be forced to pay a ransom or face significant data loss and business disruption. This tactic directly increases the attacker&rsquo;s leverage and potential financial gain. The rule&rsquo;s documentation cites a report from AdvIntel detailing backup removal solutions seen with Conti ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unexpected Veeam Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veeam backup files.</li>
<li>Deploy the Sigma rule <code>Unexpected Veritas Backup File Deletion</code> to your SIEM and tune for your environment to detect unexpected deletion of Veritas Backup Exec files.</li>
<li>Investigate any alerts generated by these rules to determine the source of the deletion and assess potential impact.</li>
<li>Enable endpoint file event logging to capture file deletion events, which are crucial for the Sigma rules.</li>
<li>Review process execution chains (parent process tree) for unknown processes to identify the root cause of unexpected file deletions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup deletion</category><category>ransomware</category></item><item><title>PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-papercut-auth-bypass/</guid><description>CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.</description><content:encoded><![CDATA[<p>CVE-2023-27351 is a critical improper authentication vulnerability affecting PaperCut NG/MF. The vulnerability exists within the SecurityRequestFilter class, enabling remote attackers to bypass authentication mechanisms. This bypass can lead to unauthorized access to sensitive functionalities within the PaperCut NG/MF application. Publicly available reports indicate that this vulnerability is being actively exploited, including instances of ransomware deployment following successful exploitation. Due to the ease of exploitation and the potentially severe consequences, organizations using affected versions of PaperCut NG/MF are urged to apply mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PaperCut NG/MF instance accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the SecurityRequestFilter class.</li>
<li>The crafted request exploits the improper authentication vulnerability (CVE-2023-27351), bypassing normal authentication checks.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the PaperCut NG/MF application with elevated privileges.</li>
<li>The attacker leverages the gained access to upload malicious scripts or binaries to the PaperCut server.</li>
<li>The attacker executes the uploaded payload, initiating the ransomware encryption process or other malicious activities.</li>
<li>Ransomware encrypts sensitive data on the PaperCut server and potentially spreads to other connected systems.</li>
<li>The attacker demands a ransom payment for the decryption key.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-27351 allows attackers to bypass authentication, gain unauthorized access, and potentially deploy ransomware. This can result in significant data loss, disruption of print services, and financial losses due to ransom demands and recovery efforts. The vulnerability is known to be actively exploited, increasing the risk to organizations using affected PaperCut NG/MF installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by PaperCut, referencing their knowledge base articles PO-1216 and PO-1219.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts against the SecurityRequestFilter class.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if the PaperCut instance is cloud-hosted.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>papercut</category><category>authentication-bypass</category><category>ransomware</category><category>cve-2023-27351</category></item></channel></rss>