<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Reconnaissance — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/reconnaissance/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 19:43:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/reconnaissance/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rapid Enumeration of AWS S3 Buckets</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</link><pubDate>Fri, 01 May 2026 19:43:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-s3-bucket-discovery/</guid><description>An AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.</description><content:encoded><![CDATA[<p>This threat brief covers suspicious activity related to the rapid enumeration of AWS S3 buckets. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs from the same source IP address within a short timeframe. This pattern is often associated with reconnaissance efforts, security scanning tools, or post-compromise enumeration activities. The behavior is similar to that observed with CSPM tools and by threat actors like Team PCP. The detection specifically excludes AWS service principals and requires programmatic-style sessions (i.e., not Management Console credentials). It focuses on scenarios where resource and identity fields are populated to avoid skewed results from null values. The detection threshold is set to greater than 15 distinct <code>aws.cloudtrail.resources.arn</code> values within a 10-second window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment using compromised credentials or through an exposed IAM role. (T1530)</li>
<li>The attacker authenticates to AWS using the obtained credentials, creating a programmatic session.</li>
<li>The attacker issues a series of <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code> API calls to S3.</li>
<li>These API calls are directed towards multiple distinct S3 buckets within a short timeframe (10 seconds).</li>
<li>The attacker collects information about the bucket&rsquo;s access control lists (ACLs), public access blocks, policies, versioning status, and other metadata. (T1526, T1580, T1619)</li>
<li>The collected information is analyzed to identify publicly accessible buckets, misconfigurations, or sensitive data storage locations.</li>
<li>The attacker uses identified vulnerabilities to exfiltrate data.</li>
<li>The attacker attempts lateral movement within the AWS environment, leveraging the discovered information to compromise other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of S3 buckets can lead to the discovery of sensitive data, misconfigurations, and publicly accessible resources. This can result in data breaches, unauthorized access, and further compromise of the AWS environment. The enumeration allows an attacker to map out the S3 storage landscape, identifying targets for data exfiltration or privilege escalation. The rapid nature of the enumeration suggests automated scanning or reconnaissance, potentially indicating a larger attack campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect rapid S3 bucket enumeration activity based on AWS CloudTrail logs, adjusting the threshold of 15 distinct buckets to suit your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address (<code>source.ip</code>), AWS principal ARN (<code>aws.cloudtrail.user_identity.arn</code>), and the list of accessed buckets (<code>aws.cloudtrail.resources.arn</code>).</li>
<li>Review IAM policies associated with the identified principal to ensure least privilege for S3 read APIs.</li>
<li>Monitor CloudTrail logs for related events, such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, <code>AssumeRole</code>, or IAM changes, occurring within ±30 minutes of the detected enumeration activity.</li>
<li>Implement network-level restrictions on the source IP address if it is not authorized to perform S3 enumeration.</li>
<li>Document approved scanning accounts and add user agent filters to the provided Sigma rule to reduce noise from those identities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>s3</category><category>cloudtrail</category><category>discovery</category><category>enumeration</category><category>reconnaissance</category></item><item><title>AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aws-s3-reconnaissance/</guid><description>An AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.</description><content:encoded><![CDATA[<p>This threat brief details detection of rapid enumeration of AWS S3 bucket configurations. The activity is characterized by an AWS principal invoking read-only S3 control-plane APIs across numerous buckets within a short timeframe. This pattern is consistent with automated reconnaissance, security scanning, or post-compromise enumeration. The activity is detected by monitoring AWS CloudTrail logs for specific API calls such as <code>GetBucketAcl</code>, <code>GetBucketPublicAccessBlock</code>, <code>GetBucketPolicy</code>, <code>GetBucketPolicyStatus</code>, and <code>GetBucketVersioning</code>. The detection logic excludes AWS service principals and sessions using Management Console credentials to reduce false positives. This activity is relevant for defenders as it can signal early-stage reconnaissance by threat actors like Team PCP, or unauthorized data discovery within the AWS environment. The rule uses a threshold of 15 distinct buckets accessed within 10 seconds to identify suspicious behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker uses the acquired credentials to authenticate to the AWS environment.</li>
<li>The attacker executes a script or tool that calls multiple S3 APIs (e.g., <code>GetBucketAcl</code>, <code>GetBucketPolicy</code>) to gather information about S3 buckets.</li>
<li>The tool iterates through a list of buckets, querying the configuration of each.</li>
<li>The attacker collects the responses from the S3 API calls, mapping out bucket names, permissions, and access control lists.</li>
<li>The attacker analyzes the collected data to identify potentially sensitive data or misconfigured buckets.</li>
<li>Based on the findings, the attacker may proceed to exfiltrate data from accessible buckets (T1530).</li>
<li>The attacker may also attempt to modify bucket policies or access controls to gain further access or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance of S3 bucket configurations allows attackers to identify vulnerable buckets, potentially leading to data breaches or unauthorized access to sensitive information. The source material does not provide specific victim counts or sectors. However, the impact can range from exposure of confidential data to full compromise of the AWS environment, depending on the level of access gained and the sensitivity of the data stored in the targeted buckets. Identifying the activity early can prevent further exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect rapid S3 bucket posture API calls (see: &ldquo;AWS S3 Rapid Bucket Enumeration&rdquo;).</li>
<li>Review IAM policies and enforce least privilege on S3 read APIs to limit the scope of potential reconnaissance activities.</li>
<li>Monitor CloudTrail logs for the same <code>aws.cloudtrail.user_identity.arn</code> and <code>source.ip</code> within approximately ±30 minutes for follow-on patterns such as <code>ListBuckets</code>, <code>GetObject</code>, <code>PutBucketPolicy</code>, or <code>AssumeRole</code> activities (see Overview).</li>
<li>Rotate or disable keys for the affected identity, revoke active role sessions where possible, and restrict the source IP at the network layer if it is not authorized (see Overview).</li>
<li>Whitelist approved scanning accounts and tune the Sigma rule to reduce noise from those identities (see Overview).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>s3</category><category>reconnaissance</category></item><item><title>OpenCanary Telnet Login Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-10-opencanary-telnet-login/</link><pubDate>Sat, 26 Oct 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-opencanary-telnet-login/</guid><description>The OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.</description><content:encoded><![CDATA[<p>OpenCanary is a low-interaction honeypot designed to detect attackers on a network. This detection focuses on Telnet login attempts, a protocol rarely used legitimately in modern networks and thus a strong indicator of malicious activity. When an attacker attempts to log into a Telnet service on an OpenCanary node, it triggers this alert. This provides early warning of potential intrusion attempts, reconnaissance activities, or lateral movement by attackers who have already gained a foothold. The detection is based on OpenCanary&rsquo;s logging functionality which records such login attempts, generating a log event with code 6001. This event signifies an attacker interacting with the Telnet service, which is unlikely in a well-secured and properly configured environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker scans the network for open ports, identifying a Telnet service.</li>
<li>Attacker attempts to connect to the Telnet service on the OpenCanary node.</li>
<li>Attacker enters credentials (username and password) in an attempt to authenticate.</li>
<li>OpenCanary logs the Telnet login attempt, generating an event with logtype 6001.</li>
<li>The detection rule triggers based on the OpenCanary log event.</li>
<li>Security team investigates the alert to determine the source and intent of the Telnet login attempt.</li>
<li>If the attempt is malicious, the security team takes steps to block the attacker and prevent further access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Telnet login could provide an attacker with unauthorized access to the network or specific systems. While Telnet itself may not grant immediate access to sensitive data, it can be used as a stepping stone for further exploitation and lateral movement. The compromise of even a single system can lead to data breaches, ransomware deployment, and significant disruption of services. OpenCanary serves as an early warning system, allowing defenders to identify and respond to such attempts before significant damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>OpenCanary - Telnet Login Attempt</code> to your SIEM to detect unauthorized Telnet login attempts.</li>
<li>Investigate any alerts generated by the <code>OpenCanary - Telnet Login Attempt</code> rule to determine the source and intent of the connection.</li>
<li>Review the OpenCanary configuration to ensure it is properly deployed and monitoring the appropriate network segments.</li>
<li>Consider disabling the Telnet service on all legitimate systems on the network to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>telnet</category><category>reconnaissance</category><category>intrusion</category><category>opencanary</category></item><item><title>OpenCanary SSH Connection Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-attempt/</link><pubDate>Wed, 08 May 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-attempt/</guid><description>An SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.</description><content:encoded><![CDATA[<p>The OpenCanary SSH Connection Attempt alert signifies that an SSH service on a deployed OpenCanary node has received a connection attempt. OpenCanary is a low-interaction honeypot designed to detect reconnaissance and lateral movement activities within a network. This event, logged as logtype 4000 by default, suggests that an attacker is actively scanning for or attempting to exploit SSH services. This alert is crucial for defenders because OpenCanary nodes are deliberately placed to attract malicious activity, meaning any interaction is highly suspicious. The alert helps identify potential breaches early, allowing security teams to respond quickly. The configuration of services monitored by OpenCanary is detailed in the project&rsquo;s documentation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Reconnaissance: The attacker conducts network scanning using tools like Nmap or Masscan to identify open ports and services, including SSH (port 22).</li>
<li>Target Identification: The attacker identifies the OpenCanary node, mistaking it for a legitimate SSH server, due to its exposed SSH port.</li>
<li>Connection Attempt: The attacker attempts to establish an SSH connection to the OpenCanary node using a tool like <code>ssh</code> or a custom script.</li>
<li>Authentication Probe: The attacker might attempt to authenticate using default credentials, common usernames and passwords, or brute-force techniques.</li>
<li>Credential Compromise (Simulated): The OpenCanary node logs the failed or successful (simulated) login attempt, triggering the alert. OpenCanary may simulate a successful login for further interaction logging.</li>
<li>Lateral Movement (Attempted): If the attacker believes they have successfully authenticated, they may attempt lateral movement to other systems within the network.</li>
<li>Privilege Escalation (Attempted): The attacker could attempt to escalate privileges on the &ldquo;compromised&rdquo; system (OpenCanary) to gain further access.</li>
<li>Data Exfiltration/System Damage (Prevented): Because it&rsquo;s a honeypot, OpenCanary prevents actual data exfiltration or system damage but logs all attempted actions for analysis.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>An SSH connection attempt on an OpenCanary node, while not directly causing damage, indicates active reconnaissance or attempted unauthorized access within the network. The number of alerts generated can highlight the frequency of malicious scans targeting SSH services. Successful exploitation (simulated on the honeypot) could lead to lateral movement, privilege escalation, and data exfiltration if the attacker were to compromise a real system. This activity is valuable for understanding attacker behavior and improving overall security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect SSH connection attempts to OpenCanary nodes, focusing on <code>logtype: 4000</code>.</li>
<li>Review OpenCanary logs in conjunction with other security logs (firewall, endpoint) to correlate the SSH attempts with other suspicious activities.</li>
<li>Investigate the source IP addresses from which SSH connection attempts originate to identify potential threat actors.</li>
<li>Consult the OpenCanary documentation to ensure proper configuration of the SSH service and logging capabilities.</li>
<li>Use network segmentation to limit the potential impact of a successful breach, even if only simulated on the OpenCanary node.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>ssh</category><category>reconnaissance</category></item><item><title>Kubernetes Multi-Resource Discovery Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubernetes-multi-resource-discovery/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubernetes-multi-resource-discovery/</guid><description>Adversaries may perform reconnaissance in a Kubernetes environment by rapidly querying multiple resource types to map the environment and identify potential privilege escalation paths.</description><content:encoded><![CDATA[<p>After gaining initial access to a Kubernetes cluster, adversaries often conduct reconnaissance to understand the environment before further actions like exfiltration or privilege escalation. This involves mapping the cluster&rsquo;s structure, identifying workloads, and understanding role-based access control (RBAC) configurations. This reconnaissance is achieved by rapidly querying various API resources, including namespaces, pods, roles, ClusterRoles, ConfigMaps, and ServiceAccounts. The activity is characterized by a burst of <code>get</code> and <code>list</code> requests across multiple resource types within a short timeframe, which is atypical for normal cluster operations and may indicate malicious probing or permission reconnaissance. This detection focuses on identifying such cross-resource bursts from a single client to distinguish reconnaissance activities from routine automation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Kubernetes cluster using compromised credentials or by exploiting a vulnerability. (T1190, T1566)</li>
<li>The attacker authenticates to the Kubernetes API server using the compromised credentials or a valid service account token.</li>
<li>The attacker begins enumerating namespaces to understand the logical divisions within the cluster using <code>kubectl get namespaces</code> or equivalent API calls. (T1068)</li>
<li>The attacker queries pods within the discovered namespaces to identify running workloads and potential targets. (T1068)</li>
<li>The attacker lists roles and cluster roles to understand the existing RBAC configurations and identify potential privilege escalation opportunities. (T1069)</li>
<li>The attacker retrieves service accounts to identify applications and their associated permissions, potentially discovering more attack vectors.</li>
<li>The attacker analyzes the collected information to identify vulnerable services, misconfigured permissions, or sensitive data.</li>
<li>Based on the reconnaissance, the attacker proceeds with lateral movement, privilege escalation, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance allows attackers to gain a comprehensive understanding of the Kubernetes environment, facilitating further malicious activities such as lateral movement, privilege escalation, and data exfiltration. This can lead to the compromise of sensitive data, disruption of services, and unauthorized access to critical resources. The impact is magnified in clusters with weak RBAC policies or exposed sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Multi-Resource Discovery&rdquo; to your SIEM and tune for your environment to detect reconnaissance activities.</li>
<li>Investigate alerts generated by the Sigma rule by pivoting on <code>user.name</code>, <code>source.ip</code>, and <code>user_agent.original</code> to determine the sequence of API calls.</li>
<li>Correlate the identified activity with RBAC configurations to identify potential violations of the principle of least privilege as described in the rule&rsquo;s Triage and Analysis section.</li>
<li>Baseline automation by allowlisting known service accounts or source networks that legitimately span multiple resource types in a short window, as described in the rule&rsquo;s False Positive Analysis section.</li>
<li>Review and tighten RBAC configurations to minimize the impact of compromised credentials as described in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>discovery</category><category>reconnaissance</category></item><item><title>Detection of Obfuscated IP Addresses via Command Line Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</guid><description>The use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.</description><content:encoded><![CDATA[<p>Attackers may attempt to obscure their activities by using obfuscated IP addresses within command-line tools. This is done to bypass simple pattern matching or detection rules that rely on standard IP address formats. The Sigma rule &ldquo;Obfuscated IP Via CLI&rdquo; published on 2022-08-03 and modified on 2026-03-16, focuses on detecting this behavior by identifying command lines containing hexadecimal, octal, or other encoded representations of IP addresses used with <code>ping.exe</code> or <code>arp.exe</code>. This activity can indicate reconnaissance, command and control communication, or lateral movement attempts where attackers are trying to hide the true destination of their network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker opens a command prompt (cmd.exe) or PowerShell.</li>
<li>The attacker uses <code>ping.exe</code> or <code>arp.exe</code> to test network connectivity.</li>
<li>The attacker crafts a command line that includes an obfuscated IP address (e.g., hexadecimal, octal). For example: <code>ping 0121.04.0174.012</code></li>
<li>The command is executed, attempting to resolve or connect to the obfuscated IP address.</li>
<li>If the obfuscation bypasses security controls, the tool resolves the address.</li>
<li>The attacker gathers information about the target system (if ping is successful) or network.</li>
<li>The attacker uses this information for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of obfuscated IPs can lead to undetected reconnaissance, lateral movement, and data exfiltration. By hiding the true destination of network traffic, attackers can bypass traditional security measures and gain a foothold within the network. The impact includes potential data breaches, system compromise, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Obfuscated IP Via CLI&rdquo; Sigma rule to your SIEM to detect command-line execution with obfuscated IP addresses.</li>
<li>Enable process creation logging for <code>ping.exe</code> and <code>arp.exe</code> to ensure the Sigma rule has the necessary data.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious.</li>
<li>Implement network segmentation to limit the scope of potential lateral movement.</li>
<li>Monitor command-line activity for unusual patterns or arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>reconnaissance</category><category>evasion</category><category>command-line</category></item><item><title>Active Directory Discovery via ADExplorer Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adexplorer-execution/</guid><description>Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.</description><content:encoded><![CDATA[<p>ADExplorer is an advanced Active Directory (AD) viewer and editor, it includes the ability to save snapshots of an AD database for offline viewing and comparisons. Adversaries may abuse this utility to perform domain reconnaissance, gather sensitive information about the AD structure, user accounts, and group memberships. The execution of ADExplorer is a potential indicator of malicious activity, especially when observed in environments where its use is not typical or when executed by unauthorized users. This activity can lead to further exploitation, such as privilege escalation and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker downloads the ADExplorer utility (ADExplorer.exe) to the compromised host.</li>
<li>The attacker executes ADExplorer.exe to begin enumeration of the Active Directory environment.</li>
<li>ADExplorer interacts with the Active Directory domain controllers, querying information about users, groups, computers, and organizational units.</li>
<li>The attacker may use ADExplorer to save snapshots of the AD database for offline analysis.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts, critical assets, and potential vulnerabilities within the AD environment.</li>
<li>The attacker uses the discovered information to plan further attacks, such as lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of ADExplorer by malicious actors can lead to the discovery of sensitive information about the Active Directory environment. This information can be leveraged to facilitate lateral movement, privilege escalation, and data exfiltration. While the initial risk score is low, the reconnaissance activity enables follow-on attacks that can have severe consequences, potentially leading to full domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Process Name</code> to detect the execution of ADExplorer based on process name.</li>
<li>Implement the Sigma rule <code>Detect ADExplorer Execution via Original File Name</code> to detect the execution of ADExplorer based on the process&rsquo;s original file name.</li>
<li>Monitor process creation events on Windows endpoints for the execution of ADExplorer.exe or processes with an original file name of &ldquo;AdExp&rdquo; to detect potential reconnaissance activities.</li>
<li>Investigate and validate any execution of ADExplorer by non-administrator accounts.</li>
<li>Review ADExplorer use and restrict its usage to authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>active-directory</category><category>discovery</category><category>reconnaissance</category><category>windows</category></item><item><title>Suspicious PowerShell Reconnaissance via WMI Queries</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-reconnaissance/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-reconnaissance/</guid><description>Detection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.</description><content:encoded><![CDATA[<p>This brief focuses on detecting reconnaissance activities performed through PowerShell using WMI queries. Adversaries often use WMI to gather detailed information about a compromised system, including hardware specifications, operating system details, and installed software. This information can be used to plan further attacks, such as privilege escalation or lateral movement. This detection leverages PowerShell Script Block Logging (EventCode 4104) to identify specific WMI queries that target system information classes like <code>Win32_Bios</code>, <code>Win32_OperatingSystem</code>, <code>Win32_Processor</code> and others. Identifying this behavior early can help defenders disrupt attack chains before significant damage occurs. The analytic is based on the detection logic from the Splunk Security Content project as of April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a PowerShell script, either directly or via a command-line interpreter like <code>cmd.exe</code>.</li>
<li>The PowerShell script uses the <code>Get-WmiObject</code> cmdlet or a direct WMI query with <code>SELECT</code> to query system information.</li>
<li>Specific WMI classes are targeted, including <code>Win32_Bios</code>, <code>Win32_OperatingSystem</code>, <code>Win32_Processor</code>, <code>Win32_ComputerSystem</code>, <code>Win32_PnPEntity</code>, <code>Win32_ShadowCopy</code>, <code>Win32_DiskDrive</code>, <code>Win32_PhysicalMemory</code>, <code>Win32_BaseBoard</code>, and <code>Win32_DisplayConfiguration</code>.</li>
<li>The script collects the data returned by the WMI queries.</li>
<li>The gathered information is used to profile the system and identify potential vulnerabilities or weaknesses.</li>
<li>The attacker uses the gathered information to plan subsequent stages of the attack, like lateral movement or privilege escalation.</li>
<li>The attacker executes further commands based on the gathered information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance can provide attackers with a comprehensive understanding of the target environment, enabling them to tailor their attacks for maximum impact. This can lead to successful privilege escalation, lateral movement, data exfiltration, or ransomware deployment. Organizations that fail to detect and prevent reconnaissance activities are at a higher risk of experiencing significant data breaches and financial losses. The Maze ransomware group, Industroyer2, and LockBit ransomware have been observed using similar reconnaissance techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to capture the necessary data for detection (<a href="https://help.splunk.com/en/security-offerings/splunk-user-behavior-analytics/get-data-in/5.4.1/add-other-data-to-splunk-uba/configure-powershell-logging-to-see-powershell-anomalies-in-splunk-uba.">PowerShell Script Block Logging 4104</a>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WMI Reconnaissance via PowerShell</code> to identify PowerShell scripts querying sensitive WMI classes.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user and process context to determine potential malicious intent.</li>
<li>Review and tune the <code>Recon Using WMI Class</code> detection filter (<code>recon_using_wmi_class_filter</code>) to reduce false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>wmi</category><category>reconnaissance</category><category>lateral_movement</category><category>windows</category></item><item><title>AdFind Tool Used for Active Directory Reconnaissance</title><link>https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adfind-reconnaissance/</guid><description>The execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.</description><content:encoded><![CDATA[<p>AdFind is a command-line tool used to retrieve information from Active Directory. While it has legitimate uses for network administrators, threat actors frequently leverage it for post-exploitation Active Directory reconnaissance. The tool allows for quick scoping of AD person/computer objects and understanding subnets and domain information. AdFind has been observed in campaigns associated with various threat actors, including Trickbot, Ryuk, Maze, and FIN6. This reconnaissance activity is typically conducted after initial compromise to gather information for lateral movement and privilege escalation. The detection of AdFind execution, especially with specific command-line arguments, can indicate malicious activity within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows host, possibly through exploitation of a vulnerability or compromised credentials.</li>
<li>Tool Transfer: The attacker transfers AdFind.exe to the compromised host.</li>
<li>Execution: The attacker executes AdFind.exe from the command line or via a script.</li>
<li>Discovery: AdFind is used to enumerate Active Directory objects such as computers (<code>objectcategory=computer</code>), users (<code>objectcategory=person</code>), subnets (<code>objectcategory=subnet</code>), and groups (<code>objectcategory=group</code>).</li>
<li>Information Gathering: The attacker gathers information about domain controllers using commands such as <code>dclist</code> or <code>dcmodes</code>.</li>
<li>Privilege Escalation: The gathered information is used to identify potential targets for privilege escalation, such as accounts with weak passwords or misconfigured permissions.</li>
<li>Lateral Movement: The attacker uses the gathered information to move laterally to other systems within the network.</li>
<li>Objective Completion: The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance using AdFind can provide attackers with a comprehensive understanding of the Active Directory environment, facilitating lateral movement, privilege escalation, and ultimately, the exfiltration of sensitive data or deployment of ransomware. While the use of AdFind itself may not be directly damaging, it is a strong indicator of malicious activity within a compromised network. The impact can range from data breaches and financial losses to reputational damage and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AdFind Command Activity&rdquo; to your SIEM to detect the execution of AdFind with suspicious command-line arguments.</li>
<li>Enable Sysmon process-creation logging to provide the necessary data for the Sigma rule to function effectively (reference the Sysmon setup documentation).</li>
<li>Investigate any alerts generated by the &ldquo;AdFind Command Activity&rdquo; Sigma rule to determine the scope and impact of the potential compromise.</li>
<li>Monitor process execution events for AdFind-related activity, focusing on command-line arguments used to query Active Directory objects (reference the <code>query</code> field in the original rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following a successful compromise.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>adfind</category><category>active-directory</category><category>reconnaissance</category><category>windows</category></item></channel></rss>