<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security-Control — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/security-control/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/security-control/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Enterprise IP Allow List Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-ip-allow-list-disabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-ip-allow-list-disabled/</guid><description>An IP allow list was disabled in GitHub Enterprise, potentially allowing unauthorized access from untrusted networks and exposing sensitive code repositories.</description><content:encoded><![CDATA[<p>This threat brief addresses the disabling of IP allow lists within a GitHub Enterprise environment. GitHub Enterprise&rsquo;s IP allow lists restrict access to resources from only trusted IP addresses, a critical security control to prevent unauthorized access. The disabling of this feature, as detected via GitHub Enterprise audit logs, could indicate malicious activity, such as an attacker attempting to circumvent existing access controls. The activity could stem from compromised administrator credentials or a malicious insider. Disabling the IP allow list exposes sensitive code repositories and GitHub Enterprise resources to access from any IP address, significantly increasing the attack surface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises credentials with administrative privileges within GitHub Enterprise.</li>
<li>The attacker authenticates to the GitHub Enterprise instance.</li>
<li>The attacker navigates to the organization or enterprise settings where IP allow lists are configured.</li>
<li>The attacker disables the IP allow list feature, removing restrictions on which IP addresses can access the GitHub Enterprise resources.</li>
<li>The attacker originates connections from previously unauthorized IP addresses.</li>
<li>The attacker accesses and potentially exfiltrates sensitive code repositories and data.</li>
<li>The attacker attempts to modify code, create backdoors, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling IP allow lists in GitHub Enterprise can lead to a significant security breach. Sensitive code repositories become exposed, potentially leading to intellectual property theft or the introduction of malicious code into the software supply chain. If successful, the organization&rsquo;s data and systems may be compromised, resulting in financial losses, reputational damage, and legal ramifications. The scope of the impact depends on the sensitivity of the data stored in the GitHub Enterprise instance and the extent to which the attacker can leverage the unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review the provided Sigma rule to detect instances of IP allow list disabling in GitHub Enterprise to quickly identify and respond to unauthorized changes.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>actor</code>, <code>actor_id</code>, and <code>user_agent</code> fields to determine the source and legitimacy of the action.</li>
<li>Implement multi-factor authentication (MFA) for all GitHub Enterprise accounts, especially those with administrative privileges, to prevent credential compromise.</li>
<li>Review GitHub Enterprise audit logs regularly for suspicious activity, including changes to security settings and access from unusual locations, using the configured log streaming to Splunk.</li>
<li>Enforce the principle of least privilege, granting users only the necessary permissions to perform their job functions, to limit the potential impact of a compromised account.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>cloud</category><category>ip-allow-list</category><category>bypass</category><category>security-control</category><category>anomaly</category></item></channel></rss>