<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spoofing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/spoofing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 09:09:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/spoofing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</link><pubDate>Fri, 24 Apr 2026 09:09:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</guid><description>Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been reported affecting Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps. Successful exploitation of these vulnerabilities could enable attackers to perform a variety of malicious actions, including escalating their privileges within the affected systems, executing arbitrary code to gain further control, and conducting spoofing attacks to deceive users or bypass security measures. The full details regarding specific vulnerability types and exploitation methods are currently unavailable, but the breadth of affected products indicates a potentially widespread impact across cloud-based Microsoft services. Defenders should prioritize monitoring for suspicious activity indicative of exploitation attempts targeting these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the advisory lacks specifics, we will describe a generalized attack chain based on the potential vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a target environment, possibly through compromised credentials or a separate vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability within one of the Microsoft cloud products (Azure, Microsoft 365 Copilot, Dynamics 365, or Power Apps) to elevate their privileges to a higher level, potentially gaining administrative rights.</li>
<li><strong>Code Injection:</strong> Leveraging the escalated privileges, the attacker injects malicious code into a vulnerable component of the cloud service.</li>
<li><strong>Code Execution:</strong> The injected code is executed, allowing the attacker to perform arbitrary actions within the context of the compromised service.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised service as a pivot point to move laterally within the cloud environment, targeting other resources and services.</li>
<li><strong>Data Exfiltration/Manipulation:</strong> Once established within the environment, the attacker exfiltrates sensitive data or manipulates data for malicious purposes.</li>
<li><strong>Spoofing Attacks:</strong> The attacker leverages the compromised environment to launch spoofing attacks, potentially targeting other users or systems with phishing emails or other deceptive tactics.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence within the cloud environment to maintain access even after the initial vulnerability is patched.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences, including unauthorized access to sensitive data, disruption of critical business processes, and financial losses. The number of potential victims is substantial, given the widespread use of Microsoft cloud services across various sectors. A successful attack could result in data breaches, service outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor logs from Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps for suspicious activity indicative of privilege escalation, code execution, and spoofing attacks.</li>
<li>Enable and review audit logs within the affected Microsoft cloud services to identify anomalous user behavior and potential security breaches.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your specific environment to detect potential exploitation attempts.</li>
<li>Follow Microsoft&rsquo;s official security advisories and apply any available patches or mitigations as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>privilege-escalation</category><category>code-execution</category><category>spoofing</category></item><item><title>Multiple Vulnerabilities in Microsoft Developer Tools</title><link>https://feed.craftedsignal.io/briefs/2026-04-ms-dev-tools-vulns/</link><pubDate>Tue, 21 Apr 2026 08:06:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ms-dev-tools-vulns/</guid><description>Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities has been identified affecting several Microsoft developer tools, including Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code. While the specific CVEs are not detailed in the initial report, successful exploitation of these vulnerabilities could allow an attacker to achieve several malicious outcomes. These include the disclosure of sensitive information, spoofing attacks to deceive users or systems, causing denial-of-service conditions that disrupt availability, and evading security measures to gain unauthorized access. The ultimate impact could be the execution of arbitrary code on a vulnerable system, granting the attacker significant control. The scope of affected systems is potentially broad, considering the widespread use of these development tools in various environments. Defenders should prioritize identifying and mitigating these vulnerabilities to prevent exploitation and maintain system integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of Microsoft Visual Studio, .NET Framework, .NET, PowerShell, or Visual Studio Code.</li>
<li>The attacker crafts a malicious input or exploit tailored to the specific vulnerability present in the targeted software.</li>
<li>The malicious input is delivered to the vulnerable application. This could involve opening a specially crafted project file in Visual Studio, executing a malicious PowerShell script, or triggering a vulnerability through a .NET application.</li>
<li>Exploitation of the vulnerability occurs, potentially leading to information disclosure, where sensitive data such as credentials or API keys are exposed.</li>
<li>Alternatively, the exploitation could enable a spoofing attack, where the attacker impersonates a legitimate user or service to gain unauthorized access.</li>
<li>The attacker could also trigger a denial-of-service condition, rendering the application or system unavailable to legitimate users.</li>
<li>If security measures are successfully bypassed, the attacker may gain the ability to execute arbitrary code on the affected system.</li>
<li>The attacker leverages arbitrary code execution to install malware, exfiltrate data, or further compromise the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of these vulnerabilities could lead to a range of damaging outcomes. Sensitive information disclosure could expose proprietary code, credentials, or customer data. Spoofing attacks could facilitate phishing campaigns or unauthorized access to critical systems. Denial-of-service attacks could disrupt business operations and impact user productivity. The most severe outcome, arbitrary code execution, could allow attackers to gain full control of affected systems, potentially leading to data breaches, ransomware deployment, or other malicious activities. Given the ubiquitous nature of the affected tools, a successful campaign could impact numerous organizations and individuals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process monitoring to detect suspicious command-line arguments used with PowerShell, as exploitation might involve malicious scripts (reference: process_creation log source, PowerShell detection rules).</li>
<li>Monitor for unexpected network connections originating from Visual Studio or .NET processes, which could indicate command and control activity after successful code execution (reference: network_connection log source, network connection detection rules).</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to critical system files or application binaries, as attackers might attempt to install backdoors or malware (reference: file_event log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>code-execution</category><category>spoofing</category><category>denial-of-service</category><category>information-disclosure</category><category>windows</category></item><item><title>CVE-2026-26149 Microsoft Power Apps Spoofing Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-02-powerapps-spoofing/</link><pubDate>Mon, 20 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-powerapps-spoofing/</guid><description>A spoofing vulnerability exists in Microsoft Power Apps, identified as CVE-2026-26149, potentially allowing an attacker to mislead users or gain unauthorized access.</description><content:encoded><![CDATA[<p>CVE-2026-26149 describes a spoofing vulnerability affecting Microsoft Power Apps. While the specifics of exploitation are not detailed in the initial advisory, successful exploitation could allow an attacker to craft deceptive Power Apps or manipulate existing ones to display misleading information, potentially leading to credential theft or other forms of social engineering. The vulnerability&rsquo;s impact is contingent on user interaction, as a user must be tricked into interacting with the spoofed application. Defenders should prioritize understanding the attack vectors and potential impact within their specific Power Apps implementations. Further investigation is needed to fully understand the scope of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Microsoft Power App deployment.</li>
<li>Attacker crafts a malicious Power App or modifies an existing one to include spoofed content.</li>
<li>Attacker distributes the link to the malicious Power App to a target user, possibly via phishing.</li>
<li>Target user, believing the app is legitimate, interacts with the spoofed elements within the Power App.</li>
<li>The spoofed content prompts the user for sensitive information, such as credentials or personal data.</li>
<li>The user enters their information, unknowingly sending it to the attacker.</li>
<li>The attacker uses the stolen information to gain unauthorized access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26149 could lead to credential theft, data breaches, or unauthorized access to sensitive resources within an organization using Microsoft Power Apps. The scope of the impact depends on the permissions and data accessible by the compromised user. While the exact number of potential victims is unknown, any organization relying on Power Apps is potentially vulnerable. The spoofing could be used in conjunction with other attacks, such as phishing campaigns, to further amplify the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Power Apps usage for suspicious activity, such as access from unusual locations or attempts to modify app configurations.</li>
<li>Implement multi-factor authentication (MFA) to mitigate the risk of credential theft.</li>
<li>Educate users on how to identify and avoid phishing attacks targeting Power Apps.</li>
<li>Continuously monitor Microsoft&rsquo;s security update guide for further information regarding CVE-2026-26149.</li>
<li>Deploy the Sigma rule for detecting suspicious Power Apps activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>CVE-2026-26149</category><category>powerapps</category><category>spoofing</category></item><item><title>Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rdp-spoofing/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rdp-spoofing/</guid><description>CVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.</description><content:encoded><![CDATA[<p>CVE-2026-26151 is a security vulnerability affecting Windows Remote Desktop (RDP). The vulnerability stems from an insufficient UI warning mechanism when dangerous operations are about to be performed within an RDP session. An attacker could potentially exploit this to spoof legitimate actions or elements within the RDP interface, misleading the user into performing unintended actions. This vulnerability could be exploited by an attacker positioned on the same network as the victim, or through other means of network access. Successful exploitation could lead to information disclosure, unauthorized access, or other forms of compromise, depending on the specific actions spoofed. The vulnerability has a CVSS v3.1 score of 7.1, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains network access to a system that has an active RDP connection or will have an RDP connection in the future.</li>
<li>The attacker leverages their network position to intercept and manipulate RDP traffic.</li>
<li>The attacker exploits CVE-2026-26151 to inject spoofed UI elements into the RDP session.</li>
<li>The victim, unaware of the spoofed UI, interacts with the malicious elements.</li>
<li>The attacker uses the spoofed UI to trick the user into performing unintended actions, such as providing credentials or running malicious commands.</li>
<li>If credentials were stolen the attacker authenticates using the stolen credentials.</li>
<li>The attacker pivots to other systems on the internal network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, deploying ransomware, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26151 could allow an attacker to perform spoofing attacks via manipulated UI elements within the Remote Desktop session. This could lead to unauthorized access to sensitive information, credential theft, or the execution of arbitrary commands on the remote system. Depending on the compromised system&rsquo;s role and privileges, this could potentially lead to wider compromise within the organization&rsquo;s network. The impact can range from data breaches to system downtime and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-26151 as detailed in <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious RDP Clipbard Activity&rdquo; to detect potential data exfiltration attempts via the clipboard during RDP sessions.</li>
<li>Monitor network traffic for anomalies associated with RDP connections, such as unexpected data transfers or connections from unusual source IPs, to complement the remediation of CVE-2026-26151.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-26151</category><category>rdp</category><category>spoofing</category><category>windows</category></item><item><title>.NET Spoofing Vulnerability (CVE-2026-32178)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dotnet-spoofing/</link><pubDate>Tue, 14 Apr 2026 18:17:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dotnet-spoofing/</guid><description>CVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.</description><content:encoded><![CDATA[<p>CVE-2026-32178 is a security vulnerability affecting .NET applications. This vulnerability stems from the improper neutralization of special elements, which can be exploited by an unauthorized attacker to perform spoofing attacks over a network. Successful exploitation of this vulnerability could allow an attacker to impersonate trusted entities or services, potentially leading to unauthorized access, data manipulation, or other malicious activities. The vulnerability was published on April 14, 2026. Given the widespread use of .NET in various applications and services, this vulnerability poses a significant risk to organizations utilizing affected .NET versions. Defenders need to implement appropriate mitigation strategies to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable .NET application that processes network-based input.</li>
<li>The attacker crafts a malicious network request containing special elements designed to exploit the improper neutralization vulnerability (CVE-2026-32178).</li>
<li>The vulnerable .NET application processes the malicious request without properly neutralizing the special elements.</li>
<li>Due to the lack of proper neutralization, the application misinterprets the special elements in the request.</li>
<li>The application performs actions based on the misinterpreted data, such as modifying data or granting unauthorized access.</li>
<li>The attacker leverages the spoofed identity or altered data to further compromise the system or network.</li>
<li>The attacker gains unauthorized access to sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32178 could allow an attacker to perform network spoofing, potentially impacting confidentiality, integrity, and availability of affected systems. While the specific number of victims is unknown, the widespread use of .NET increases the potential for broad impact across various sectors. Consequences can range from data breaches and financial loss to reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-32178 as referenced in <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32178</a>.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect potential exploitation attempts targeting .NET applications.</li>
<li>Monitor network traffic for suspicious patterns indicative of spoofing attacks, focusing on traffic to and from .NET applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dotnet</category><category>spoofing</category><category>cve-2026-32178</category></item><item><title>Potential Kerberos Coercion via DNS-Based SPN Spoofing</title><link>https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kerberos-coercion-dns/</guid><description>Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.</description><content:encoded><![CDATA[<p>This detection identifies potential Kerberos coercion attempts via DNS-based SPN spoofing on Windows systems. The technique abuses MicrosoftDNS records, specifically looking for directory-service access or creation events (event codes 4662 and 5137) involving a MicrosoftDNS record that contains a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, a known indicator of DNS-based SPN spoofing used in Kerberos coercion tradecraft. The goal is to detect adversaries coercing victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services. This activity is typically observed within Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to a system with privileges to modify DNS records in Active Directory.</li>
<li>The attacker creates a new MicrosoftDNS record or modifies an existing one.</li>
<li>Within the DNS record, specifically in the <code>AdditionalInfo</code> or <code>ObjectDN</code> attributes, the attacker inserts a base64-encoded blob matching the pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo;. This blob contains a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The attacker configures the DNS record to point to an attacker-controlled host. This involves manipulating the record&rsquo;s name and associated IP address.</li>
<li>The attacker triggers a victim system to resolve the manipulated DNS record, causing the victim to attempt Kerberos authentication with the attacker-controlled host, believing it to be a legitimate service.</li>
<li>The attacker intercepts the Kerberos authentication request.</li>
<li>The attacker relays the Kerberos ticket to a legitimate service, impersonating the victim system.</li>
<li>The attacker gains unauthorized access to the legitimate service using the relayed Kerberos ticket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Kerberos coercion can grant attackers unauthorized access to critical systems and services within the Active Directory domain. This may lead to privilege escalation, lateral movement, data exfiltration, and other malicious activities. The scope of impact depends on the permissions and access rights of the coerced victim system and the targeted services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Access&rdquo; and &ldquo;Audit Directory Service Changes&rdquo; Windows audit policies to ensure relevant events are logged (Setup section).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential Kerberos coercion attempts via DNS-based SPN spoofing. Tune the rules based on your environment and known legitimate activity.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the associated user accounts, systems, and modified DNS records (rule titles).</li>
<li>Restrict access to modify DNS records in Active Directory to only authorized personnel and systems to prevent unauthorized manipulation (Overview section).</li>
<li>Monitor Windows Security authentication events for any suspicious Kerberos activity following the modification of DNS records (Attack Chain steps 5-8).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kerberos</category><category>coercion</category><category>dns</category><category>spn</category><category>spoofing</category><category>credential-access</category></item></channel></rss>