<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Url-File — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/url-file/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 04 Jan 2024 17:49:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/url-file/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Downloaded URL Files Used in Phishing Campaigns</title><link>https://feed.craftedsignal.io/briefs/2024-01-downloaded-url-files/</link><pubDate>Thu, 04 Jan 2024 17:49:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-downloaded-url-files/</guid><description>This detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.</description><content:encoded><![CDATA[<p>Attackers commonly use .url shortcut files in phishing campaigns to deliver malicious payloads. These files, when downloaded from non-local sources, may bypass traditional security measures. This detection rule identifies such files by monitoring their creation events on Windows systems. The rule focuses on files with the .url extension and a zone identifier indicating they originated from outside the local network. These files are often delivered via email or malicious websites, tricking users into clicking them, which can lead to the execution of arbitrary commands or the redirection to malicious websites. This technique allows attackers to gain initial access or execute malicious code on the victim&rsquo;s machine.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a phishing email or a malicious website containing a link to a .url file.</li>
<li>The victim clicks the link, resulting in the download of the .url file to their Windows system.</li>
<li>The .url file is created on the filesystem, triggering a file creation event.</li>
<li>The operating system assigns a Zone Identifier to the file, marking it as originating from an external source.</li>
<li>The victim double-clicks the .url file, which contains a URL pointing to a malicious website or an executable.</li>
<li>The operating system attempts to open the URL using the default web browser or execute the embedded command.</li>
<li>If the URL points to a malicious website, the victim may be prompted to download and execute malware.</li>
<li>The malware executes, potentially leading to system compromise, data theft, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary commands, redirection to malicious websites, and subsequent malware infection. If successful, attackers can compromise user systems, steal sensitive information, or establish a foothold for further malicious activities within the organization&rsquo;s network. The impact can range from individual system compromise to broader network breaches, depending on the attacker&rsquo;s objectives and the extent of the infection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Downloaded URL Files Created</code> to your SIEM to detect the creation of downloaded .url files with a non-local Zone Identifier and tune for your environment.</li>
<li>Investigate any <code>file creation</code> events where <code>file.extension == &quot;url&quot;</code> and <code>file.Ext.windows.zone_identifier == 3</code> using the provided investigation steps in the advisory.</li>
<li>Update security policies and endpoint protection configurations to block the download and execution of .url files from untrusted sources, as mentioned in the advisory.</li>
<li>Educate users on safe downloading practices and the risks associated with opening .url files from untrusted sources, as highlighted in the advisory&rsquo;s false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>phishing</category><category>execution</category><category>url-file</category><category>windows</category></item></channel></rss>