<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vulnerability-Exploitation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/vulnerability-exploitation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 13:51:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/vulnerability-exploitation/feed.xml" rel="self" type="application/rss+xml"/><item><title>State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)</title><link>https://feed.craftedsignal.io/briefs/2026-04-state-sponsored-access/</link><pubDate>Tue, 14 Apr 2026 13:51:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-state-sponsored-access/</guid><description>In 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.</description><content:encoded><![CDATA[<p>In 2025, state-sponsored threat actors from China, Russia, North Korea, and Iran exhibited distinct motivations, ranging from espionage and disruption to financial gain and geopolitical influence. Despite these varying objectives, these actors employed similar tactics, techniques, and procedures (TTPs), particularly regarding initial access and persistence. A common thread was the exploitation of both newly disclosed (e.g., ToolShell by China) and long-standing vulnerabilities in networking devices and widely used software. Identity-based attacks, including social engineering and the use of stolen credentials, were also prominent. North Korea notably stole $1.5 billion in cryptocurrency and generated billions through fraudulent IT work using AI-generated profiles. Iranian actors combined disruptive hacktivism with advanced persistent threat (APT) activity, such as the ShroudedSnooper group targeting telecommunications for long-term access. The focus across these actors was on establishing a persistent presence within compromised networks, often remaining undetected for extended periods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Vulnerability Exploitation (Initial Access):</strong> Actors exploit vulnerabilities in networking devices and widely used software, leveraging both newly disclosed and unpatched flaws.</li>
<li><strong>Social Engineering (Initial Access):</strong> North Korean actors use fake recruiter personas via campaigns like Contagious Interview to trick targets into executing code or handing over credentials.</li>
<li><strong>Credential Harvesting (Privilege Escalation/Persistence):</strong> After initial access, actors harvest credentials to gain further access within the network.</li>
<li><strong>Web Shell Deployment (Persistence):</strong> Chinese actors deploy web shells for persistent access to compromised systems.</li>
<li><strong>Custom Backdoor Installation (Persistence):</strong> Backdoors, including compact custom backdoors like those used by ShroudedSnooper, are deployed to maintain long-term access.</li>
<li><strong>Tunneling (Command &amp; Control):</strong> Actors use tunneling tools to maintain covert communication channels with compromised systems.</li>
<li><strong>Data Exfiltration (Exfiltration):</strong> Actors exfiltrate sensitive data, including espionage-related information or financial data such as cryptocurrency.</li>
<li><strong>Disruption/Espionage (Impact):</strong> Depending on the actor and objective, the final stage involves disruptive activities like DDoS attacks or long-term espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed state-sponsored activity resulted in significant financial losses, espionage, and disruptive attacks. North Korean actors stole $1.5 billion in cryptocurrency and generated billions in revenue through fraudulent IT work, impacting financial institutions and various Fortune 500 companies. Iranian hacktivist operations caused disruption through DDoS attacks and defacements. Espionage campaigns targeted sectors such as telecommunications, potentially compromising sensitive communications and intellectual property. The persistent nature of these attacks allows for long-term monitoring and potential future exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Prioritize patching of both newly disclosed and long-standing vulnerabilities in networking devices and software to mitigate initial access (Reference: Overview, Attack Chain Step 1).</li>
<li>Implement robust identity and access management controls, including multi-factor authentication and monitoring for suspicious login activity, to counter social engineering and credential-based attacks (Reference: Attack Chain Step 2 &amp; 3).</li>
<li>Increase visibility into network and edge infrastructure by enabling comprehensive logging and monitoring to detect unauthorized access and persistence mechanisms (Reference: Attack Chain Steps 4, 5, &amp; 6).</li>
<li>Deploy the Sigma rules below to detect suspicious web shell activity and backdoor installations (Reference: Rules).</li>
<li>Monitor network traffic for unusual patterns and connections indicative of tunneling or data exfiltration (Reference: Attack Chain Steps 6 &amp; 7).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>state-sponsored</category><category>apt</category><category>persistence</category><category>vulnerability-exploitation</category></item><item><title>Multiple Network Intrusion Attempts Detected</title><link>https://feed.craftedsignal.io/briefs/2026-03-network-intrusion-attempts/</link><pubDate>Sat, 14 Mar 2026 23:06:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-network-intrusion-attempts/</guid><description>Multiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.</description><content:encoded><![CDATA[<p>On 2026-03-14, network intrusion detection systems (IDS) identified multiple suspicious activities originating from various IP addresses. These activities included attempts to access PHP information pages, exploit the Fortigate VPN vulnerability CVE-2023-27997, request hidden environment files, probe for SFTP/FTP password exposure, request Visual Studio Code sftp configuration files, and use a suspicious user agent string. While the specific actor remains unknown, the breadth of probes suggests a broad scanning approach, potentially preceding more targeted attacks. The activity is concerning due to the potential for information disclosure, unauthorized access, and credential compromise. Defenders should investigate the affected systems for signs of further compromise and implement appropriate mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Probing (Discovery):</strong> The attacker scans the network, sending HTTP GET requests to common web server locations to identify potentially vulnerable systems. For example, the attacker probes for phpinfo pages.</li>
<li><strong>Targeted Vulnerability Scan:</strong> After identifying potential targets, the attacker attempts to exploit specific vulnerabilities, such as CVE-2023-27997 on Fortigate VPN servers, by sending repeated GET requests to <code>/remote/logincheck</code>.</li>
<li><strong>Sensitive File Discovery:</strong> The attacker probes for sensitive files by sending HTTP GET requests to discover hidden environment files (e.g., <code>.env</code>) using various techniques.</li>
<li><strong>SFTP/FTP Credential Exposure:</strong> The attacker attempts to discover SFTP/FTP password exposure by scanning for <code>sftp-config.json</code> files.</li>
<li><strong>Information Leakage Attempts:</strong> The attacker sends HTTP GET requests specifically targeting the <code>sftp.json</code> file used by Visual Studio Code, potentially revealing sensitive configuration information.</li>
<li><strong>User Agent Obfuscation:</strong> The attacker uses a suspicious User-Agent string <code>_TEST_</code> to potentially mask their activity or test for detection capabilities.</li>
<li><strong>Possible Further Exploitation:</strong> If any of the above steps are successful, the attacker might attempt to gain unauthorized access, escalate privileges, or exfiltrate sensitive data, depending on the specific vulnerability or information obtained.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed activity poses a significant risk. Successful exploitation of CVE-2023-27997 could allow unauthorized VPN access. Exposure of environment files could reveal sensitive credentials and configuration details, potentially leading to account takeovers and data breaches. Discovery of SFTP/FTP credentials stored in <code>sftp-config.json</code> would enable unauthorized file access and modification. The overall impact could range from data leakage to complete system compromise, depending on the attacker&rsquo;s objectives and the success of their initial probing attempts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Fortigate CVE-2023-27997 Exploitation Attempts</code> to identify and alert on exploitation attempts targeting this specific vulnerability (Sigma rule).</li>
<li>Block the IP addresses listed in the IOC table at the network perimeter to prevent further reconnaissance and exploitation attempts (IOC table).</li>
<li>Deploy the Sigma rule <code>Detect Requests to Hidden Environment Files</code> to identify attempts to access sensitive configuration files (Sigma rule).</li>
<li>Monitor network traffic for suspicious User-Agent strings, particularly those containing &ldquo;<em>TEST</em>&rdquo; to detect potentially malicious activity (IOC table).</li>
<li>Investigate any systems that have received requests for <code>phpinfo</code> pages, <code>sftp-config.json</code>, or hidden environment files for signs of compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network-intrusion</category><category>vulnerability-exploitation</category><category>information-disclosure</category></item><item><title>KRVTZ-NET IDS Alerts Analysis: Network Scanning and Exploitation Attempts</title><link>https://feed.craftedsignal.io/briefs/2026-03-krvtz-net-ids-alerts/</link><pubDate>Fri, 13 Mar 2026 20:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-krvtz-net-ids-alerts/</guid><description>Multiple IDS alerts indicate potential network reconnaissance, vulnerability exploitation attempts targeting Fortigate VPN (CVE-2023-27997), and ColdFusion servers originating from various IP addresses on March 13, 2026.</description><content:encoded>&lt;p>On March 13, 2026, KRVTZ-NET IDS systems generated a series of alerts indicative of network scanning and attempted exploitation. The alerts highlight suspicious activity originating from a range of IP addresses, suggesting a widespread campaign rather than a targeted attack from a single actor. Specific alerts include repeated GET requests to &lt;code>/remote/logincheck&lt;/code>, potentially targeting the Fortigate VPN vulnerability CVE-2023-27997, as well as requests for hidden environment files and attempts…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>network-scanning</category><category>vulnerability-exploitation</category><category>fortigate</category><category>coldfusion</category><category>cve-2023-27997</category></item></channel></rss>