<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Acronis — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/acronis/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 08:41:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/acronis/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malware Distribution via Hugging Face and ClawHub</title><link>https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</link><pubDate>Fri, 01 May 2026 08:41:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-huggingface-clawhub-malware/</guid><description>Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.</description><content:encoded><![CDATA[<p>Threat actors are leveraging AI distribution platforms like Hugging Face and ClawHub to distribute malware. This involves social engineering tactics to deceive users into downloading files that contain malicious code. Instead of directly compromising AI agents, the attackers abuse user trust by injecting indirect prompts into resources that the AI accesses. Acronis reported that on ClawHub, nearly 600 malicious skills across 13 developer accounts were identified distributing trojans, cryptominers, and information stealers targeting both Windows and macOS. On Hugging Face, attackers created repositories hosting malicious files designed to stage multi-step infection chains leading to infostealers, trojans, malware loaders, and other types of malware targeting Windows, Linux, and Android. This tactic allows attackers to bypass traditional security measures and leverage the platforms&rsquo; reputation for trusted AI tooling.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious repository or skill on Hugging Face or ClawHub.</li>
<li>The repository or skill contains files that appear legitimate but include malicious code.</li>
<li>The attacker uses social engineering to entice users to download the files.</li>
<li>Upon execution, the malicious code fetches additional payloads from external sources.</li>
<li>For macOS, the payload can be Atomic macOS Stealer (AMOS) Stealer.</li>
<li>The downloaded payload executes commands to install hidden dependencies.</li>
<li>The malware establishes persistence on the victim&rsquo;s system.</li>
<li>The malware performs its intended malicious actions, such as stealing information or mining cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to the installation of various types of malware, including infostealers, trojans, cryptominers, and malware loaders. The targeted platforms include Windows, macOS, Linux, and Android, potentially impacting a wide range of users and systems. The abuse of trust in AI distribution platforms poses a significant risk, as users may be less likely to scrutinize files from these sources. Acronis identified close to 600 malicious skills on ClawHub alone, indicating the scale of this threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of downloaded files from Hugging Face or ClawHub with unusual parent processes using the &ldquo;Detect Suspicious Process Execution from AI Platforms&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect connections to known malicious domains or IPs associated with malware distribution campaigns that originate from processes associated with AI platform tooling.</li>
<li>Educate users about the risks of downloading files from untrusted sources, even on trusted platforms like Hugging Face and ClawHub.</li>
<li>Regularly scan systems for known malware signatures and indicators of compromise associated with infostealers and trojans.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>malware</category><category>social-engineering</category><category>ai-platforms</category></item><item><title>Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-acronis-privesc/</link><pubDate>Thu, 30 Apr 2026 10:19:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acronis-privesc/</guid><description>Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within the Acronis Cyber Protect Cloud Agent that could allow an authenticated attacker, either locally or remotely, to escalate their privileges. The vulnerabilities are within the core functionality of the Acronis agent, and successful exploitation could lead to elevated access within the target system. The advisory does not specify the exact nature of the vulnerabilities, but the potential impact of privilege escalation is significant for defenders, as it allows attackers to perform actions they would normally be restricted from doing, such as installing software, modifying data, and accessing sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with a valid, but low-privileged, account. This could be achieved through phishing, compromised credentials, or other means.</li>
<li>The attacker identifies a vulnerable version of the Acronis Cyber Protect Cloud Agent running on the system.</li>
<li>The attacker leverages one of the unspecified vulnerabilities within the Acronis agent through local interaction with the Acronis agent service.</li>
<li>Successful exploitation of the vulnerability allows the attacker to bypass access controls and execute code with elevated privileges.</li>
<li>The attacker uses their newly acquired privileges to install malicious software, such as a keylogger or remote access trojan.</li>
<li>The attacker uses their privileges to access sensitive data, such as user credentials, financial records, or intellectual property.</li>
<li>The attacker establishes persistence on the system by creating a new privileged account or modifying existing system configurations.</li>
<li>The attacker uses the compromised system as a pivot point to further compromise other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow attackers to gain complete control over affected systems. The number of potential victims is widespread, as Acronis Cyber Protect Cloud Agent is used by numerous organizations for data protection and backup purposes. If an attacker successfully escalates privileges, they can steal sensitive data, install malware, disrupt critical services, and compromise the entire network. The consequences could include significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious processes spawned by the Acronis Cyber Protect Cloud Agent that do not align with normal activity.</li>
<li>Implement the Sigma rule <code>SuspiciousAcronisChildProcess</code> to detect unusual child processes spawned by the Acronis agent.</li>
<li>Investigate any unauthorized modifications to system configurations or user accounts, particularly those performed by the Acronis Cyber Protect Cloud Agent using the <code>RegistryModificationByAcronis</code> Sigma rule.</li>
<li>Apply the latest patches and updates to Acronis Cyber Protect Cloud Agent as soon as they become available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>acronis</category><category>agent</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item></channel></rss>