<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Github — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/github/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:24:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/github/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pelican Web UI Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pelican-privesc/</link><pubDate>Mon, 04 May 2026 21:24:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pelican-privesc/</guid><description>A privilege escalation vulnerability in Pelican WebUI versions v7.21 to v7.24 allows authenticated users to gain admin privileges by manipulating database records, potentially leading to configuration modification, API token creation, and password changes.</description><content:encoded><![CDATA[<p>On April 2nd, 2026, a privilege escalation vulnerability was identified in the Pelican Web User Interface (WebUI) affecting versions v7.21 to v7.24. This vulnerability allows any authenticated user via OAuth to gain admin privileges under specific configurations, including servers with <code>Server.UIAdminUsers</code> where listed users haven&rsquo;t logged in or <code>Server.AdminGroups</code> with <code>Issuer.GroupSource</code> set to <code>internal</code> where an admin hasn&rsquo;t logged in. Successful exploitation permits attackers to modify server configurations, create API tokens, and change admin passwords. The OSDF operations team mitigated this vulnerability for core services, but mitigation may be required for other caches and origins. There is currently no evidence this attack has been exploited in services managed by OSDF operators.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the Pelican WebUI by authenticating via OIDC.</li>
<li>The attacker identifies a valid <code>Server.UIAdminUsers</code> username or <code>Server.AdminGroups</code> group name for an admin who has not yet logged into the WebUI.</li>
<li>The attacker crafts malicious database records designed to grant admin privileges upon subsequent login.</li>
<li>The attacker injects these records into the Pelican server&rsquo;s SQLite database, potentially using API endpoints or other methods to interact with the database.</li>
<li>The attacker logs out of the WebUI.</li>
<li>The attacker logs back into the WebUI.</li>
<li>The server grants the attacker admin privileges based on the manipulated database records.</li>
<li>The attacker modifies server configurations, creates persistent API tokens, or changes admin passwords.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of this vulnerability poses a significant risk to Pelican servers and the wider federation they support. A compromised Director service could have high federation-wide impact, enabling denial of service and redirection to malicious registries. Registry services also have high federation-wide impact, with attackers potentially poisoning namespaces. Compromised Origins could lead to high data exposure and tampering risks by enabling unauthorized writes and changing export paths. Caches present a medium data exposure risk, as attackers could expose cached protected data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Run the provided mitigation script (<code>mitigate-user-escalation.sh</code> from <a href="https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9">https://gist.github.com/jhiemstrawisc/8c4b2b3ec5cb2ca06537d9439dc16cc9</a>) to audit the database for signs of exploitation and block further exploitation.</li>
<li>Upgrade Pelican servers to a patched release (&gt;=v7.21.5, &gt;=v7.22.3, &gt;=v7.23.3, &gt;=v7.24.2).</li>
<li>If unable to upgrade immediately, disable the vulnerable configuration by commenting out <code>UIAdminUsers</code> and <code>AdminGroups</code> settings in the <code>pelican.yaml</code> configuration file.</li>
<li>Monitor process executions for the <code>mitigate-user-escalation.sh</code> script and review associated user and API token changes. Deploy the provided Sigma rule to detect potential malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>webui</category><category>pelican</category></item><item><title>Gotenberg ExifTool Tag Blocklist Bypass via Group-Prefixed Tag Names</title><link>https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</link><pubDate>Mon, 04 May 2026 19:21:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gotenberg-exiftool-bypass/</guid><description>Gotenberg is vulnerable to an ExifTool tag blocklist bypass, allowing unauthenticated attackers to rename, move, and modify permissions of files within the container by using group-prefixed tag names like 'System:FileName' or the 'FilePermissions' tag in HTTP requests.</description><content:encoded><![CDATA[<p>Gotenberg, a Docker-based server for document conversion, is susceptible to a critical vulnerability (CVE-2026-40893) that bypasses its intended security measures. Specifically, a blocklist designed to prevent arbitrary file renaming and moving via ExifTool is circumvented by using group-prefixed tag names such as <code>System:FileName</code>. This vulnerability, affecting Gotenberg version 8.30.1 and earlier, allows unauthenticated attackers to manipulate files within the container by sending crafted HTTP requests. The bypass allows for renaming files, moving files to arbitrary directories, and changing file permissions, potentially leading to service disruption or, in shared-volume deployments, impacting other services utilizing the same volumes. This vulnerability effectively negates the patch provided in GHSA-qmwh-9m9c-h36m.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Gotenberg instance (version 8.30.1 or earlier) exposed via HTTP.</li>
<li>The attacker crafts a POST request to any Gotenberg endpoint that accepts the <code>metadata</code> field, such as <code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, or <code>/forms/libreoffice/convert</code>.</li>
<li>The request includes a <code>files</code> parameter with a PDF file (or any other supported file type).</li>
<li>The request includes a <code>metadata</code> parameter, a JSON object containing malicious ExifTool tag names such as <code>System:FileName</code> and <code>System:Directory</code>.</li>
<li>Gotenberg&rsquo;s <code>exiftool.go</code> validates the tag names against a blocklist but fails to normalize group prefixes, allowing <code>System:FileName</code> to bypass the check that would block <code>FileName</code>.</li>
<li>ExifTool receives the <code>System:FileName</code> and <code>System:Directory</code> tags and interprets them as <code>FileName</code> and <code>Directory</code>, respectively.</li>
<li>ExifTool renames and moves the uploaded file to the attacker-specified location within the container&rsquo;s file system.</li>
<li>If Gotenberg attempts to access the file after it has been moved, the server returns a 404 error, potentially disrupting service for other users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-40893) allows an unauthenticated attacker to manipulate files within the Gotenberg container. This includes the ability to rename files, move them to arbitrary directories, and change their permissions. This can lead to denial-of-service conditions due to missing files, or in scenarios where Gotenberg shares a Docker volume with other services, it allows for planting malicious files in those shared directories. Since no authentication is required by default, any system capable of sending HTTP requests to the Gotenberg instance can exploit this vulnerability, widening the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Gotenberg greater than 8.30.1 to remediate CVE-2026-40893.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg ExifTool Tag Blocklist Bypass</code> to identify exploitation attempts based on the use of <code>System:</code> prefixed ExifTool tags.</li>
<li>Deploy the Sigma rule <code>Detect Gotenberg FilePermissions Tag Abuse</code> to detect abuse of the <code>FilePermissions</code> tag.</li>
<li>Monitor webserver logs for POST requests to the affected Gotenberg endpoints (<code>/forms/pdfengines/metadata/write</code>, <code>/forms/chromium/convert/html</code>, <code>/forms/libreoffice/convert</code>) containing the string <code>System:FileName</code> or <code>FilePermissions</code> in the request body.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exiftool</category><category>file-manipulation</category><category>cve-2026-40893</category></item><item><title>Detection of VScode Remote Tunneling for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</guid><description>The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the misuse of Visual Studio Code&rsquo;s (VScode) remote tunnel feature to establish unauthorized access or control over systems. While the VScode remote tunnel feature is designed to allow developers to connect to remote environments seamlessly, attackers can abuse this functionality for malicious purposes. The rule specifically looks for the execution of the VScode portable binary with the &ldquo;tunnel&rdquo; command-line option, which is indicative of an attempt to establish a remote tunnel session to either GitHub or a remote VScode instance. Successful exploitation can lead to command and control capabilities, allowing attackers to remotely manage and compromise the affected system. The rule aims to detect this suspicious behavior by monitoring process execution and command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker downloads a portable version of Visual Studio Code (VScode) onto the compromised system.</li>
<li>The attacker executes the VScode binary with the <code>tunnel</code> command-line argument to initiate a remote tunnel session.</li>
<li>The attacker specifies additional arguments such as <code>--accept-server-license-terms</code> to bypass license agreement prompts.</li>
<li>The VScode tunnel attempts to establish a connection to a remote server, potentially a GitHub repository or a remote VScode instance controlled by the attacker.</li>
<li>If successful, the tunnel creates a persistent connection, allowing the attacker to execute commands and transfer files.</li>
<li>The attacker uses the established tunnel to remotely access the compromised system, enabling them to perform malicious activities such as data exfiltration or lateral movement.</li>
<li>The attacker maintains persistent access through the established tunnel, allowing for long-term command and control of the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent command and control channel, enabling them to remotely manage the compromised system. This can lead to data theft, deployment of ransomware, or further lateral movement within the network. While the number of potential victims and specific sectors targeted are not explicitly stated, the widespread use of VScode makes a wide range of organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Attempt to Establish VScode Remote Tunnel&rdquo; rule to detect suspicious VScode tunnel activity in your environment.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data.</li>
<li>Investigate any alerts triggered by the rule, focusing on the command-line arguments and process behaviors to confirm malicious intent.</li>
<li>Monitor network connections originating from VScode processes for unusual or unauthorized connections to external servers.</li>
<li>Review and whitelist legitimate uses of VScode&rsquo;s tunnel feature by authorized developers to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>vscode</category><category>remote-access-tools</category><category>windows</category></item><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</link><pubDate>Fri, 01 May 2026 00:45:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</guid><description>Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.</description><content:encoded><![CDATA[<p>On April 30, 2026, two malicious versions (2.6.2 and 2.6.3) of the widely used <code>pytorch-lightning</code> package were published to the PyPI registry after the publisher account was compromised. These versions contain embedded malicious code designed to steal developer credentials and republish infected versions of repositories to which the stolen tokens have access. The attack is triggered upon importing the package, initiating a background process that silently harvests credentials from a wide array of services, including AWS, Azure, Google Cloud, and GitHub, as well as local environment variables and credential files. Version 2.6.3 was published just 13 minutes after 2.6.2, and was intended to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the publisher account for the <code>pytorch-lightning</code> package on PyPI.</li>
<li>Attacker publishes malicious versions 2.6.2 and 2.6.3 to PyPI.</li>
<li>A modified <code>__init__.py</code> file within the package initiates a background process upon import.</li>
<li>The background process executes silently, without any visible output or indication of compromise to the user.</li>
<li>The malicious package downloads a runtime (Bun) from GitHub.</li>
<li>The package executes a large, obfuscated JavaScript file, targeting AWS, Azure, Google Cloud, GitHub, and local credential stores.</li>
<li>Stolen credentials, including cloud provider keys, API tokens, and secrets, are exfiltrated to attacker-controlled infrastructure.</li>
<li>The malware attempts to download and execute a second-stage payload from attacker-controlled infrastructure, expanding the scope of the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations that downloaded and used versions 2.6.2 or 2.6.3 of the <code>pytorch-lightning</code> package are at high risk of compromise. The malicious package is designed to steal a wide range of credentials, including cloud provider keys, API tokens, and secrets stored in environment variables. This can lead to unauthorized access to sensitive data and systems, potentially resulting in data breaches, financial losses, and reputational damage. The malware&rsquo;s ability to download and execute secondary payloads further increases the potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove versions 2.6.2 and 2.6.3 of the <code>lightning</code> package from all systems where they are installed (see overview).</li>
<li>Audit systems for unauthorized processes and review outbound network connections to detect potential compromises (see overview).</li>
<li>Rotate all cloud provider keys (AWS, Azure, GCP), API tokens (GitHub, CI/CD systems), and secrets stored in environment variables to prevent further unauthorized access (see Attack Chain).</li>
<li>Implement the <code>Detect Suspicious PyPI Package Installation</code> Sigma rule to identify potential malicious packages being installed in the future (see rules).</li>
<li>Implement the <code>Detect Credential Harvesting via Bun</code> Sigma rule to catch execution of the malicious JavaScript payload (see rules).</li>
<li>Pin dependencies to known-good versions and verify package integrity before use to prevent future supply chain attacks (see references).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>malware</category></item><item><title>Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages</title><link>https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</link><pubDate>Thu, 30 Apr 2026 14:27:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</guid><description>The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.</description><content:encoded><![CDATA[<p>The Mini Shai-Hulud campaign, active as of April 2026, targets SAP NPM packages used in the SAP Cloud Application Programming (CAP) ecosystem and SAP cloud deployment workflows. Four package versions were compromised: <code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, and <code>@cap-js/sqlite 2.2.2</code>. These packages, with over 500,000 combined weekly downloads, are essential for SAP&rsquo;s Cloud MTA Build Tool and database services for CAP software. The attackers injected a preinstall script that fetches and executes a Bun binary, bypassing security monitoring. The malicious versions were available for a short window of 2-4 hours before being unpublished and superseded by clean versions. Wiz attributes this activity to TeamPCP due to a shared RSA public key used to encrypt the exfiltrated secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises an NPM token, possibly exposed through CircleCI.</li>
<li>The attacker injects a malicious <code>preinstall</code> script into the targeted SAP NPM packages (<code>mbt</code>, <code>@cap-js/db-service</code>, <code>@cap-js/postgres</code>, <code>@cap-js/sqlite</code>).</li>
<li>When a user installs the compromised package, the <code>preinstall</code> script executes.</li>
<li>The script fetches a Bun ZIP archive from a GitHub repository.</li>
<li>The script extracts the Bun archive and executes the included Bun binary.</li>
<li>The Bun binary steals local credentials, GitHub and NPM tokens, AWS, Azure, GCP, GitHub Action, and Kubernetes secrets.</li>
<li>The stolen data is exfiltrated to public GitHub repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>The malware propagates by modifying package tarballs, updating versions, repackaging them, and publishing them using stolen GitHub Actions tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mini Shai-Hulud attack poses a significant threat to developers and organizations using SAP CAP, a framework for S/4HANA extensions, Fiori app backends, MTAs, and integration flows. With over 500,000 weekly downloads of the affected packages, a large number of systems could have been affected. Successful exploitation allows attackers to steal sensitive credentials and cloud secrets, potentially leading to unauthorized access to critical SAP systems, cloud infrastructure, and source code repositories. This access could be used for further malicious activities, including data breaches, financial fraud, and supply chain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Organizations using SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should immediately check if they installed the malicious package versions (<code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, <code>@cap-js/sqlite 2.2.2</code>) during the exposure window.</li>
<li>Implement network monitoring rules to detect connections to unusual GitHub repositories created to host stolen data. Monitor for repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>Monitor process execution for the execution of <code>bun</code> binaries in unusual or unexpected locations to identify systems where compromised packages were installed. Deploy the Sigma rule <code>Detect Bun Execution From NPM Package</code> to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>npm</category><category>sap</category><category>credential-theft</category></item><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item><item><title>Detection of Github Delete Actions in Audit Logs</title><link>https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</link><pubDate>Tue, 28 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-github-delete-action/</guid><description>This brief focuses on detecting deletion actions within GitHub audit logs, specifically targeting the deletion of codespaces, environments, projects, and repositories, potentially indicating malicious activity or insider threats.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying potentially malicious or unauthorized deletion activities within a GitHub organization. The detections hinge on monitoring GitHub audit logs for specific actions related to the deletion of critical resources. This includes actions such as deleting codespaces (<code>codespaces.destroy</code>), deleting environments (<code>environment.delete</code>), deleting projects (<code>project.delete</code>), and destroying repositories (<code>repo.destroy</code>). This activity is important for defenders because these actions can lead to data loss, service disruption, or compromise of the software development lifecycle. The detections are triggered by events recorded within the GitHub audit log, requiring audit log streaming to be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains unauthorized access to a GitHub account with sufficient privileges. This could be achieved through compromised credentials or insider access.</li>
<li><strong>Privilege Escalation (Optional):</strong> The attacker escalates privileges within the GitHub organization to gain the necessary permissions to delete resources if they don&rsquo;t already have them.</li>
<li><strong>Reconnaissance:</strong> The attacker identifies valuable codespaces, environments, projects, or repositories within the GitHub organization that they intend to delete.</li>
<li><strong>Deletion of Codespaces:</strong> The attacker executes the <code>codespaces.destroy</code> action, deleting a specific codespace instance, potentially disrupting development workflows.</li>
<li><strong>Deletion of Environments:</strong> The attacker executes the <code>environment.delete</code> action, removing a specific environment configuration, potentially affecting deployment processes.</li>
<li><strong>Deletion of Projects:</strong> The attacker executes the <code>project.delete</code> action, deleting a project board and its associated tasks, impacting project management.</li>
<li><strong>Deletion of Repositories:</strong> The attacker executes the <code>repo.destroy</code> action, permanently deleting a repository, leading to code loss and potential service disruption.</li>
<li><strong>Impact:</strong> The deletion of critical resources disrupts development workflows, causes data loss, and potentially compromises the software development lifecycle.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these actions can lead to significant disruption of software development workflows, data loss, and potential compromise of the software supply chain. The number of affected resources and the severity of the impact depend on the scope of the attacker&rsquo;s access and the criticality of the deleted resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the necessary events for detection (reference: logsource definition).</li>
<li>Deploy the provided Sigma rule to detect <code>codespaces.destroy</code>, <code>environment.delete</code>, <code>project.delete</code>, and <code>repo.destroy</code> actions in the GitHub audit logs, and tune for your environment (reference: rules).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the deletion activity and the actor involved (reference: rules, falsepositives).</li>
<li>Validate the &ldquo;actor&rdquo; field in the audit logs to ensure the deletion activity is performed by an authorized user (reference: falsepositives).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>audit</category><category>data-loss</category><category>impact</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>GitHub Security Feature Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</link><pubDate>Thu, 31 Oct 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</guid><description>An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.</description><content:encoded><![CDATA[<p>This brief addresses the threat of unauthorized or malicious disabling of security features within GitHub organizations and repositories. Attackers or malicious insiders might disable features like Advanced Security, OAuth application restrictions, or two-factor authentication to weaken the security posture, gain unauthorized access, and establish persistence. The affected features span across advanced security, OAuth application management, and two-factor authentication enforcement. These actions can be performed by users with administrative or owner privileges within the GitHub organization. Defenders need to monitor for these configuration changes to ensure security best practices are maintained and to quickly identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with organization owner or administrator privileges through compromised credentials or insider access.</li>
<li>The attacker authenticates to the GitHub organization or repository using the compromised account.</li>
<li>The attacker navigates to the organization settings or repository settings, depending on the scope of the targeted security feature.</li>
<li>The attacker disables advanced security features (e.g., <code>business_advanced_security.disabled_for_new_repos</code>, <code>repo.advanced_security_disabled</code>) through the GitHub web interface or API.</li>
<li>Alternatively, the attacker disables OAuth application restrictions (<code>org.disable_oauth_app_restrictions</code>) to allow potentially malicious applications to access organizational data.</li>
<li>Or, the attacker disables the two-factor authentication requirement (<code>org.disable_two_factor_requirement</code>) for the organization, weakening account security.</li>
<li>The attacker may then proceed to exploit the weakened security posture to access sensitive repositories, modify code, or exfiltrate data.</li>
<li>The attacker establishes persistent access by creating rogue OAuth applications or adding unauthorized users to the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling security features in GitHub can lead to severe consequences. A successful attack can result in unauthorized access to sensitive code repositories, intellectual property theft, and data breaches. Disabling two-factor authentication makes accounts more vulnerable to credential stuffing and phishing attacks. The scope can range from a single repository to an entire organization, impacting hundreds or thousands of users and projects. The financial and reputational damage to the organization can be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github High Risk Configuration Disabled</code> to detect the disabling of critical security features by monitoring GitHub audit logs.</li>
<li>Enable audit log streaming as documented in the rule definition to ensure that the necessary logs are captured for detection.</li>
<li>Investigate any detected instances of security feature disabling to determine if they are legitimate administrator actions or malicious activity.</li>
<li>Enforce multi-factor authentication (MFA) for all users, especially those with administrative privileges, and monitor for attempts to disable MFA.</li>
<li>Regularly review and validate GitHub organization and repository settings to ensure that security features are enabled and configured correctly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>security-configuration</category><category>defense-evasion</category></item><item><title>GitHub Secret Scanning Feature Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</link><pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-github-secret-scanning-disabled/</guid><description>Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.</description><content:encoded><![CDATA[<p>The disabling of GitHub&rsquo;s secret scanning feature represents a significant security risk. Secret scanning is a critical control that prevents sensitive information, such as API keys, credentials, and tokens, from being committed to repositories. An attacker who gains administrative access to a GitHub organization or repository could disable this feature to facilitate the undetected introduction of secrets into the codebase. This action undermines the organization&rsquo;s security posture, creating opportunities for unauthorized access and data breaches. The activity is logged via GitHub audit logs, providing an opportunity for detection. This brief focuses on detecting the actions that disable the secret scanning feature within GitHub.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges for either an organization or a specific repository.</li>
<li>The attacker navigates to the security settings within the organization or repository.</li>
<li>The attacker identifies the &ldquo;Secret scanning&rdquo; feature or related settings (e.g., &ldquo;Secret scanning for new repositories&rdquo;).</li>
<li>The attacker disables the secret scanning feature using the GitHub UI or API. This generates an audit log event.</li>
<li>The attacker commits code containing secrets to the repository.</li>
<li>Because secret scanning is disabled, the secrets are not detected or flagged by GitHub.</li>
<li>The attacker leverages the committed secrets to gain unauthorized access to other systems or data.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, lateral movement, or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling secret scanning can lead to the exposure of sensitive credentials within a codebase. If successful, attackers can leverage these exposed secrets to compromise systems, access sensitive data, and potentially cause significant financial and reputational damage. The number of affected repositories and the extent of the damage depend on the scope of the access the attacker gains and the criticality of the exposed secrets. This can affect any organization that uses Github for source code management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Github Secret Scanning Feature Disabled&rdquo; Sigma rule to your SIEM to detect unauthorized disabling of the feature (logsource: github, service: audit).</li>
<li>Investigate any detected instances of secret scanning being disabled to determine if they were authorized administrative actions.</li>
<li>Enable audit log streaming to ensure the required logs are available (see logsource definition).</li>
<li>Review GitHub access controls to ensure that only authorized personnel have the ability to modify secret scanning settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>GitHub Push Protection Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</link><pubDate>Fri, 03 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-github-push-protection-disabled/</guid><description>An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.</description><content:encoded><![CDATA[<p>The GitHub push protection feature is designed to prevent secrets and sensitive information from being committed to repositories. Disabling this feature, whether at the organization, enterprise, or repository level, significantly increases the risk of accidental or intentional exposure of credentials, API keys, and other sensitive data. This can lead to unauthorized access, data breaches, and other security incidents. The actions detected can originate from administrative accounts or potentially compromised accounts with administrative privileges. This brief focuses on detecting the disabling of push protection, allowing security teams to respond and remediate the configuration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with administrative privileges, or a legitimate administrator performs the action.</li>
<li>The attacker navigates to the organization, enterprise, or repository settings in GitHub.</li>
<li>The attacker locates the &ldquo;Secret scanning&rdquo; or &ldquo;Push protection&rdquo; configuration section.</li>
<li>The attacker disables the push protection feature for the organization, enterprise, or specific repositories. This can be done via the GitHub UI or API.</li>
<li>GitHub audit logs record the event with the actions <code>business_secret_scanning_custom_pattern_push_protection.disabled</code>, <code>business_secret_scanning_push_protection.disable</code>, <code>org.secret_scanning_custom_pattern_push_protection_disabled</code>, etc..</li>
<li>Developers unknowingly or intentionally commit code containing secrets or sensitive data to the affected repositories.</li>
<li>The secrets are pushed to the remote repository without being blocked by push protection.</li>
<li>The exposed secrets can be discovered by malicious actors, leading to account compromise, data breaches, or other security incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling push protection can lead to the exposure of sensitive information such as API keys, passwords, and other credentials within GitHub repositories. This exposure can lead to account compromise, unauthorized access to systems and data, and potentially significant financial and reputational damage. The number of affected repositories and the severity of the impact depends on the scope of the push protection disabling and the types of secrets committed to the repositories.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Disabled&rdquo; to your SIEM and tune for your environment to detect when push protection is disabled.</li>
<li>Investigate any detected instances of push protection being disabled in the GitHub audit logs (logsource: github, service: audit) to verify the legitimacy of the action.</li>
<li>Enforce multi-factor authentication (MFA) for all GitHub accounts, especially those with administrative privileges, to prevent unauthorized access.</li>
<li>Regularly review and audit GitHub organization and repository settings to ensure that push protection is enabled and properly configured.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category></item><item><title>GenAI Process Connection to Unusual Domain on macOS</title><link>https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</link><pubDate>Thu, 02 May 2024 14:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</guid><description>This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of GenAI tools on macOS connecting to unusual domains, which may indicate a compromised state. Attackers can exploit GenAI tools through prompt injection, malicious MCP (Model Context Protocol) servers, or poisoned plugins to establish command-and-control (C2) channels or exfiltrate sensitive data. Given the network access capabilities of AI agents, adversaries may manipulate them to beacon to external servers, download malicious payloads, or transmit harvested credentials and documents. The Elastic detection rule <code>9050506c-df6d-4bdf-bc82-fcad0ef1e8c1</code> focuses on identifying such anomalous network connections originating from a predefined list of GenAI processes, excluding known legitimate domains. The rule has been actively maintained since its creation on December 4, 2025, with its latest update on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary compromises a GenAI tool on a macOS system through prompt injection, malicious MCP servers, or poisoned plugins.</li>
<li>The compromised GenAI tool is configured to connect to an attacker-controlled domain for C2.</li>
<li>The GenAI process initiates a network connection attempt to the unusual domain using standard web protocols (HTTP/HTTPS).</li>
<li>The macOS system&rsquo;s network stack resolves the attacker&rsquo;s domain to its corresponding IP address.</li>
<li>The GenAI process sends data to the attacker-controlled domain, potentially including sensitive information.</li>
<li>The attacker uses the C2 channel to send commands to the compromised GenAI tool.</li>
<li>The GenAI tool executes the commands, potentially leading to further compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised GenAI tools can lead to data exfiltration, unauthorized access to sensitive information, and the establishment of persistent C2 channels within an organization&rsquo;s network. The impact ranges from the loss of intellectual property and customer data to the potential disruption of business operations. The risk is amplified if the GenAI tool has access to internal systems or sensitive data stores, allowing attackers to pivot and escalate their attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Connecting to Unusual Domain&rdquo; to your SIEM and tune for your environment (see rule below).</li>
<li>Enable process creation and network connection logging on macOS endpoints to collect the data required for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the domain and the GenAI process&rsquo;s behavior.</li>
<li>Block any identified malicious domains at the network level (see query in the provided source).</li>
<li>Review the GenAI tool&rsquo;s configuration for unauthorized MCP servers, plugins, or extensions that initiated the connection.</li>
<li>Regularly update the list of allowed domains in the Sigma rule&rsquo;s filter to account for legitimate updates to GenAI tool infrastructure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>genai</category><category>command and control</category><category>macos</category><category>network connection</category></item><item><title>GitHub Push Protection Bypass Detection</title><link>https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-github-push-protection-bypass/</guid><description>Detection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.</description><content:encoded><![CDATA[<p>This alert detects when a GitHub user bypasses the push protection mechanism designed to prevent secrets from being committed to a repository. GitHub&rsquo;s push protection, part of its secret scanning feature, is intended to block commits containing sensitive information like API keys or credentials.  A bypass indicates a deliberate attempt to circumvent this security measure. Successful bypass can lead to exposure of secrets, increasing the risk of unauthorized access and data breaches. The activity is logged within GitHub&rsquo;s audit logs, provided that the audit log streaming feature is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Developer attempts to commit code containing a secret to a GitHub repository.</li>
<li>GitHub&rsquo;s push protection mechanism detects the secret and blocks the push.</li>
<li>The developer intentionally bypasses the push protection, potentially using allowed administrative activities to circumvent the block.</li>
<li>The code, including the secret, is successfully pushed to the repository.</li>
<li>The secret becomes exposed within the repository&rsquo;s history.</li>
<li>Unauthorized actors may discover the exposed secret by scanning the repository.</li>
<li>Unauthorized actors may use the exposed secret to gain unauthorized access to systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful bypass of GitHub push protection can lead to secrets being exposed in a repository. This exposure can lead to unauthorized access to sensitive systems or data. The severity of the impact depends on the scope of access granted by the exposed secret, and the visibility of the repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable audit log streaming in GitHub to ensure relevant events are captured.</li>
<li>Deploy the Sigma rule &ldquo;Github Push Protection Bypass Detected&rdquo; to your SIEM and tune for your environment using GitHub audit logs.</li>
<li>Investigate any detected bypass events to determine the context and impact of the bypassed secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-impairment</category><category>t1685</category><category>github</category></item><item><title>Detection of New GitHub Actions Secrets Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-secret-creation/</guid><description>This analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies the creation of new secrets within GitHub Actions. Threat actors may create or modify secrets to gain unauthorized access, establish persistence, or escalate privileges within the GitHub environment. The activity is captured via GitHub&rsquo;s audit logs. The scope of this detection encompasses the creation of secrets at the organization, environment, codespaces, or repository level. Successful detection of this activity allows security teams to investigate potentially malicious modifications to GitHub Actions secrets, which could lead to supply chain compromise or data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a GitHub account, potentially through compromised credentials or phishing (T1078.004).</li>
<li>The attacker authenticates to the GitHub organization or repository.</li>
<li>The attacker navigates to the settings for the organization, environment, codespaces, or repository.</li>
<li>The attacker creates a new secret within the GitHub Actions settings, using the GitHub API or web interface.</li>
<li>The secret is stored within GitHub&rsquo;s infrastructure, accessible to GitHub Actions workflows.</li>
<li>The attacker modifies or creates a GitHub Actions workflow that utilizes the newly created secret.</li>
<li>The workflow executes, using the secret to perform privileged actions such as accessing sensitive data or deploying malicious code.</li>
<li>The attacker achieves persistence or elevates their privileges within the GitHub environment, potentially compromising the entire software supply chain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, code injection, and supply chain compromise. The impact ranges from low, in cases where the secret is used for benign purposes, to critical if the secret is used to deploy malicious code into production environments. While the number of affected organizations is unknown, the potential for widespread impact across the software supply chain makes this a critical area for monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable GitHub audit log streaming to capture the events necessary for this detection (see <code>logsource</code> definition).</li>
<li>Deploy the Sigma rule <code>Github New Secret Created</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the &ldquo;actor&rdquo; involved in creating the secret.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>persistence</category><category>privilege-escalation</category><category>initial-access</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>Detection of Command and Control Activity via Common Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-common-web-services-c2/</guid><description>This rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.</description><content:encoded><![CDATA[<p>This detection rule, sourced from Elastic, identifies potential command and control (C2) activity by detecting connections to commonly abused web services. Adversaries often leverage popular web services like pastebin, GitHub, Dropbox, and Discord to mask malicious communications within legitimate network traffic. This technique makes it challenging for defenders to distinguish between normal user activity and malicious C2 traffic. The rule focuses on Windows systems and monitors DNS queries to identify processes communicating with a predefined list of services known to be abused by attackers. The rule was last updated on 2026-05-04 and is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. The goal is to identify anomalous network connections originating from unusual processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user on a Windows host unknowingly executes a malicious file (e.g., via phishing or drive-by download).</li>
<li>The malicious file executes a process outside of typical program directories (e.g., <code>C:\Windows\Temp</code>).</li>
<li>This process initiates a DNS query to a domain associated with a commonly abused web service (e.g., <code>pastebin.com</code>, <code>githubusercontent.com</code>).</li>
<li>The DNS query resolves to an IP address, and a network connection is established to the web service.</li>
<li>The malicious process uploads or downloads data from the web service, potentially containing commands for the compromised host or exfiltrated data.</li>
<li>The web service acts as an intermediary, relaying commands from the attacker to the compromised host or exfiltrated data from the compromised host to the attacker.</li>
<li>The attacker uses the C2 channel to perform further actions on the compromised host, such as lateral movement or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using common web services for C2 can lead to data exfiltration, system compromise, and further propagation within the network. The low severity suggests a focus on detecting early-stage C2 activity, which if left unchecked, could escalate into a significant incident. The usage of popular web services makes detection difficult, requiring careful analysis and tuning to avoid false positives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Connection to Commonly Abused Web Services&rdquo; to your SIEM and tune it for your environment to minimize false positives.</li>
<li>Enable Sysmon DNS query logging to accurately capture DNS requests for improved detection capabilities, activating the &ldquo;DNS Query to Commonly Abused Web Services&rdquo; rule.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain and network connections to determine the legitimacy of the activity, referencing the investigation steps described in the rule documentation.</li>
<li>Review and update the list of excluded processes in the Sigma rule to reflect your organization&rsquo;s approved software and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-and-control</category><category>webservice</category><category>windows</category></item><item><title>Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting</title><link>https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multi-cloud-cli-token-harvesting/</guid><description>This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting command-line credential harvesting across multiple cloud platforms. Attackers may attempt to steal application access tokens or extract credentials from files by executing specific commands via command-line interfaces (CLIs) for GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, and Kubernetes. This activity is particularly concerning when originating from the same host within a short time frame (e.g., five minutes), potentially indicating automated credential theft. This technique can lead to unauthorized access to cloud resources, data breaches, and lateral movement within cloud environments. Defenders should monitor for suspicious command-line activity involving cloud CLIs and credential access patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses a shell (cmd.exe, PowerShell, bash, etc.) to execute cloud CLI commands.</li>
<li>The attacker executes commands to list available credentials or tokens (e.g., <code>aws configure list</code>, <code>az account list</code>, <code>kubectl config view</code>).</li>
<li>The attacker executes commands to print access tokens for various cloud providers (e.g., <code>gcloud auth print-access-token</code>, <code>az account get-access-token</code>, <code>gh auth token</code>).</li>
<li>The attacker uses credential harvesting commands across multiple cloud platforms within a short timeframe.</li>
<li>The attacker exfiltrates the harvested credentials to a remote location.</li>
<li>The attacker uses the stolen credentials to access sensitive cloud resources and data.</li>
<li>The attacker performs lateral movement within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive cloud resources, data breaches, and lateral movement within cloud environments. The impact includes potential data exfiltration, service disruption, and financial loss. The number of affected victims will depend on the scope of the compromised credentials and the attacker&rsquo;s ability to exploit them.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Multi-Cloud CLI Token and Credential Access Commands&rdquo; to your SIEM to detect suspicious command-line activity related to cloud credential harvesting.</li>
<li>Review <code>Esql.process_command_line_values</code> in the rule output to identify the exact commands executed and determine if the activity was legitimate or malicious.</li>
<li>Correlate the detected activity with authentication, Kubernetes audit, and cloud API logs to confirm unauthorized access and misuse of printed tokens.</li>
<li>Implement monitoring and alerting for unusual CLI activity originating from user workstations or build servers, focusing on the CLIs mentioned in the Overview section.</li>
<li>Follow vendor-specific guidance to revoke compromised credentials, such as revoking tokens and rotating secrets, as outlined in the rule&rsquo;s &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>cloud</category><category>cli</category><category>token-harvesting</category></item><item><title>GitHub Self-Hosted Runner Configuration Changes Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-runner-changes/</guid><description>Detection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting changes to self-hosted runner configurations within GitHub environments. Self-hosted runners are systems deployed and managed by users to execute jobs from GitHub Actions, providing flexibility and control over the execution environment. Monitoring these runners is crucial because unauthorized modifications can lead to various malicious activities, including data collection, persistence, privilege escalation, or even initial access. The rule provided detects such changes based on audit logs, requiring administrators to validate the changes through the GitHub UI for complete context. Detecting these modifications early can help prevent or mitigate potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub organization or repository with permissions to manage self-hosted runners. This could be achieved through compromised credentials (T1078.004) or exploiting a vulnerability.</li>
<li>The attacker modifies the configuration of an existing self-hosted runner group or creates a new runner group (org.runner_group_created).</li>
<li>The attacker adds or removes runners from a runner group (org.runner_group_runners_added, org.runner_group_runner_removed, org.runner_group_updated).</li>
<li>Alternatively, the attacker registers a new self-hosted runner within the environment (repo.register_self_hosted_runner).</li>
<li>The attacker removes an existing self-hosted runner from the environment (repo.remove_self_hosted_runner, org.remove_self_hosted_runner).</li>
<li>The attacker uses the compromised runner or runner group to execute malicious code within the GitHub Actions workflow, potentially collecting sensitive data or escalating privileges.</li>
<li>The attacker leverages the compromised runner to establish persistence within the GitHub environment, ensuring continued access.</li>
<li>The attacker exploits the compromised runner to gain initial access to other systems or networks connected to the GitHub environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised self-hosted runners can lead to a range of impacts, including data exfiltration, code injection, and privilege escalation within the targeted GitHub environment. Successful attacks could result in unauthorized access to sensitive repositories, modification of code, or deployment of malicious software. The impact can vary depending on the scope of the compromised runner and the permissions associated with it. The effects could extend beyond the GitHub environment if the compromised runner has access to other systems or networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the audit log streaming feature in GitHub to capture events related to self-hosted runner modifications, as required by the logsource definition.</li>
<li>Deploy the Sigma rule &ldquo;Github Self Hosted Runner Changes Detected&rdquo; to your SIEM and tune for your specific environment to detect suspicious configuration changes.</li>
<li>Regularly review the audit logs in the GitHub UI to validate any detected changes to self-hosted runners and runner groups to ensure legitimate modifications.</li>
<li>Implement strict access control policies for managing self-hosted runners, limiting permissions to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>self-hosted-runner</category><category>audit-log</category><category>devops</category><category>supply-chain</category></item><item><title>Patreon OAuth Provider ID Collision Vulnerability in go-pkgz/auth</title><link>https://feed.craftedsignal.io/briefs/2024-01-patreon-auth-id-collision/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-patreon-auth-id-collision/</guid><description>The Patreon OAuth provider in go-pkgz/auth and go-pkgz/auth/v2 maps every authenticated Patreon account to the same local user ID, leading to cross-account access, privilege confusion, and subscription-state leakage.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the Patreon OAuth provider within the <code>go-pkgz/auth</code> and <code>go-pkgz/auth/v2</code> libraries. Specifically, the <code>mapUser</code> function incorrectly maps all authenticated Patreon accounts to the same local <code>user.ID</code>, instead of generating unique IDs based on the Patreon account data. This flaw, present in versions 1.18.0 through 1.25.1 of <code>go-pkgz/auth</code> and 2.0.0 through 2.1.1 of <code>go-pkgz/auth/v2</code>, arises because the code hashes an uninitialized field instead of the Patreon user ID. This means that all Patreon users are effectively treated as a single identity within applications using these libraries. The vulnerability poses a significant risk to applications relying on <code>token.User.ID</code> for authentication and authorization decisions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user attempts to authenticate with an application using the affected <code>go-pkgz/auth</code> library and the Patreon OAuth provider.</li>
<li>The application redirects the user to Patreon for authentication.</li>
<li>The user authenticates with Patreon and is redirected back to the application with an authorization code.</li>
<li>The application exchanges the authorization code for an access token.</li>
<li>The application uses the access token to retrieve the user&rsquo;s Patreon profile data.</li>
<li>The application calls the vulnerable <code>mapUser</code> function within the <code>go-pkgz/auth</code> library to map the Patreon user to a local user. Due to the vulnerability, all users are mapped to the same local user ID: <code>patreon_da39a3ee5e6b4b0d3255bfef95601890afd80709</code>.</li>
<li>The application stores the mapped user object in JWT claims.</li>
<li>Subsequent requests from different Patreon users are treated as coming from the same user, potentially leading to data leakage, privilege escalation, or account takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability can lead to severe consequences for applications using the affected libraries. If successful, all Patreon-authenticated users may be collapsed into a single local account. This can result in data associated with one Patreon user being exposed to or overwritten by another. Additionally, Patreon-specific attributes like subscription status can leak across unrelated users. If the application grants elevated privileges to the local account associated with the shared Patreon ID, those privileges can effectively apply to every Patreon login.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>go-pkgz/auth</code> to a version higher than 1.25.1 or <code>go-pkgz/auth/v2</code> to a version higher than 2.1.1 to patch CVE-2026-42560.</li>
<li>Review and update any existing applications using the vulnerable Patreon provider to ensure proper user ID mapping after patching CVE-2026-42560.</li>
<li>Deploy the Sigma rule &ldquo;Patreon Auth ID Collision Attempt&rdquo; to detect potential exploitation by monitoring for the specific user ID pattern <code>patreon_da39a3ee5e6b4b0d3255bfef95601890afd80709</code> in authentication logs.</li>
<li>Implement additional logging and monitoring to track user authentication events and identify any anomalies in user ID assignments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication</category><category>oauth</category><category>id_collision</category><category>vulnerability</category></item><item><title>Arcane Unauthenticated Compose Template Content Disclosure</title><link>https://feed.craftedsignal.io/briefs/2024-01-arcane-template-disclosure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-arcane-template-disclosure/</guid><description>Arcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.</description><content:encoded><![CDATA[<p>Arcane versions prior to 1.18.0 are susceptible to an unauthenticated information disclosure vulnerability. The vulnerability stems from four <code>GET</code> endpoints under the <code>/api/templates*</code> path in Arcane&rsquo;s Huma backend that lack any security requirements. This design flaw allows any unauthenticated network client to list and read the full Compose YAML and <code>.env</code> content of every custom template stored in the instance. This includes sensitive information such as database passwords, API keys, and other secrets stored verbatim from the operator&rsquo;s environment variables due to the &ldquo;Save as Template&rdquo; workflow on project creation pages. This vulnerability poses a significant risk of exposing critical infrastructure secrets and internal service details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an Arcane instance running a version prior to 1.18.0.</li>
<li>The attacker sends an unauthenticated <code>GET</code> request to <code>/api/templates</code> to enumerate available templates, revealing names, descriptions, and tags.</li>
<li>The attacker sends an unauthenticated <code>GET</code> request to <code>/api/templates/{id}/content</code> to retrieve the content of a specific template.</li>
<li>The Arcane backend processes the request without authentication, due to missing security requirements on these endpoints.</li>
<li>The backend retrieves the requested template content, including the <code>Content</code> and <code>EnvContent</code> fields from the database.</li>
<li>The backend returns the template content to the attacker, including sensitive environment variables stored in plain text within the <code>EnvContent</code>.</li>
<li>The attacker extracts sensitive information, such as database passwords, API keys, and registry tokens, from the <code>EnvContent</code>.</li>
<li>The attacker uses the exposed credentials to gain unauthorized access to internal systems and services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to access sensitive information stored within Arcane templates. This includes database passwords, API keys, and other secrets, potentially leading to unauthorized access to critical systems and data. The enumeration of templates also reveals internal services and infrastructure details, aiding further reconnaissance. This vulnerability affects any Arcane instance running a version prior to 1.18.0 where operators have stored sensitive information in custom Compose templates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Arcane to version 1.18.0 or later to patch the vulnerability (CVE-2026-42461).</li>
<li>Deploy the following Sigma rule to detect suspicious access to the template content endpoints.</li>
<li>Review existing templates for sensitive information and rotate any exposed credentials immediately.</li>
<li>Implement network segmentation to limit access to the Arcane instance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>information-disclosure</category><category>vulnerability</category><category>arcane</category></item><item><title>Masquerading Business Application Installers</title><link>https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-masquerading-business-apps/</guid><description>Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.</description><content:encoded><![CDATA[<p>Attackers often attempt to trick users into downloading and executing malicious executables by disguising them as legitimate business applications. This tactic is used to bypass security measures and gain initial access to a system. These malicious executables, often distributed via malicious ads, forum posts, and tutorials, mimic the names of commonly used applications such as Slack, WebEx, Teams, Discord, and Zoom. The executables are typically unsigned or signed with invalid certificates to further evade detection. This allows the attacker to execute arbitrary code on the victim&rsquo;s machine, potentially leading to further compromise. This campaign aims to target end-users who are less security-aware, and this makes social engineering attacks like this very effective.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a compromised website or clicks on a malicious advertisement.</li>
<li>The user is prompted to download an installer file masquerading as a legitimate business application (e.g., Slack, Zoom, Teams) from a download directory.</li>
<li>The downloaded executable is placed in the user&rsquo;s Downloads folder (e.g., C:\Users*\Downloads*).</li>
<li>The user executes the downloaded file.</li>
<li>The executable, lacking a valid code signature, begins execution.</li>
<li>The malicious installer may drop and execute additional malware components.</li>
<li>The malware establishes persistence, potentially using techniques such as registry key modification.</li>
<li>The malware performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of a masqueraded business application installer can lead to a complete system compromise. The attacker gains initial access and can deploy various malware payloads, including ransomware, keyloggers, and data stealers. This can result in data breaches, financial loss, and reputational damage. Although the specific number of victims and sectors targeted are not detailed, the widespread use of the applications being spoofed (Slack, Zoom, etc.) suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Potential Masquerading as Business App Installer</code> to detect unsigned executables resembling legitimate business applications in download directories.</li>
<li>Enable process creation logging to capture the execution of unsigned executables.</li>
<li>Educate users on the risks of downloading and executing files from untrusted sources.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Regularly update endpoint detection and response (EDR) tools to detect and prevent the execution of known malware.</li>
<li>Monitor process execution events for processes originating from the Downloads folder that lack valid code signatures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>masquerading</category><category>defense-evasion</category><category>initial-access</category><category>malware</category><category>windows</category></item></channel></rss>