<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/microsoft/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 20:12:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/microsoft/feed.xml" rel="self" type="application/rss+xml"/><item><title>Argo Workflows Credentials Exposed in Pod Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</link><pubDate>Mon, 04 May 2026 20:12:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-argo-cred-leak/</guid><description>Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, is vulnerable to credential exposure. Specifically, versions 4.0.0 through 4.0.4 inadvertently log artifact repository credentials in plaintext during artifact operations. This includes sensitive data like S3 Access Keys, Secret Keys, Session Tokens, Server-Side Customer Keys, OSS Access Keys, Secret Keys, Security Tokens, and GCS Service Account Keys. The vulnerability stems from the logging driver passing the entire ArtifactDriver struct to the structured logger. Any user with read access to workflow pod logs can extract these credentials, creating a significant security risk. This is an incomplete fix of CVE-2025-62157.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains read access to Kubernetes pod logs within the Argo Workflows namespace. This could be achieved through compromised credentials, misconfigured RBAC policies, or other Kubernetes vulnerabilities.</li>
<li>The attacker identifies a workflow that utilizes artifact storage, such as S3 or GCS.</li>
<li>The workflow executes an artifact operation (upload or download).</li>
<li>Argo Workflows logs the entire ArtifactDriver struct, including the plaintext credentials, into the pod logs.</li>
<li>The attacker queries the pod logs using <code>kubectl</code> or other Kubernetes tooling. For example: <code>kubectl -n argo logs &quot;cred-leak-test&quot; -c wait</code>.</li>
<li>The attacker extracts the plaintext credentials (e.g., S3 Access Key and Secret Key) from the log output.</li>
<li>The attacker uses the extracted credentials to access the artifact repository (e.g., S3 bucket) and potentially steal data or perform other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to artifact repositories used by Argo Workflows. This can lead to data breaches, as sensitive data stored in S3 buckets, GCS buckets, or other storage solutions can be exposed. The impact is especially severe if the compromised credentials have broad permissions or if the artifact repository contains highly sensitive data. This affects Argo Workflows versions 4.0.0, 4.0.1, 4.0.2, 4.0.3, and 4.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Argo Workflows to version 4.0.5 or later to remediate the vulnerability (CVE-2026-42295).</li>
<li>Review and restrict Kubernetes RBAC permissions to limit access to pod logs, following the principle of least privilege.</li>
<li>Implement log monitoring and alerting for unusual access patterns to Kubernetes pod logs.</li>
<li>Rotate any potentially exposed artifact repository credentials (S3 access keys, GCS service account keys, etc.) if Argo Workflows versions 4.0.0-4.0.4 were in use.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>credential-access</category><category>kubernetes</category></item><item><title>Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</link><pubDate>Mon, 04 May 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aitm-phishing/</guid><description>A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.</description><content:encoded><![CDATA[<p>Between April 14 and 16, 2026, Microsoft Defender Research observed a sophisticated, large-scale phishing campaign targeting over 35,000 users across more than 13,000 organizations in 26 countries, predominantly in the United States (92%). The campaign, which did not focus on a single vertical, impacted a range of industries, with Healthcare &amp; life sciences (19%), Financial services (18%), Professional services (11%), and Technology &amp; software (11%) being the most affected. Attackers employed code of conduct-themed lures delivered via emails that appeared as internal compliance or regulatory communications. The campaign utilized a multi-step attack chain, including CAPTCHA challenges and intermediate staging pages, to reinforce legitimacy and filter out automated defenses, ultimately leading to an adversary-in-the-middle (AiTM) phishing flow.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with phishing emails posing as internal compliance communications, using subjects like &ldquo;Internal case log issued under conduct policy&rdquo;.</li>
<li>The emails contain a PDF attachment (e.g., &ldquo;Awareness Case Log File – Tuesday 14th, April 2026.pdf&rdquo;) that claims a &ldquo;code of conduct review&rdquo; has been initiated.</li>
<li>Recipients are instructed to click a “Review Case Materials” link within the PDF.</li>
<li>Clicking the link redirects the user to one of the attacker-controlled domains (e.g., acceptable-use-policy-calendly[.]de).</li>
<li>The landing page displays a Cloudflare CAPTCHA to validate the user and impede automated analysis.</li>
<li>After CAPTCHA completion, the user is redirected to an intermediate site that informs them the requested documentation is encrypted and requires account authentication.</li>
<li>The user is presented with a legitimate-looking sign-in experience, part of an AiTM phishing flow.</li>
<li>The attackers proxy the authentication session in real time and capture authentication tokens, granting immediate account access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign resulted in the compromise of authentication tokens, enabling attackers to gain unauthorized access to user accounts and bypass multifactor authentication. With more than 35,000 users targeted across over 13,000 organizations, the potential for widespread data breaches, financial fraud, and further malicious activities is significant. The targeting of sectors like Healthcare and Financial Services indicates a focus on high-value targets with sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Educate users about phishing lures, especially those using social engineering tactics and enterprise-style HTML templates.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious PDF Opening via Uncommon Applications&rdquo; to identify unusual PDF execution paths, based on the &lsquo;file_event&rsquo; log source.</li>
<li>Configure email security settings in Microsoft Defender for Office 365 to filter out phishing emails effectively.</li>
<li>Enable network protection to leverage SmartScreen as a host-based web proxy.</li>
<li>Block access to the attacker-controlled domains, such as acceptable-use-policy-calendly[.]de, at the DNS resolver level.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>AiTM</category><category>token-compromise</category></item><item><title>Potential PowerShell Obfuscated Script via High Entropy</title><link>https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</link><pubDate>Mon, 04 May 2026 14:49:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</guid><description>This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.</description><content:encoded><![CDATA[<p>Attackers frequently employ PowerShell obfuscation techniques to evade detection and hinder analysis. These techniques involve encoding, encrypting, or compressing PowerShell scripts to mask their true intent. This detection identifies PowerShell script blocks exhibiting high entropy and non-uniform character distributions, statistical characteristics often associated with obfuscated content. The rule specifically targets script blocks longer than 1000 characters with entropy bits &gt;= 5.5 and surprisal standard deviation &gt; 0.7. This detection is designed to highlight potentially malicious PowerShell activity that warrants further investigation by security analysts and incident responders. This rule was created by Elastic and last updated on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., via phishing or exploit).</li>
<li>The attacker leverages PowerShell, a built-in Windows scripting language, to execute malicious commands.</li>
<li>The attacker uses obfuscation techniques (encoding, encryption, compression) to disguise the PowerShell script&rsquo;s true intent.</li>
<li>The obfuscated script is executed, bypassing basic signature-based detections.</li>
<li>The script may download and execute additional payloads or establish persistence.</li>
<li>The script performs malicious actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using obfuscated PowerShell can lead to various negative impacts, including data breaches, system compromise, and disruption of services. The low severity reflects the need for further analysis to confirm malicious intent, given potential false positives from legitimate encoded scripts. While the exact number of affected systems and sectors is unknown, the widespread use of PowerShell makes this a potentially significant threat across many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to generate the necessary events (4104) as outlined in the setup instructions: <a href="https://ela.st/powershell-logging-setup">https://ela.st/powershell-logging-setup</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the thresholds (<code>powershell.file.script_block_length</code>, <code>powershell.file.script_block_entropy_bits</code>, <code>powershell.file.script_block_surprisal_stdev</code>) based on your environment&rsquo;s baseline.</li>
<li>Investigate alerts generated by the Sigma rule, focusing on execution context (<code>user.name</code>, <code>host.name</code>), script provenance (<code>file.path</code>), and reconstructed script content (<code>powershell.file.script_block_text</code>).</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> section for detailed triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>obfuscation</category></item><item><title>Windows Port Forwarding Rule Addition via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</guid><description>An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.</description><content:encoded><![CDATA[<p>Attackers may configure port forwarding rules to bypass network segmentation restrictions, effectively using the compromised host as a jump box to access previously unreachable systems. This involves modifying the registry to redirect incoming TCP connections from a local port to another port or a remote computer. The technique is typically employed post-compromise to facilitate lateral movement and maintain unauthorized access within the network. This activity is detected by monitoring changes to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an exploit or compromised credentials.</li>
<li>The attacker executes a command-line interface (e.g., <code>cmd.exe</code> or <code>powershell.exe</code>) with administrative privileges.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet to modify the <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\</code> registry key.</li>
<li>The attacker configures a new port forwarding rule by creating a new subkey under <code>v4tov4\</code> with specific settings for the local port, remote address, and remote port.</li>
<li>The attacker sets the <code>ListenAddress</code>, <code>ListenPort</code>, <code>ConnectAddress</code>, and <code>ConnectPort</code> values within the new subkey.</li>
<li>The attacker verifies the successful creation and activation of the port forwarding rule using <code>netsh interface portproxy show v4tov4</code>.</li>
<li>The attacker leverages the newly created port forwarding rule to tunnel traffic through the compromised host, bypassing network segmentation.</li>
<li>The attacker uses the proxied connection to access internal resources and conduct further attacks, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass network segmentation restrictions, leading to unauthorized access to internal systems and data. This can facilitate lateral movement, data exfiltration, and further compromise of the network. The severity of the impact depends on the sensitivity of the accessible resources and the extent of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture modifications to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys, enabling detection of malicious port forwarding rule additions.</li>
<li>Deploy the Sigma rule &ldquo;Port Forwarding Rule Addition via Registry Modification&rdquo; to your SIEM to detect suspicious registry modifications related to port forwarding.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process execution chain and the user account that performed the action.</li>
<li>Regularly review and audit existing port forwarding rules to identify and remove any unauthorized or suspicious configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>port-forwarding</category><category>registry-modification</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Zoom Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</guid><description>A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Zoom.exe, potentially indicating an attempt to evade detection or exploit vulnerabilities within the Zoom application. The rule focuses on detecting instances where command interpreters like cmd.exe, PowerShell, or PowerShell ISE are launched as child processes of Zoom. This behavior can be indicative of an attacker attempting to execute malicious commands or scripts within the context of the Zoom application, potentially escalating privileges or gaining unauthorized access to system resources. It&rsquo;s crucial for defenders to investigate such occurrences, as they may signify ongoing exploitation or malicious activity leveraging Zoom as an initial access vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches the Zoom application (Zoom.exe).</li>
<li>A vulnerability in Zoom is exploited, or the user is socially engineered into running a malicious command.</li>
<li>Zoom.exe spawns a child process, such as cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</li>
<li>The spawned process executes commands or scripts, potentially downloading or executing malware.</li>
<li>The malicious script or command performs reconnaissance activities on the system.</li>
<li>The script establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The attacker gains remote access to the compromised system.</li>
<li>The attacker performs lateral movement and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow attackers to execute arbitrary commands, escalate privileges, and compromise the affected system. Depending on the user&rsquo;s privileges, attackers could gain access to sensitive data, install malware, or pivot to other systems on the network. The impact ranges from data breaches to complete system compromise, potentially affecting all users within the organization who utilize the Zoom application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Zoom Child Process&rdquo; to your SIEM to detect command interpreters spawned by Zoom.exe. Tune the rule for your environment to minimize false positives.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, which is essential for the Sigma rule above.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments and network connections of the spawned processes.</li>
<li>Monitor Windows Security Event Logs for process creation events related to Zoom.exe and its child processes to identify suspicious behavior.</li>
<li>Consider implementing application control policies to restrict the execution of unauthorized processes within the Zoom application context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>SIP Provider Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</guid><description>This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to Subject Interface Package (SIP) providers, a critical component of the Windows cryptographic system responsible for validating file signatures. Attackers may attempt to subvert trust controls by modifying SIP providers, allowing them to bypass signature validation checks and potentially inject malicious code into trusted processes. This activity is a form of defense evasion, allowing unauthorized code execution. The rule focuses on detecting suspicious registry changes associated with SIP providers, while excluding known benign processes to minimize false positives. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. This activity is related to MITRE ATT&amp;CK technique T1553.003 (SIP and Trust Provider Hijacking).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker escalates privileges to gain necessary permissions to modify the registry.</li>
<li>The attacker modifies the registry keys associated with SIP providers, specifically targeting <code>CryptSIPDllPutSignedDataMsg</code> and <code>Trust\\FinalPolicy</code> locations.</li>
<li>The attacker changes the <code>Dll</code> value within these registry keys to point to a malicious DLL.</li>
<li>The system, upon attempting to validate a file signature, loads the malicious DLL instead of the legitimate SIP provider.</li>
<li>The malicious DLL executes arbitrary code, potentially injecting it into other processes.</li>
<li>The attacker uses the injected code to further compromise the system or network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SIP providers allows attackers to bypass signature validation checks, leading to the execution of unsigned or malicious code. This can compromise the integrity of the system, leading to data breaches, system instability, or further propagation of malware within the network. The impact can range from individual workstation compromise to widespread organizational damage, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SIP Provider Modification via Registry</code> to your SIEM and tune it for your environment to detect suspicious registry modifications related to SIP providers.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts generated by the rules, focusing on the process responsible for the registry change and the DLL being loaded, as described in the rule&rsquo;s triage section.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted code.</li>
<li>Monitor the registry paths listed in the Sigma rules for unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-modification</category></item><item><title>Service DACL Modification via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</guid><description>Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the modification of Discretionary Access Control Lists (DACLs) for Windows services using the <code>sc.exe</code> utility. Attackers can leverage this technique to deny access to a service, making it unmanageable or hiding it from system administrators and users. The detection rule focuses on identifying instances where <code>sc.exe</code> is used with the <code>sdset</code> argument, specifically targeting the denial of access for key user groups such as IU, SU, BA, SY, and WD. This activity is indicative of a defense evasion attempt aimed at hindering security tools or preventing remediation. The rule is designed for data generated by Elastic Defend, but also supports integrations with third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, offering broad coverage for detecting this malicious behavior across diverse environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker elevates privileges to gain necessary permissions to modify service configurations.</li>
<li>The attacker executes <code>sc.exe</code> with the <code>sdset</code> command to modify the DACL of a targeted service.</li>
<li>The <code>sdset</code> command arguments specify the new security descriptor, denying access to specific user groups (e.g., IU, SU, BA, SY, WD).</li>
<li>The service becomes inaccessible to the targeted user groups, potentially disrupting legitimate operations or security tools.</li>
<li>The attacker may repeat this process for multiple services to further impair system functionality or evade detection.</li>
<li>The attacker leverages the disabled or hidden services to maintain persistence or carry out other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service DACLs can lead to a denial-of-service condition for legitimate users and system administrators. This can impair the functionality of critical security tools, hinder incident response efforts, and provide attackers with a persistent foothold on the compromised system. The hiding of services can also prevent users from identifying and removing malicious services. While the number of victims is not specified in the source, organizations across various sectors are potentially vulnerable to this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service DACL Modification via sc.exe</code> to your SIEM to detect this specific behavior.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any instances where <code>sc.exe</code> is used with the <code>sdset</code> argument and access denial flags, focusing on the targeted user groups (IU, SU, BA, SY, WD).</li>
<li>Implement strict access controls and monitor for unauthorized attempts to modify service configurations.</li>
<li>Regularly audit service permissions to identify and remediate any unauthorized changes.</li>
<li>Review and update endpoint protection policies to prevent similar threats in the future, ensuring that all systems are equipped with the latest security patches and configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Potential WSUS Abuse for Lateral Movement via PsExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</guid><description>Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of Windows Server Update Services (WSUS) for lateral movement by executing PsExec. WSUS is designed to manage updates for Microsoft products, ensuring only signed binaries are executed. Attackers can exploit this by using WSUS to distribute and execute Microsoft-signed tools like PsExec, which can then be used to move laterally within the network. This technique leverages the trust relationship inherent in WSUS to bypass security controls. The rule focuses on detecting suspicious processes initiated by <code>wuauclt.exe</code> (the Windows Update client) executing PsExec from the SoftwareDistribution Download Install directories. Defenders should monitor WSUS activity and PsExec executions to detect and respond to this potential threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a system within the target network.</li>
<li>The attacker gains control over the WSUS server or performs a man-in-the-middle attack to spoof WSUS.</li>
<li>The attacker uses the compromised WSUS server to approve a malicious update containing PsExec.</li>
<li>The WSUS client (<code>wuauclt.exe</code>) on targeted machines downloads the &ldquo;approved&rdquo; update from the WSUS server, placing PsExec in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>The WSUS client executes PsExec.</li>
<li>PsExec is used to execute commands or transfer files to other systems on the network.</li>
<li>The attacker uses the compromised systems to gather credentials or move laterally to other high-value targets.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve lateral movement within the network, leading to the compromise of additional systems and sensitive data. This can result in data breaches, financial loss, and reputational damage. The scope of impact depends on the level of access achieved by the attacker and the value of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WSUS PsExec Execution</code> to detect potential WSUS abuse involving PsExec execution.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to gain visibility into process executions, as referenced in the <a href="https://ela.st/sysmon-event-1-setup">setup instructions</a>.</li>
<li>Implement enhanced monitoring and logging for WSUS activities to detect unauthorized changes or updates.</li>
<li>Investigate and remove any unauthorized binaries found in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>Review and restrict the accounts authorized to manage WSUS to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wsus</category><category>psexec</category><category>windows</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Potential Remote File Execution via MSIEXEC</title><link>https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</guid><description>The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a built-in Windows component used for installing, modifying, and removing software. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files, bypassing security controls and potentially leading to initial access or defense evasion. This activity is often part of a broader attack chain, used to deliver and execute malicious payloads. The detection rule provided by Elastic identifies suspicious msiexec.exe activity by monitoring process starts, network connections, and child processes. It filters out known benign signatures and paths to highlight potential misuse. This detection is designed to work with Elastic Defend data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means to execute commands on the target system.</li>
<li>The attacker uses msiexec.exe with the <code>/V</code> parameter to initiate the installation of a remote MSI package. This allows the attacker to bypass typical execution restrictions.</li>
<li>Msiexec.exe attempts a network connection (T1105) to retrieve the remote MSI package from a malicious server.</li>
<li>Msiexec.exe spawns a child process to handle the installation of the downloaded MSI package.</li>
<li>The spawned child process executes malicious code embedded within the MSI package.</li>
<li>The malicious code performs actions such as installing malware, modifying system settings, or establishing persistence.</li>
<li>The attacker leverages the compromised system for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system and network. While this specific rule has a low risk score, it can be an early indicator of more serious attacks. It is crucial to investigate any alerts generated by this rule to determine the full scope and impact of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM to detect suspicious usage of <code>msiexec.exe</code> to install remote packages. Tune the rule for your environment by adding exceptions for legitimate software installation processes.</li>
<li>Enable process monitoring and network connection logging on Windows endpoints to provide the necessary data for the Sigma rule to function effectively (Data Source: Elastic Defend).</li>
<li>Review the &ldquo;Possible investigation steps&rdquo; section in the Elastic rule&rsquo;s documentation to investigate potential false positives and legitimate uses of <code>msiexec.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications, including potentially malicious MSI packages.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>msiexec</category><category>remote-file-execution</category><category>initial-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential Pass-the-Hash (PtH) Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</guid><description>This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.</description><content:encoded><![CDATA[<p>Pass-the-Hash (PtH) is a technique where attackers leverage stolen password hashes to authenticate and move laterally within a Windows environment, bypassing standard system access controls. Instead of needing the plaintext password, adversaries use a hash of the password to authenticate to a remote service or server. This detection rule focuses on identifying potential PtH attempts by monitoring for successful logins using specific user IDs (S-1-5-21-* or S-1-12-1-*) and the <code>seclogo</code> logon process, which is commonly associated with credential theft and misuse. The rule aims to detect anomalous authentication patterns indicating that an attacker is using PtH to gain unauthorized access to systems. This is important because successful PtH attacks can lead to widespread compromise of sensitive data and critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through phishing or exploiting a vulnerability.</li>
<li>The attacker dumps password hashes from the compromised system using tools like Mimikatz.</li>
<li>The attacker identifies a target system within the network.</li>
<li>The attacker uses the stolen password hash to authenticate to the target system using the <code>seclogo</code> logon process.</li>
<li>Windows validates the hash, granting the attacker access without requiring the plaintext password.</li>
<li>The attacker successfully authenticates with the stolen credentials and a user ID matching the pattern S-1-5-21-* or S-1-12-1-*.</li>
<li>The attacker leverages their unauthorized access to move laterally to other systems or access sensitive data.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Pass-the-Hash attacks can lead to significant damage, including unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Organizations can experience financial losses, reputational damage, and operational disruptions. While the specific number of victims is not stated, PtH is a common technique used in many breaches, potentially affecting any organization that relies on Windows authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs as referenced in the setup instructions <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the Sigma rule to your SIEM to detect potential Pass-the-Hash attempts. Tune the rule to account for legitimate uses of the <code>seclogo</code> logon process.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on correlating the successful authentication events with other security logs to identify any lateral movement or access to sensitive systems.</li>
<li>Review and update access controls and permissions for the affected accounts to ensure they adhere to the principle of least privilege after an incident, as detailed in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>Potential Evasion via Windows Filtering Platform Blocking Security Software</title><link>https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</guid><description>Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.</description><content:encoded><![CDATA[<p>The Windows Filtering Platform (WFP) provides APIs and system services for network filtering and packet processing. Attackers can abuse WFP by creating malicious rules to block endpoint security processes, hindering their ability to send telemetry. This can be achieved by tools like Shutter, EDRSilencer, and Nighthawk. This detection rule identifies patterns of blocked network events linked to security software processes, signaling potential evasion tactics. The rule specifically looks for blocked network events linked to processes associated with known security software, aiming to detect and alert on attempts to disable or modify security tools. This behavior is especially concerning as it allows attackers to operate with reduced visibility.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights, necessary to interact with the Windows Filtering Platform.</li>
<li>The attacker uses a tool or script (e.g., leveraging the <code>netsh</code> command or custom WFP API calls) to create a new WFP filter.</li>
<li>The WFP filter is configured to block network traffic originating from specific processes associated with endpoint security software (e.g., <code>elastic-agent.exe</code>, <code>sysmon.exe</code>).</li>
<li>The system begins blocking network communication from the targeted security software.</li>
<li>The attacker executes malicious commands or malware on the system, knowing that security telemetry will be suppressed.</li>
<li>The attacker moves laterally within the network, repeating the WFP filter deployment on other systems to further impair defenses.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using WFP to impair defenses can lead to a significant reduction in the effectiveness of endpoint security solutions. This can result in delayed detection of malicious activities, increased dwell time for attackers, and ultimately, a higher likelihood of successful data breaches or ransomware attacks. With endpoint telemetry blocked, organizations may remain unaware of the ongoing compromise until significant damage has occurred. The number of affected systems can vary depending on the attacker&rsquo;s scope and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review Windows Audit Filtering Platform Connection and Packet Drop events to populate the logs required for the provided EQL rule (logs-system.security*, logs-windows.forwarded*, winlogbeat-*).</li>
<li>Deploy the provided EQL rule to your SIEM to detect suspicious WFP modifications and tune for your environment.</li>
<li>Investigate any alerts generated by the EQL rule, focusing on identifying the specific processes being blocked and the source of the WFP rule modifications.</li>
<li>Regularly review and audit WFP rules to identify any unauthorized or suspicious entries.</li>
<li>Implement strict access controls and monitoring for systems authorized to modify WFP rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-filtering-platform</category><category>endpoint-security</category></item><item><title>Potential DLL Side-Loading via Trusted Microsoft Programs</title><link>https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</guid><description>This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of Windows trusted programs such as WinWord.exe, EXPLORER.EXE, w3wp.exe, and DISM.EXE executing from unusual paths or after being renamed, which may indicate DLL side-loading. DLL side-loading is a defense evasion technique where a malicious DLL is placed in the same directory as a legitimate executable. When the executable runs, it may load the malicious DLL instead of the legitimate one, allowing the attacker to execute arbitrary code within the context of the trusted process. The detection logic focuses on process executions that deviate from standard installation paths. The targeted processes are commonly used and often whitelisted, making this a potent technique for adversaries to bypass security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a trusted Windows program vulnerable to DLL side-loading (WinWord.exe, EXPLORER.EXE, w3wp.exe, or DISM.EXE).</li>
<li>The attacker drops a malicious DLL into a directory where the trusted program is expected to load DLLs from, often alongside a renamed or copied version of the legitimate executable.</li>
<li>Alternatively, the attacker renames the trusted program and places it in a non-standard path.</li>
<li>The attacker executes the renamed or moved trusted program from the non-standard path.</li>
<li>The trusted program loads the malicious DLL due to DLL search order hijacking.</li>
<li>The malicious DLL executes arbitrary code within the context of the trusted process.</li>
<li>The attacker achieves persistence, elevates privileges, or performs other malicious activities, potentially evading detection due to the trusted process context.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DLL side-loading attack allows the attacker to execute arbitrary code within the context of a trusted Microsoft process. This can lead to privilege escalation, persistence, and further compromise of the system. Since the malicious code is running within a trusted process, it can bypass application whitelisting and other security controls, making it difficult to detect. This can lead to data theft, system disruption, or the installation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; to your SIEM to detect suspicious executions of trusted programs from non-standard paths or with modifications.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Review and tune the exclusion paths in the Sigma rule to avoid false positives from legitimate software updates, custom enterprise applications, or virtual environments.</li>
<li>Monitor process execution paths using the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; and investigate any deviations from standard installation paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>dll-side-loading</category><category>windows</category></item><item><title>Potential Active Directory Replication Account Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dcsync-backdoor/</guid><description>Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>nTSecurityDescriptor</code> attribute within Active Directory (AD) objects that grant DCSync-related permissions to a user or computer account. This technique allows attackers to create a persistent backdoor, enabling them to re-obtain access to user and computer account hashes. The modification involves assigning specific GUIDs that represent replication rights (<code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>89e95b76-444d-4c62-991a-0facbeda640c</code>) to an account&rsquo;s security descriptor. This allows the attacker to then use DCSync to retrieve credentials from the domain, effectively bypassing normal authentication mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an account with sufficient privileges to modify Active Directory objects (e.g., Domain Admin).</li>
<li>The attacker uses AD management tools (PowerShell, ADSI Edit, etc.) to target a specific user or computer account.</li>
<li>The attacker modifies the <code>nTSecurityDescriptor</code> attribute of the targeted account.</li>
<li>The attacker grants replication rights to the targeted account by adding specific Access Control Entries (ACEs) containing the GUIDs <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code>, <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code>, and <code>89e95b76-444d-4c62-991a-0facbeda640c</code>.</li>
<li>The attacker uses the DCSync technique, impersonating a domain controller, to request password hashes.</li>
<li>The Active Directory server, believing the request is legitimate due to the granted replication rights, provides the attacker with the requested credential information.</li>
<li>The attacker obtains password hashes for domain users and computers.</li>
<li>The attacker uses the obtained credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to compromise the entire Active Directory domain by gaining access to sensitive credential data. This could lead to complete control over the network, including access to critical systems, sensitive data, and the ability to disrupt business operations. The modification of security descriptors creates a persistent backdoor that can be used repeatedly to harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Directory Service Changes to generate the necessary event logs for detection (<a href="https://ela.st/audit-directory-service-changes)">https://ela.st/audit-directory-service-changes)</a>.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized modifications to the <code>nTSecurityDescriptor</code> attribute. Tune the rule to exclude legitimate administrative accounts or scripts that may perform authorized modifications.</li>
<li>Monitor Windows Security Event Logs (event code 5136) for changes to the <code>nTSecurityDescriptor</code> attribute and investigate any unexpected modifications, focusing on the presence of DCSync-related GUIDs.</li>
<li>Regularly review and audit Active Directory permissions, focusing on accounts with replication rights, to ensure they are legitimate and necessary.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>persistence</category><category>active-directory</category><category>dcsync</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>Detection of VScode Remote Tunneling for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</guid><description>The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the misuse of Visual Studio Code&rsquo;s (VScode) remote tunnel feature to establish unauthorized access or control over systems. While the VScode remote tunnel feature is designed to allow developers to connect to remote environments seamlessly, attackers can abuse this functionality for malicious purposes. The rule specifically looks for the execution of the VScode portable binary with the &ldquo;tunnel&rdquo; command-line option, which is indicative of an attempt to establish a remote tunnel session to either GitHub or a remote VScode instance. Successful exploitation can lead to command and control capabilities, allowing attackers to remotely manage and compromise the affected system. The rule aims to detect this suspicious behavior by monitoring process execution and command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker downloads a portable version of Visual Studio Code (VScode) onto the compromised system.</li>
<li>The attacker executes the VScode binary with the <code>tunnel</code> command-line argument to initiate a remote tunnel session.</li>
<li>The attacker specifies additional arguments such as <code>--accept-server-license-terms</code> to bypass license agreement prompts.</li>
<li>The VScode tunnel attempts to establish a connection to a remote server, potentially a GitHub repository or a remote VScode instance controlled by the attacker.</li>
<li>If successful, the tunnel creates a persistent connection, allowing the attacker to execute commands and transfer files.</li>
<li>The attacker uses the established tunnel to remotely access the compromised system, enabling them to perform malicious activities such as data exfiltration or lateral movement.</li>
<li>The attacker maintains persistent access through the established tunnel, allowing for long-term command and control of the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent command and control channel, enabling them to remotely manage the compromised system. This can lead to data theft, deployment of ransomware, or further lateral movement within the network. While the number of potential victims and specific sectors targeted are not explicitly stated, the widespread use of VScode makes a wide range of organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Attempt to Establish VScode Remote Tunnel&rdquo; rule to detect suspicious VScode tunnel activity in your environment.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data.</li>
<li>Investigate any alerts triggered by the rule, focusing on the command-line arguments and process behaviors to confirm malicious intent.</li>
<li>Monitor network connections originating from VScode processes for unusual or unauthorized connections to external servers.</li>
<li>Review and whitelist legitimate uses of VScode&rsquo;s tunnel feature by authorized developers to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>vscode</category><category>remote-access-tools</category><category>windows</category></item><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)</title><link>https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</link><pubDate>Mon, 04 May 2026 14:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-norton-privesc/</guid><description>A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.</description><content:encoded><![CDATA[<p>CVE-2025-58074 describes a privilege escalation vulnerability affecting Norton Secure VPN when installed through the Microsoft Store. A low-privilege local user can exploit this vulnerability by manipulating files during the installation process. Successful exploitation can lead to arbitrary file deletion and, more critically, elevation of privileges on the affected system. This vulnerability poses a significant risk as it could allow an attacker to gain unauthorized access and control over a system. The vulnerability was reported by Talos and assigned a CVSS v3.1 score of 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privilege user initiates the installation of Norton Secure VPN from the Microsoft Store.</li>
<li>During the installation process, the user leverages their limited privileges to identify a directory or file that will be created/modified by the installer.</li>
<li>The user replaces a legitimate file or creates a junction point/mount point to a protected system directory.</li>
<li>The installer, running with elevated privileges, attempts to write data to the replaced file or the target of the junction/mount point.</li>
<li>Due to the replaced file or manipulated directory, the installer inadvertently deletes arbitrary files in a protected location or writes malicious content to a privileged location.</li>
<li>This malicious file or manipulated registry key is then executed or utilized by a privileged process.</li>
<li>The attacker gains elevated privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-58074 allows a low-privilege user to escalate their privileges to SYSTEM. This could lead to complete compromise of the affected system, including unauthorized access to sensitive data, installation of malware, and modification of system configurations. The impact is significant, as it bypasses standard security controls and allows for persistent and potentially undetectable access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious file modifications during software installations, especially those originating from the Microsoft Store. Use the &ldquo;Detect Suspicious File Replacement During Installation&rdquo; Sigma rule to detect file replacements in common installation directories.</li>
<li>Implement strict access control policies to limit the ability of low-privilege users to modify system files or directories.</li>
<li>Investigate any alerts generated by the &ldquo;Detect Insecure Junction Point Creation&rdquo; Sigma rule, which identifies the creation of junction points by non-administrator users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>vulnerability</category></item><item><title>Microsoft Product Vulnerability CVE-2026-37555</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-37555/</link><pubDate>Sun, 03 May 2026 07:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-37555/</guid><description>CVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.</description><content:encoded><![CDATA[<p>On May 3, 2026, Microsoft published initial information regarding CVE-2026-37555. The advisory indicates a vulnerability exists within a Microsoft product. Due to the limited information available at this time, the specific product affected and the nature of the vulnerability are unknown. Defenders should monitor Microsoft&rsquo;s security update guide for further details as they become available. This initial brief serves as an early notification, and will be updated when more information is released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, a detailed attack chain cannot be constructed at this time. The following steps are a generalized potential attack chain that may be relevant depending on the specific vulnerability details released by Microsoft.</p>
<ol>
<li>Attacker identifies a vulnerable Microsoft product exposed to the network or internet.</li>
<li>Attacker crafts a malicious payload targeting the specific vulnerability (details unknown).</li>
<li>Attacker delivers the payload to the vulnerable product, potentially through a network connection or file upload.</li>
<li>The vulnerable product processes the malicious payload, triggering the vulnerability.</li>
<li>Attacker gains unauthorized access to the system, potentially achieving remote code execution.</li>
<li>Attacker establishes persistence on the compromised system.</li>
<li>Attacker performs lateral movement within the network to compromise additional systems.</li>
<li>Attacker achieves their objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The potential impact of CVE-2026-37555 is currently unknown. Depending on the nature of the vulnerability, successful exploitation could lead to remote code execution, information disclosure, denial of service, or other adverse effects. Organizations should monitor for updates from Microsoft and prioritize patching affected systems as soon as a patch is released.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-37555">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-37555</a>) for updated information on CVE-2026-37555.</li>
<li>When the affected product is announced, deploy the Sigma rules below to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category><category>cve-2026-37555</category></item><item><title>Microsoft CVE-2026-30656 Information Published</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</link><pubDate>Sun, 03 May 2026 07:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-30656-info-published/</guid><description>Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.</description><content:encoded><![CDATA[<p>On May 3, 2026, Microsoft published a security update guide entry for CVE-2026-30656. At this time, no details regarding the nature of the vulnerability, affected products, or potential impact are available. Defenders should monitor Microsoft&rsquo;s security resources for updates and apply patches as they become available. Due to the limited information, creating targeted detections is currently not possible. More information is required to understand the potential attack vectors and develop effective mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of details regarding CVE-2026-30656, a specific attack chain cannot be outlined at this time. The steps below represent a generic exploitation scenario:</p>
<ol>
<li>Initial Access: Attacker identifies a vulnerable system exposed to the network.</li>
<li>Exploitation: Attacker leverages CVE-2026-30656 to execute arbitrary code.</li>
<li>Privilege Escalation: Attacker escalates privileges to gain higher-level access.</li>
<li>Lateral Movement: Attacker moves laterally to other systems on the network.</li>
<li>Persistence: Attacker establishes persistent access to the compromised systems.</li>
<li>Data Exfiltration: Attacker exfiltrates sensitive data from the compromised network.</li>
<li>Impact: Attacker achieves their objective, such as data theft or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-30656 is currently unknown. Depending on the affected product and the nature of the vulnerability, successful exploitation could lead to a range of outcomes, including remote code execution, denial of service, or information disclosure. Without further details, the potential damage is difficult to assess, but defenders should prioritize monitoring for updates from Microsoft and promptly apply any released patches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30656</a>) for updates and technical details regarding CVE-2026-30656.</li>
<li>When details are released, prioritize patching affected systems based on their criticality and exposure.</li>
<li>Review existing security controls and incident response plans to ensure they are adequate for addressing potential exploitation attempts targeting Microsoft products.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category></item><item><title>Increased npm Supply Chain Attacks Targeting SAP Developers</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</link><pubDate>Sat, 02 May 2026 00:10:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-supply-chain/</guid><description>Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.</description><content:encoded><![CDATA[<p>The npm ecosystem is experiencing a surge in sophisticated supply chain attacks following the Shai-Hulud worm in September 2025. Attackers, including TeamPCP, are actively compromising npm packages to gain access to sensitive information and establish persistence within CI/CD pipelines. The attacks have evolved to include wormable propagation, infrastructure-level persistence, and multi-stage payloads designed to evade detection. In April 2026, two campaigns were observed: one included the string &ldquo;Shai-Hulud: The Third Coming,&rdquo; and the other, dubbed &ldquo;Mini Shai-Hulud,&rdquo; targeted the SAP developer ecosystem. The compromised packages are often part of SAP&rsquo;s Cloud Application Programming (CAP) Model and multitarget application (MTA) build toolchain, increasing the likelihood of impacting enterprise developers and CI/CD pipelines with access to cloud credentials and GitHub tokens.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Compromise: Attackers compromise legitimate npm packages, such as @cap-js/sqlite, @cap-js/postgres, @cap-js/db-service, and mbt, by injecting malicious code.</li>
<li>Malicious Code Injection: Compromised packages receive two new files: setup.mjs and execution.js, along with a modified package.json containing a &ldquo;preinstall&rdquo; hook.</li>
<li>Execution of setup.mjs: During the <code>npm install</code> process, the preinstall hook executes setup.mjs, which detects the host OS and architecture.</li>
<li>Bun Runtime Download and Execution: setup.mjs downloads the Bun JavaScript runtime (v1.3.13) from GitHub releases and extracts it to a temporary directory.</li>
<li>Execution of execution.js: The Bun runtime executes execution.js, a large (11.7 MB) obfuscated credential stealer and propagation framework.</li>
<li>Credential Harvesting: execution.js harvests GitHub tokens, npm tokens, environment variables, GitHub Actions secrets, AWS STS identity, Azure Key Vault secrets, GCP Secret Manager values, and Kubernetes service account tokens. It also targets Claude and MCP configuration files and Electrum wallets.</li>
<li>Data Exfiltration: The collected data is compressed, encrypted, and exfiltrated to freshly created public GitHub repositories with randomized names and descriptions.</li>
<li>Propagation: The malware searches for commits containing the keyword &ldquo;OhNoWhatsGoingOnWithGitHub,&rdquo; decodes matching commit messages as a token dead-drop, recovers stolen GitHub tokens, and uses them to spread the malware to other packages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised npm packages can lead to the theft of sensitive credentials, including cloud provider credentials, GitHub tokens, and CI/CD secrets. Successful attacks can result in unauthorized access to cloud infrastructure, code repositories, and deployment pipelines. The Mini Shai-Hulud campaign targeted packages with approximately 570,000 weekly downloads, potentially impacting a large number of SAP developers and enterprise environments. The attackers use stolen credentials to further propagate the malware, increasing the scale and scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Rotate npm tokens and GitHub Personal Access Tokens (PATs) immediately if any affected packages were installed (refer to the list of affected packages in the IOC table).</li>
<li>Monitor npm install processes for unexpected execution of <code>node setup.mjs</code> (see Attack Chain).</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Bun Process Execution&rdquo; to identify potential execution of the Bun runtime from temporary directories.</li>
<li>Monitor network connections for unusual processes connecting to <code>api.github[.]com/search/commits?q=OhNoWhatsGoingOnWithGitHub</code> (see IOCs) to detect potential C2 activity.</li>
<li>Deploy the Sigma rule &ldquo;Detect Github Commit By Claude Email&rdquo; to identify commits authored with the email <code>claude@users.noreply.github.com</code> to detect malicious commits.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>npm</category><category>supply-chain</category><category>credential-theft</category><category>github</category></item><item><title>Microsoft Product Vulnerability CVE-2026-41526</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41526/</link><pubDate>Fri, 01 May 2026 07:35:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41526/</guid><description>CVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.</description><content:encoded><![CDATA[<p>On May 1, 2026, Microsoft published information regarding CVE-2026-41526, a vulnerability affecting an unspecified Microsoft product. At the time of initial publication, detailed information regarding the nature of the vulnerability, its potential impact, and affected products was limited, requiring security professionals to monitor Microsoft&rsquo;s Security Update Guide for further details. Defenders should prioritize investigation of this CVE once specific product and exploitation details become available to assess organizational risk and deploy appropriate mitigations. This brief will be updated as more information is released.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (Hypothetical):</strong> An attacker identifies a vulnerable Microsoft product exposed to the internet.</li>
<li><strong>Exploitation (Hypothetical):</strong> The attacker leverages CVE-2026-41526 to execute arbitrary code on the target system.</li>
<li><strong>Privilege Escalation (Hypothetical):</strong> The attacker escalates privileges to gain SYSTEM level access.</li>
<li><strong>Persistence (Hypothetical):</strong> The attacker establishes persistence using methods such as creating a new service or modifying existing registry keys.</li>
<li><strong>Lateral Movement (Hypothetical):</strong> The attacker moves laterally within the network, compromising additional systems.</li>
<li><strong>Data Exfiltration (Hypothetical):</strong> The attacker exfiltrates sensitive data from the compromised network.</li>
<li><strong>Impact (Hypothetical):</strong> The attacker achieves their final objective, such as deploying ransomware or stealing intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-41526 is currently unknown due to lack of details, but successful exploitation could lead to complete system compromise, data breach, or denial of service. The scope of impact depends on the affected product and its role within the organization&rsquo;s infrastructure. Further analysis will be required upon release of detailed information by Microsoft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41526">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41526</a>) for updates and detailed information regarding CVE-2026-41526.</li>
<li>Identify potential attack vectors based on the affected Microsoft product and deploy appropriate detection rules when information is available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>microsoft</category></item><item><title>Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)</title><link>https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</link><pubDate>Fri, 01 May 2026 07:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</guid><description>CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.</description><content:encoded><![CDATA[<p>CVE-2026-0967 is a denial-of-service (DoS) vulnerability affecting libssh, a library implementing the SSH protocol. The root cause lies in the inefficient processing of regular expressions within the library&rsquo;s code. An attacker could exploit this vulnerability by sending specially crafted input that triggers excessive resource consumption during regular expression matching, leading to a denial of service. Successful exploitation could potentially enable defense evasion by overwhelming security controls and negatively impacting the availability of systems relying on the vulnerable libssh library. The vulnerability affects both Linux and Windows platforms where libssh is used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a service or application utilizing a vulnerable version of libssh.</li>
<li>The attacker crafts a malicious input string designed to trigger inefficient regular expression processing within libssh.</li>
<li>The attacker sends the crafted input to the vulnerable service via a network connection (e.g., SSH).</li>
<li>The libssh library attempts to process the malicious input using its regular expression engine.</li>
<li>The inefficient regular expression causes excessive CPU consumption or memory allocation.</li>
<li>The vulnerable service becomes unresponsive due to resource exhaustion, leading to a denial-of-service condition.</li>
<li>Subsequent legitimate requests to the service are blocked or delayed, further exacerbating the impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0967 can result in a denial-of-service condition, rendering affected services or applications unavailable. The impact scope depends on the role of the affected system. For example, a critical server becoming unavailable could disrupt business operations. While the number of potential victims is unknown, any system utilizing a vulnerable version of libssh is susceptible. The defense evasion aspect could allow attackers to bypass security controls during the DoS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify systems using libssh and determine the installed version.</li>
<li>Apply available patches or updates for libssh to remediate CVE-2026-0967 as released by Microsoft.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Libssh Regex Processing&rdquo; to monitor for potential exploitation attempts.</li>
<li>Monitor CPU and memory usage on systems running libssh for unusual spikes, which may indicate a DoS attack.</li>
<li>Implement rate limiting on services using libssh to mitigate the impact of DoS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>libssh</category><category>CVE-2026-0967</category><category>defense-evasion</category></item><item><title>Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-use-after-free/</guid><description>A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7359 describes a use-after-free vulnerability present in ANGLE (Almost Native Graphics Layer Engine), a crucial component of the Chromium open-source project. This vulnerability impacts applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the provided source does not give specific exploitation details, use-after-free vulnerabilities can allow for arbitrary code execution. Google Chrome has already addressed this vulnerability, and Microsoft Edge has incorporated the fix from Chromium. This vulnerability matters to defenders because successful exploitation could lead to compromise of the browser and potentially the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing JavaScript code that leverages a flaw in ANGLE&rsquo;s memory management.</li>
<li>A user visits the malicious web page through Chrome or Edge.</li>
<li>The JavaScript code triggers the use-after-free vulnerability by freeing a memory object in ANGLE and then attempting to access it again.</li>
<li>This memory corruption leads to a controlled crash or allows the attacker to overwrite memory with arbitrary data.</li>
<li>The attacker leverages the memory overwrite to inject malicious code into the browser process.</li>
<li>The injected code executes within the context of the browser, granting the attacker access to user data, cookies, and other sensitive information.</li>
<li>The attacker may then use this access to perform actions on behalf of the user, such as stealing credentials, installing malware, or spreading the attack to other systems.</li>
<li>The attacker achieves arbitrary code execution on the user&rsquo;s system, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit of CVE-2026-7359 could allow an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, data theft, and potentially full system compromise. The scope of impact is broad, affecting any user who visits a malicious webpage while using a vulnerable version of Chrome or Edge. Since Chrome and Edge are widely used, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WebGL Usage</code> to identify potential exploitation attempts targeting ANGLE via WebGL.</li>
<li>Monitor web server logs for suspicious requests (cs-uri-query) that may be related to the exploitation of CVE-2026-7359.</li>
<li>Ensure that all Chrome and Edge installations are updated to the latest versions to patch CVE-2026-7359.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category><category>cve-2026-7359</category></item><item><title>CVE-2026-7339: Heap Buffer Overflow in WebRTC</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</guid><description>A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7339 is a critical heap buffer overflow vulnerability affecting the WebRTC (Web Real-Time Communication) component in Google Chrome and Microsoft Edge (Chromium-based). This vulnerability stems from improper memory management within WebRTC, potentially allowing a remote attacker to execute arbitrary code by crafting malicious web content. As Microsoft Edge ingests Chromium, it is also vulnerable. Users of Chrome and Edge are affected. Defenders should apply available patches promptly to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious website designed to trigger the WebRTC vulnerability.</li>
<li>The victim visits the malicious website using a vulnerable version of Chrome or Edge.</li>
<li>The website uses JavaScript to initiate a WebRTC session.</li>
<li>The crafted WebRTC data triggers a heap buffer overflow during memory allocation within the WebRTC component.</li>
<li>The overflow overwrites adjacent memory regions on the heap.</li>
<li>The attacker carefully crafts the overflow data to overwrite critical program data or function pointers.</li>
<li>The corrupted data leads to arbitrary code execution within the context of the browser process.</li>
<li>The attacker gains control of the user&rsquo;s browser and potentially the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7339 can lead to arbitrary code execution, allowing an attacker to potentially install malware, steal sensitive information, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability could impact a large number of users across various sectors, including individuals, businesses, and government organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge (Chromium-based) to patch CVE-2026-7339.</li>
<li>Deploy the Sigma rule &ldquo;Detect WebRTC Heap Overflow Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-7339.</li>
<li>Monitor web server logs for unusual requests or patterns associated with WebRTC usage that could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>webrtc</category><category>heap-overflow</category><category>code-execution</category><category>cve-2026-7339</category></item><item><title>Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-uaf/</guid><description>CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7355 is a critical use-after-free vulnerability residing in the Media component of the Chromium browser engine. This vulnerability affects Google Chrome and Microsoft Edge, as Edge incorporates Chromium. A use-after-free vulnerability occurs when an application attempts to use memory after it has been freed, which can lead to crashes, arbitrary code execution, or other unexpected behavior. Successful exploitation could allow an attacker to execute arbitrary code within the context of the browser. This vulnerability was reported and patched by the Chromium project.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage containing specially crafted media content.</li>
<li>A user opens the malicious webpage in a vulnerable version of Chrome or Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the use-after-free vulnerability in the Media component.</li>
<li>The vulnerable code attempts to access a freed memory region.</li>
<li>The attacker gains control of the memory region due to the use-after-free condition.</li>
<li>The attacker injects malicious code into the controlled memory region.</li>
<li>The browser executes the attacker-controlled code.</li>
<li>The attacker achieves arbitrary code execution within the context of the browser process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7355 can lead to arbitrary code execution within the context of the browser process. An attacker could potentially gain control of the user&rsquo;s system, steal sensitive information, or install malware. Given the widespread use of Chrome and Edge, a successful exploit could impact a large number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7355.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Use-After-Free in Media Component&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging to capture events related to potential exploitation attempts, facilitating detection rule functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>cve-2026-7355</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</guid><description>CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7357 is a critical use-after-free vulnerability residing within the GPU component of the Chromium rendering engine. This flaw directly impacts Google Chrome and, due to Microsoft Edge&rsquo;s reliance on Chromium, also affects Edge users. A remote attacker could potentially exploit this vulnerability to execute arbitrary code on a targeted system. The vulnerability stems from improper memory management within the GPU processing routines. While the specific exploitation details are not provided in this brief, successful exploitation generally involves crafting malicious web content to trigger the vulnerability during GPU operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that triggers specific GPU functions.</li>
<li>User visits the malicious website using Chrome or Edge.</li>
<li>The browser&rsquo;s rendering engine processes the malicious JavaScript, leading to the allocation and subsequent freeing of a memory region in the GPU component.</li>
<li>The attacker&rsquo;s JavaScript code then attempts to access the previously freed memory region, triggering the use-after-free vulnerability.</li>
<li>By manipulating the memory layout, the attacker can overwrite the freed memory with controlled data.</li>
<li>The overwritten memory is later accessed by the GPU, leading to the execution of attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker leverages the code execution to escalate privileges or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7357 can lead to arbitrary code execution on the victim&rsquo;s machine. The attacker could potentially install malware, steal sensitive data, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability poses a significant risk to a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7357.</li>
<li>Apply the latest security updates for Microsoft Edge to address CVE-2026-7357.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WebAssembly Execution&rdquo; to identify potential exploitation attempts involving WebAssembly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</guid><description>CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7333 is a critical use-after-free vulnerability residing in the GPU component of the Chromium browser engine. This flaw allows an attacker to potentially corrupt memory and execute arbitrary code in the context of the browser process. As Microsoft Edge is built upon the Chromium engine, it is also susceptible to this vulnerability. Public details are limited, but exploitation likely involves crafting malicious web content that triggers the use-after-free condition within the GPU processing routines. This vulnerability poses a significant threat as it could allow attackers to compromise user systems simply by visiting a malicious website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that interacts with the GPU functionality of the browser.</li>
<li>The user visits the malicious page via a phishing email or drive-by download.</li>
<li>The JavaScript code triggers the use-after-free vulnerability in the Chromium GPU component.</li>
<li>The vulnerability allows the attacker to corrupt memory allocated for GPU processing.</li>
<li>The attacker manipulates memory to gain control of program execution.</li>
<li>The attacker injects malicious code into the browser process.</li>
<li>The injected code executes with the privileges of the browser process, allowing the attacker to perform actions such as stealing cookies, credentials, or installing malware.</li>
<li>The attacker gains persistent access to the compromised system and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-7333 could allow an attacker to execute arbitrary code on a user&rsquo;s system. This could lead to the theft of sensitive information, installation of malware, or complete system compromise. Given the widespread use of Chromium-based browsers such as Chrome and Edge, this vulnerability has the potential to affect millions of users. The impact is considered critical due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7333.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious GPU Process Creation&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging with command-line arguments to detect suspicious processes spawned by the browser (logsource: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>use-after-free</category><category>chromium</category><category>gpu</category><category>cve-2026-7333</category><category>remote code execution</category></item><item><title>Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</guid><description>CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7348 is a critical use-after-free vulnerability residing within the Codecs component of the Chromium browser engine. This vulnerability affects applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the specific details of the vulnerability are documented in Google Chrome Releases, the underlying issue stems from improper memory management within the Codecs library. Successful exploitation could allow an attacker to execute arbitrary code within the context of the affected browser, potentially leading to data theft, system compromise, or other malicious activities. This vulnerability requires immediate attention from organizations utilizing Chrome or Edge.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing specially crafted media content designed to trigger the use-after-free condition in the Codecs library.</li>
<li>The user visits the malicious web page using Google Chrome or Microsoft Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the vulnerable code path within the Codecs library.</li>
<li>The use-after-free condition is triggered when the browser attempts to access memory that has already been freed.</li>
<li>The attacker leverages the use-after-free condition to corrupt memory and gain control of program execution.</li>
<li>The attacker injects and executes arbitrary code within the context of the browser process.</li>
<li>The attacker gains unauthorized access to sensitive data, such as cookies, credentials, or browsing history.</li>
<li>The attacker potentially escalates privileges or installs malware on the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7348 allows an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, such as credentials or browsing history. The attacker could potentially gain full control of the user&rsquo;s system. Given the widespread use of Chromium-based browsers, a successful exploit could impact a significant number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to the latest version that addresses this vulnerability; refer to <a href="https://chromereleases.googleblog.com/2025">Google Chrome Releases</a>.</li>
<li>Ensure Microsoft Edge is updated to the latest version incorporating the Chromium security patch.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Codecs Use-After-Free Exploit Attempt&rdquo; to identify potential exploitation attempts via webserver logs.</li>
<li>Enable webserver logging to capture HTTP requests, which is required for the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>vulnerability</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-cve-2026-7349/</guid><description>CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7349 is a use-after-free vulnerability found in the Cast component of the Chromium browser engine. This vulnerability affects Google Chrome and, by extension, Microsoft Edge, as Edge is built upon Chromium. Use-after-free vulnerabilities can allow an attacker to execute arbitrary code or cause a denial-of-service. While the original report comes from Chrome, the nature of Chromium&rsquo;s shared codebase means that other Chromium-based browsers are also vulnerable. Successful exploitation of this vulnerability could lead to code execution within the context of the browser process. Defenders need to prioritize patching and monitoring for unusual browser behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage designed to trigger the use-after-free vulnerability in the Cast component.</li>
<li>The user visits the malicious webpage using a vulnerable version of Chrome or Edge.</li>
<li>The Cast component attempts to access a freed memory location.</li>
<li>The attacker exploits the use-after-free condition to corrupt memory.</li>
<li>The attacker overwrites a function pointer or other critical data structure in memory.</li>
<li>The attacker triggers the execution of the corrupted function pointer or data structure.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker could potentially escalate privileges or perform other malicious activities, such as installing malware or stealing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7349 could allow an attacker to execute arbitrary code within the context of the browser, potentially leading to data theft, malware installation, or further system compromise. Given the widespread use of Chrome and Edge, this vulnerability has a significant impact. The specific number of potential victims is dependent on the speed of patching, but could potentially affect millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7349.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor browser process execution for unexpected code loading or memory access patterns using process creation logs.</li>
<li>Implement memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>browser</category><category>chromium</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</guid><description>CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7338 is a critical use-after-free vulnerability residing within the Cast component of the Chromium browser engine. Google Chrome and Microsoft Edge (Chromium-based) are both affected by this flaw. While the provided source does not specify the exact vulnerable versions, it indicates that Microsoft Edge ingests Chromium, and thus is affected by vulnerabilities addressed in Chromium releases. Successful exploitation of this vulnerability could lead to arbitrary code execution in the context of the user running the browser. This poses a significant risk, as attackers could potentially gain control of the user&rsquo;s system. Defenders should prioritize patching affected browsers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage or injects malicious code into a legitimate website that utilizes the Cast functionality.</li>
<li>The victim visits the malicious website or interacts with the compromised legitimate website using an affected browser (Chrome or Edge).</li>
<li>The malicious webpage triggers the use-after-free vulnerability in the Cast component.</li>
<li>The vulnerability allows the attacker to access memory that has already been freed.</li>
<li>The attacker overwrites the freed memory with attacker-controlled data.</li>
<li>The attacker manipulates the memory layout to redirect program execution.</li>
<li>The browser attempts to execute code from the attacker-controlled memory location.</li>
<li>This results in arbitrary code execution within the context of the browser process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7338 allows an attacker to execute arbitrary code on a victim&rsquo;s machine. This can lead to complete system compromise, data theft, installation of malware, or other malicious activities. Given the widespread use of Chromium-based browsers like Chrome and Edge, this vulnerability has the potential to impact a large number of users across various sectors. The severity is critical due to the potential for remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7338 as detailed in Google Chrome Releases.</li>
<li>Apply the latest security updates for Microsoft Edge (Chromium-based) to address CVE-2026-7338, ensuring the ingested Chromium version contains the fix.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting the Cast component.</li>
<li>Enable enhanced browser security features, such as sandboxing and site isolation, to limit the impact of potential exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chrome</category><category>edge</category><category>cve-2026-7338</category><category>remote code execution</category></item><item><title>Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</guid><description>CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7353 is a critical heap buffer overflow vulnerability residing within the Skia graphics library, a core component of the Chromium open-source project. This vulnerability impacts applications that utilize Chromium, including Google Chrome and Microsoft Edge. While the specific details of exploitation are not provided in this brief, the nature of a heap buffer overflow suggests a high potential for arbitrary code execution. Successful exploitation could allow an attacker to gain control of the affected browser process. Given the widespread use of Chromium-based browsers, this vulnerability poses a significant risk to a large user base. Defenders should prioritize patching and consider implementing mitigations to detect and prevent potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page or injects malicious content into a trusted website.</li>
<li>The victim visits the malicious web page or interacts with the injected content using a Chromium-based browser (Chrome or Edge).</li>
<li>The browser&rsquo;s rendering engine, utilizing the Skia library, processes the malicious content, triggering the heap buffer overflow in Skia.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions in the heap.</li>
<li>By carefully crafting the overflowed data, the attacker can overwrite critical data structures within the browser process.</li>
<li>The attacker gains control of the execution flow by overwriting function pointers or other control data.</li>
<li>The attacker executes arbitrary code within the context of the browser process.</li>
<li>The attacker could then perform actions such as installing malware, stealing sensitive data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7353 allows for arbitrary code execution within the context of the affected browser process. This can lead to a complete compromise of the user&rsquo;s browser session, potentially enabling the attacker to steal credentials, inject malicious code into other websites, or install malware on the victim&rsquo;s system. Given the widespread use of Chrome and Edge, the potential impact is significant, affecting potentially millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7353.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts based on suspicious process execution originating from the browser (see &ldquo;Detect Suspicious Process Creation from Browser&rdquo;).</li>
<li>Enable enhanced browser security features such as site isolation to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap overflow</category><category>chromium</category><category>cve-2026-7353</category></item><item><title>Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</link><pubDate>Thu, 30 Apr 2026 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-email-phishing-trends/</guid><description>In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.</description><content:encoded><![CDATA[<p>In the first quarter of 2026, Microsoft Threat Intelligence observed a significant rise in email-based phishing threats, totaling approximately 8.3 billion. This increase was driven by surges in QR code phishing (more than doubling over the period), CAPTCHA-gated phishing, and credential phishing attacks. Microsoft&rsquo;s Digital Crime Unit successfully disrupted the Tycoon2FA phishing-as-a-service (PhaaS) platform in early March, leading to a 15% reduction in associated email volume. However, threat actors adapted by shifting hosting providers and domain registration patterns. Business email compromise (BEC) also remained a prevalent threat, with approximately 10.7 million attacks recorded during the quarter, often characterized by low-effort, generic outreach messages. Microsoft Defender Research has also noted the emergence of AI-enabled device code phishing campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Email Delivery:</strong> Attackers send phishing emails impersonating legitimate services or organizations. These emails may contain links, QR codes, or HTML attachments.</li>
<li><strong>Victim Interaction:</strong> The victim opens the email and clicks on a malicious link or scans a QR code, redirecting them to a phishing page.</li>
<li><strong>Phishing Page Redirection:</strong> The phishing page mimics a legitimate login portal, such as Microsoft 365 or other enterprise applications.</li>
<li><strong>Credential Harvesting:</strong> The victim enters their username and password on the phishing page, which are then captured by the attacker.</li>
<li><strong>MFA Bypass (AiTM):</strong> For attacks using adversary-in-the-middle (AiTM) techniques (like those facilitated by Tycoon2FA), the attacker intercepts the MFA code and uses it to authenticate.</li>
<li><strong>Account Compromise:</strong> With the stolen credentials and MFA code (if applicable), the attacker gains unauthorized access to the victim&rsquo;s account.</li>
<li><strong>Lateral Movement/Data Theft:</strong> The attacker uses the compromised account to access sensitive data, send further phishing emails, or move laterally within the organization.</li>
<li><strong>Business Email Compromise:</strong> In BEC attacks, attackers use compromised accounts or spoofed email addresses to send fraudulent invoices or requests for wire transfers.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed email threats in Q1 2026 led to a high risk of credential compromise, financial loss through BEC attacks, and potential data breaches across various sectors. Although the total number of victims is not specified, the billions of phishing attempts indicate a widespread impact. Microsoft&rsquo;s disruption of Tycoon2FA temporarily reduced phishing volumes by 15%, demonstrating the potential for proactive intervention to mitigate these threats. However, threat actors are quickly adapting their techniques, indicating the need for continued vigilance and enhanced security measures. The 10.7 million BEC attacks alone represent a significant financial threat to businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Tycoon2FA Phishing Attempts&rdquo; Sigma rule to identify email campaigns associated with the Tycoon2FA platform.</li>
<li>Enable Microsoft Defender detections to improve detection of phishing emails and malicious payloads.</li>
<li>Monitor email traffic for suspicious domain registrations, particularly those using newer generic top-level domains (TLDs) such as .DIGITAL, .BUSINESS, .CONTRACTORS, .CEO, and .COMPANY, and the resurgence of .RU registrations, to identify potential Tycoon2FA infrastructure shifts.</li>
<li>Educate users about the dangers of QR code phishing and CAPTCHA-gated attacks, emphasizing the importance of verifying the legitimacy of login pages and email senders, to reduce the effectiveness of phishing campaigns (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>email</category><category>phishing</category><category>credential-theft</category><category>Tycoon2FA</category><category>BEC</category></item><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>ABB Ability OPTIMAX Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</guid><description>CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14510, affects ABB Ability OPTIMAX versions that utilize Azure Active Directory (Azure AD) for Single-Sign On (SSO) authentication. This flaw stems from an incorrect implementation of the authentication algorithm, potentially allowing attackers to bypass the Azure AD authentication mechanism and gain unauthorized access to the OPTIMAX system. The affected versions include ABB Ability OPTIMAX 6.1 and 6.2 (all versions), 6.3 versions prior to 6.3.1-251120, and 6.4 versions prior to 6.4.1-251120. Successful exploitation could lead to significant disruption in energy, water, and wastewater sectors. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an ABB Ability OPTIMAX installation using Azure AD SSO with a vulnerable version (6.1, 6.2, 6.3 &lt; 6.3.1-251120, or 6.4 &lt; 6.4.1-251120).</li>
<li>The attacker crafts a malicious authentication request, exploiting the incorrect implementation of the authentication algorithm (CWE-303).</li>
<li>The crafted request bypasses the expected Azure AD authentication checks within OPTIMAX.</li>
<li>OPTIMAX incorrectly validates the attacker&rsquo;s session, granting them access to the system.</li>
<li>The attacker leverages their unauthorized access to gain control over OPTIMAX functionalities.</li>
<li>The attacker can then modify control parameters, manipulate data, or disrupt operations within the connected industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14510 enables unauthorized access to ABB Ability OPTIMAX systems, potentially leading to severe consequences in critical infrastructure sectors such as energy, water, and wastewater. An attacker could manipulate industrial processes, disrupt critical services, or cause significant financial and operational damage. Given the widespread deployment of ABB Ability OPTIMAX systems globally, a successful campaign exploiting this vulnerability could have far-reaching impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update ABB Ability OPTIMAX to fixed versions (6.3.1-251120 and later) to remediate CVE-2025-14510.</li>
<li>Refer to ABB PSIRT security advisory 9AKK108472A1331 for detailed mitigation steps and recommendations.</li>
<li>Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet, as per CISA&rsquo;s recommended practices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>ics</category><category>vulnerability</category></item><item><title>Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-windows-rpc-privesc/</link><pubDate>Thu, 30 Apr 2026 11:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-windows-rpc-privesc/</guid><description>A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.</description><content:encoded><![CDATA[<p>An unpatched vulnerability exists within the Microsoft Windows Remote Procedure Call (RPC) service. This vulnerability allows a local attacker to escalate their privileges on a vulnerable system. The specific details of the vulnerability are not disclosed, but successful exploitation would allow an attacker to perform actions with elevated permissions, potentially leading to complete system compromise. This poses a significant risk to systems where unauthorized users have local access. Defenders should prioritize detection and mitigation strategies to address this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a Windows system through some method.</li>
<li>Attacker identifies the presence of the unpatched Windows RPC vulnerability.</li>
<li>Attacker crafts a malicious RPC request designed to exploit the vulnerability.</li>
<li>The malicious RPC request is sent to the Windows RPC service.</li>
<li>The Windows RPC service processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to execute code with elevated privileges (e.g., SYSTEM).</li>
<li>Attacker leverages elevated privileges to install malware, modify system configurations, or access sensitive data.</li>
<li>Attacker establishes persistent access and expands their control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to SYSTEM. This allows the attacker to perform any action on the system, including installing malware, creating new accounts with administrative privileges, accessing sensitive data, and disrupting system operations. The impact is critical, as a successful attack can lead to complete system compromise and potential data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation monitoring to detect suspicious processes spawned by the RPC service (see rules below).</li>
<li>Monitor for unusual registry modifications that might indicate privilege escalation attempts (see rules below).</li>
<li>Continuously monitor Microsoft&rsquo;s security advisories for a patch addressing this Windows RPC vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>windows</category><category>unpatched-vulnerability</category></item><item><title>OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</link><pubDate>Thu, 30 Apr 2026 08:46:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cups-path-traversal/</guid><description>CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.</description><content:encoded><![CDATA[<p>CVE-2026-34978 is a path traversal vulnerability affecting OpenPrinting CUPS, a modular printing system that allows a computer to act as a print server. The vulnerability exists within the RSS notify-recipient-uri functionality, which improperly validates file paths. By crafting a malicious URI, an attacker can write files outside the intended CacheDir/rss directory. This can lead to the overwriting of critical system files, such as job.cache, potentially disrupting print services and, in some scenarios, leading to arbitrary code execution. This vulnerability was disclosed by Microsoft and requires immediate attention from system administrators to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious RSS notify-recipient-uri containing a path traversal sequence (e.g., &ldquo;../&rdquo;).</li>
<li>The crafted URI is submitted to the CUPS server through a print job request or a configuration setting.</li>
<li>CUPS processes the URI and attempts to write a file to the specified location.</li>
<li>Due to the path traversal vulnerability, the file is written outside the intended CacheDir/rss directory.</li>
<li>The attacker overwrites a critical file, such as job.cache, with malicious content.</li>
<li>The CUPS server attempts to access the overwritten file.</li>
<li>If job.cache is successfully overwritten, the attacker can gain control of the print queue or cause a denial of service by corrupting the print system&rsquo;s state.</li>
<li>In a more advanced scenario, the attacker could potentially achieve arbitrary code execution by overwriting other binaries or configuration files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34978 can lead to denial of service by corrupting the printing system state. By overwriting critical CUPS files, an attacker can disrupt printing services. In more critical scenarios, the vulnerability could be leveraged to achieve arbitrary code execution, potentially allowing the attacker to gain complete control over the affected system. The scope of the impact is dependent on the permissions of the CUPS process and the specific files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by OpenPrinting to address CVE-2026-34978.</li>
<li>Monitor CUPS server logs for suspicious activity related to file writes outside the CacheDir/rss directory. Consider deploying the provided Sigma rule <code>Detect CUPS Path Traversal File Write</code> to identify such attempts.</li>
<li>Implement strict input validation on any user-supplied data that is used to construct file paths within CUPS.</li>
<li>Regularly review and audit CUPS configuration settings to ensure that they are secure and do not allow for path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cups</category><category>cve-2026-34978</category><category>file write</category></item><item><title>CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chacha-integer-underflow/</guid><description>CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.</description><content:encoded><![CDATA[<p>CVE-2026-5778 is a critical security vulnerability affecting an unspecified Microsoft product. This vulnerability stems from an integer underflow within the ChaCha decryption process. While the specific product affected is not detailed in the initial advisory, the vulnerability&rsquo;s nature suggests a potential impact on any Microsoft software utilizing ChaCha for encryption or decryption purposes. Successful exploitation of this vulnerability could lead to out-of-bounds memory access, potentially allowing attackers to execute arbitrary code or cause a denial-of-service condition. This vulnerability highlights the importance of secure coding practices and rigorous testing in cryptographic implementations. Defenders should monitor for updates and apply patches as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input designed to trigger the ChaCha decryption routine within the vulnerable Microsoft product.</li>
<li>The malicious input exploits a weakness in the bounds checking logic related to the ChaCha algorithm.</li>
<li>During the decryption process, a specially crafted integer value underflows.</li>
<li>This integer underflow results in an incorrect memory address calculation.</li>
<li>The incorrect memory address calculation leads to an out-of-bounds memory access.</li>
<li>The out-of-bounds access allows the attacker to read sensitive data or overwrite memory locations.</li>
<li>By overwriting critical memory locations, the attacker can potentially inject and execute arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5778 can have severe consequences, including arbitrary code execution and denial of service. The impact will vary depending on the affected product and the specific context of the vulnerability. If exploited, this vulnerability could allow an attacker to gain complete control of a system or disrupt its availability, leading to significant data loss, system compromise, and reputational damage. The lack of specific victim and sector information makes assessing the scope difficult, but all organizations using Microsoft products should consider this a high-priority vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s security update guide for specific product advisories related to CVE-2026-5778 and apply patches immediately upon release.</li>
<li>Implement runtime memory protection mechanisms to detect and prevent out-of-bounds memory access attempts.</li>
<li>Deploy the Sigma rule below to detect suspicious processes that may be exploiting this vulnerability via memory access patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer-underflow</category><category>memory-corruption</category><category>cve</category></item><item><title>CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tls-keyupdate-dos/</guid><description>CVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-32283 describes a vulnerability within the crypto/tls component related to the processing of TLS 1.3 KeyUpdate records. The core issue stems from the lack of proper authentication for these KeyUpdate records. An attacker exploiting this flaw can send unauthenticated KeyUpdate records to a vulnerable server. The server, upon processing these records, may retain connections persistently or enter a denial-of-service (DoS) state due to resource exhaustion. This vulnerability poses a significant risk to systems relying on TLS 1.3 for secure communication. While the specific vulnerable products are not detailed in the source, the report does mention Microsoft as the affected vendor. Defenders must identify and patch the vulnerable crypto/tls implementations to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a TLS 1.3 connection with a vulnerable server.</li>
<li>Attacker crafts a malicious TLS 1.3 KeyUpdate record without proper authentication.</li>
<li>Attacker sends the unauthenticated KeyUpdate record to the target server over the established TLS connection.</li>
<li>The vulnerable crypto/tls implementation on the server processes the malformed KeyUpdate record.</li>
<li>Due to the lack of proper validation, the server&rsquo;s connection state becomes inconsistent.</li>
<li>The server retains the connection persistently due to the invalid state.</li>
<li>Attacker repeats steps 2-6 to exhaust server resources with numerous persistent connections.</li>
<li>The server enters a denial-of-service (DoS) condition, becoming unresponsive to legitimate requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32283 can lead to a denial-of-service condition, rendering affected servers unavailable. The number of affected victims will vary based on the deployment of vulnerable crypto/tls implementations. Services relying on TLS 1.3 for secure communication are at risk. If the attack succeeds, legitimate users will be unable to access the affected services, potentially causing significant disruption and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems using the crypto/tls component from Microsoft to determine if they are vulnerable to CVE-2026-32283.</li>
<li>Apply the security updates released by Microsoft to patch CVE-2026-32283 on all affected systems as soon as they are available, according to the Microsoft Security Update Guide.</li>
<li>Monitor network traffic for suspicious TLS KeyUpdate records, focusing on malformed or unauthenticated packets using a network intrusion detection system (NIDS).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>tls</category><category>crypto/tls</category></item><item><title>CVE-2026-28388 NULL Pointer Dereference in Delta CRL Processing</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-28388/</link><pubDate>Thu, 30 Apr 2026 08:43:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-28388/</guid><description>CVE-2026-28388 is a NULL Pointer Dereference vulnerability in an unspecified Microsoft product when processing a Delta CRL, potentially leading to a denial-of-service condition.</description><content:encoded><![CDATA[<p>CVE-2026-28388 is a newly disclosed vulnerability affecting a Microsoft product related to the processing of Delta Certificate Revocation Lists (CRLs). This vulnerability is classified as a NULL Pointer Dereference, a type of error that can occur when a program attempts to access a memory location through a null pointer. While the specific product and its versions affected remain undisclosed in the initial advisory, the potential impact could be significant for systems that rely on CRLs for certificate validation. Successful exploitation of this vulnerability could lead to a denial-of-service condition. Defenders should monitor Microsoft&rsquo;s updates for further details and apply patches promptly when available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the limited information, we can infer a general attack chain based on typical NULL pointer dereference exploitation:</p>
<ol>
<li>An attacker crafts a malicious Delta CRL.</li>
<li>The affected Microsoft product attempts to process this CRL.</li>
<li>During processing, the software encounters a null pointer due to a parsing error or unexpected structure within the malicious CRL.</li>
<li>The software attempts to dereference this null pointer, causing an exception.</li>
<li>The exception leads to a crash of the affected service or application.</li>
<li>Repeated crashes of the service result in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-28388 could result in a denial-of-service condition. The absence of details regarding affected products and specific exploitation vectors limits a complete impact assessment. Systems that heavily rely on CRL validation, such as those in Public Key Infrastructure (PKI) environments, are potentially more vulnerable. The lack of specific victim data makes it difficult to estimate the potential scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s Security Update Guide for updates regarding affected products and available patches for CVE-2026-28388.</li>
<li>Implement network monitoring to detect anomalies in CRL traffic that could be indicative of malicious CRLs being distributed, focusing on unusual CRL sizes or frequent requests for the same CRL.</li>
<li>Deploy the Sigma rule below to detect potential crashes related to CRL processing. Review and tune the rule for your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-28388</category><category>denial-of-service</category><category>certificate revocation list</category></item><item><title>Microsoft Published Information on CVE-2026-32777</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32777/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32777/</guid><description>Microsoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.</description><content:encoded><![CDATA[<p>On April 30, 2026, Microsoft released a security update guide entry for CVE-2026-32777. At the time of this publication, the vulnerability details, affected products, and potential attack vectors remain undisclosed. This early notification serves as an alert for security teams to prepare for future announcements and potential patching efforts. Due to the lack of specifics, organizations should monitor Microsoft&rsquo;s security update guide for further details and prioritize updates accordingly once more information becomes available. The impact of this vulnerability is currently unknown, pending further details from Microsoft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of available information, it is not possible to define an attack chain at this time. Once details regarding the vulnerability and potential exploitation methods are released by Microsoft, the following attack chain will be updated.</p>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-32777 is currently unknown. Awaiting further details from Microsoft.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center for updates regarding CVE-2026-32777.</li>
<li>Prepare patching procedures for Microsoft products in the event of a critical vulnerability announcement.</li>
</ul>
]]></content:encoded><category domain="severity">informational</category><category domain="type">advisory</category><category>cve-2026-32777</category><category>vulnerability</category></item><item><title>Microsoft Published Information on CVE-2026-32776</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32776/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32776/</guid><description>Microsoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.</description><content:encoded><![CDATA[<p>On April 30, 2026, Microsoft published initial information regarding CVE-2026-32776. At this time, specific details about the vulnerability, its potential impact, and affected products are not readily available without enabling JavaScript on the Microsoft Security Response Center page. This lack of immediate information presents a challenge for defenders, as it limits the ability to proactively assess and mitigate potential risks associated with this CVE. Further analysis will be required once the vulnerability details are fully disclosed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, a specific attack chain cannot be constructed at this time.
Detailed steps will be added following the release of comprehensive vulnerability information by Microsoft.</p>
<h2 id="impact">Impact</h2>
<p>The potential impact of CVE-2026-32776 remains unknown at this time due to the limited details released by Microsoft. Once the vulnerability details are available, the potential impact can be assessed, including the scope of affected systems, potential data breaches, and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center for updated information on CVE-2026-32776.</li>
<li>Once details are available, assess the impact on your environment and prioritize patching (CVE-2026-32776).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category></item><item><title>Microsoft CVE-2026-32778 Vulnerability Published</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32778/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-32778/</guid><description>Microsoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.</description><content:encoded><![CDATA[<p>On April 30, 2026, Microsoft published an advisory for CVE-2026-32778.
At the time of publication, there are no details available regarding the specifics of this vulnerability.
This brief serves as an initial notification to detection engineering teams to monitor for updates to the CVE and prepare for potential exploitation attempts.
As Microsoft releases further information, this brief will be updated with relevant details and detection strategies.
The lack of information prevents detailed analysis, but proactive monitoring is crucial.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the absence of vulnerability details, a specific attack chain cannot be constructed at this time.
A typical software vulnerability exploitation attack chain might include the following steps, but these are purely hypothetical and may not apply to CVE-2026-32778:</p>
<ol>
<li>Initial Access: An attacker identifies a vulnerable service or application related to CVE-2026-32778.</li>
<li>Exploitation: The attacker sends a crafted request to trigger the vulnerability, potentially involving malformed data or specific API calls.</li>
<li>Code Execution: Successful exploitation allows the attacker to execute arbitrary code on the target system.</li>
<li>Persistence: The attacker establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>Privilege Escalation: The attacker attempts to elevate privileges to gain SYSTEM or Administrator access.</li>
<li>Lateral Movement: The attacker moves laterally to other systems on the network, using techniques like Pass-the-Hash or credential dumping.</li>
<li>Data Exfiltration: The attacker exfiltrates sensitive data from the compromised systems.</li>
<li>Impact: The attacker achieves their final objective, such as data theft, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-32778 is currently unknown. Depending on the affected component and the nature of the vulnerability, successful exploitation could lead to a range of outcomes, including remote code execution, denial of service, information disclosure, or privilege escalation. The number of potential victims and affected sectors cannot be determined until more information is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s Security Update Guide for updates to CVE-2026-32778 (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32778">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32778</a>).</li>
<li>Review existing security controls and logging configurations to ensure adequate visibility into system activity.</li>
<li>Once details of CVE-2026-32778 become available, prioritize patching and implement appropriate detection measures based on the specific vulnerability characteristics.</li>
<li>Consider deploying generic rules that look for exploitation attempts (see example Sigma rules below) and tune them once more info is available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category></item><item><title>CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-34073/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-34073/</guid><description>CVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.</description><content:encoded><![CDATA[<p>CVE-2026-34073 describes a security vulnerability related to incomplete DNS name constraint enforcement affecting an unspecified Microsoft product. The vulnerability lies in the improper validation of peer names against DNS name constraints during certificate validation. An attacker could potentially exploit this flaw to bypass security checks and impersonate legitimate servers or services. Further details regarding the specific affected products and exploitation scenarios are currently unavailable but are anticipated to be released by Microsoft. Defenders should closely monitor Microsoft&rsquo;s official communication channels for updates and guidance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>As the vulnerability details are limited, the following attack chain is based on a generalized understanding of how incomplete DNS name constraint enforcement could be exploited.</p>
<ol>
<li>An attacker crafts a malicious certificate with a DNS name that is designed to bypass the incomplete constraint enforcement.</li>
<li>The attacker sets up a rogue server or service using the crafted certificate.</li>
<li>A client application (potentially within the Microsoft ecosystem) attempts to establish a secure connection with the attacker&rsquo;s server.</li>
<li>During the TLS handshake, the client application receives the malicious certificate.</li>
<li>Due to the incomplete DNS name constraint enforcement, the client application incorrectly validates the certificate as trusted.</li>
<li>A secure connection is established between the client and the attacker&rsquo;s server.</li>
<li>The attacker intercepts or manipulates data transmitted over the &ldquo;secure&rdquo; connection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34073 could allow an attacker to perform man-in-the-middle attacks, intercept sensitive data, or impersonate legitimate services. The specific impact depends on the affected product and the context in which the vulnerability is exploited. Given the potential for widespread impact within Microsoft environments, this vulnerability is considered high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft&rsquo;s Security Update Guide for specific product advisories and patches related to CVE-2026-34073 (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34073)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34073)</a>.</li>
<li>Deploy any available patches or workarounds as soon as they are released by Microsoft to mitigate the risk of exploitation.</li>
<li>Implement network monitoring to detect anomalous TLS certificate exchanges that may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>certificate validation</category><category>man-in-the-middle</category><category>dns name constraint</category><category>tls</category><category>cve-2026-34073</category></item><item><title>CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</guid><description>CVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-1005 describes an integer underflow vulnerability within a Microsoft product&rsquo;s implementation of AES-GCM, CCM, and ARIA-GCM decryption algorithms. This flaw allows an attacker to trigger an out-of-bounds memory access. While the specific product affected is not detailed in the provided source, the vulnerability lies within the cryptographic functions used for data decryption, indicating a potential impact on confidentiality and integrity. Successful exploitation could allow an attacker to execute arbitrary code or disclose sensitive information. Given the widespread use of these encryption algorithms, this vulnerability poses a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system utilizing the vulnerable Microsoft product and its AES-GCM/CCM/ARIA-GCM decryption implementation.</li>
<li>Attacker crafts a malicious input designed to trigger the integer underflow during the decryption process.</li>
<li>The crafted input is sent to the vulnerable system for decryption. This could be via a network protocol, file processing, or other data ingestion method.</li>
<li>The vulnerable decryption routine processes the input, leading to an integer underflow.</li>
<li>The integer underflow results in an out-of-bounds memory access during the decryption operation.</li>
<li>This out-of-bounds memory access allows the attacker to read sensitive data from memory locations outside the intended buffer.</li>
<li>Alternatively, the attacker leverages the out-of-bounds write to overwrite critical data structures or executable code within the process&rsquo;s memory space.</li>
<li>If code is overwritten, the attacker gains arbitrary code execution within the context of the vulnerable process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-1005 could lead to unauthorized information disclosure, allowing attackers to steal sensitive data that was intended to be protected by encryption. In a more severe scenario, the vulnerability can be leveraged for arbitrary code execution, enabling attackers to gain control over the affected system. The lack of specific product information makes it difficult to quantify the exact number of potential victims, but the vulnerability&rsquo;s presence in widely used cryptographic functions implies a broad impact across various sectors and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected memory access patterns in processes performing AES-GCM/CCM/ARIA-GCM decryption, using a host-based intrusion detection system (HIDS).</li>
<li>Deploy the Sigma rule &ldquo;Detect Potential Exploitation of CVE-2026-1005&rdquo; to identify suspicious processes that might be exploiting the vulnerability.</li>
<li>Apply any available patches or updates released by Microsoft to address CVE-2026-1005 as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>cryptography</category><category>memory corruption</category><category>aes-gcm</category></item><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item><item><title>CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks</title><link>https://feed.craftedsignal.io/briefs/2024-05-filelock-symlink/</link><pubDate>Wed, 29 Apr 2026 07:50:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-filelock-symlink/</guid><description>CVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.</description><content:encoded><![CDATA[<p>CVE-2025-68146 is a security vulnerability residing within the filelock library, a widely used Python library for file locking. The vulnerability stems from a Time-of-Check Time-of-Use (TOCTOU) race condition that occurs during the creation of lock files. This weakness can be exploited by a local attacker to perform symlink attacks. By carefully manipulating the file system, an attacker can potentially redirect the lock creation process to a file location they control. This is a locally exploitable vulnerability with potential for privilege escalation and unauthorized access, but requires local access to the vulnerable system. The advisory was published on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to the system.</li>
<li>Attacker identifies an application utilizing the vulnerable filelock library for file locking operations.</li>
<li>Attacker creates a symbolic link (symlink) pointing the expected lock file path to a file location under their control.</li>
<li>The vulnerable application attempts to create a lock file at the expected location.</li>
<li>Due to the TOCTOU race condition, between the time the application checks for the existence of the lock file and the time it attempts to create it, the symlink is followed.</li>
<li>The lock file is created in the attacker-controlled location instead of the intended secure location.</li>
<li>The application continues execution, believing it has exclusive access, while the attacker can potentially modify or access the protected resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-68146 allows an attacker to manipulate file locking mechanisms, potentially leading to unauthorized modification or access to sensitive files. This can lead to data corruption, privilege escalation, or denial of service. The vulnerability requires local access, limiting the scope of potential attacks, but can be a critical issue in multi-user environments or systems with sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or updates provided by the vendor (Microsoft) to address CVE-2025-68146 when they become available.</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to critical files and directories.</li>
<li>Deploy the Sigma rule provided below to detect suspicious symlink creation attempts that might indicate exploitation of this TOCTOU vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>TOCTOU</category><category>symlink</category><category>filelock</category><category>CVE-2025-68146</category><category>race condition</category></item><item><title>rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</link><pubDate>Wed, 29 Apr 2026 07:33:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-leak/</guid><description>CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.</description><content:encoded><![CDATA[<p>CVE-2026-41898 is a security vulnerability affecting the rust-openssl library. The vulnerability stems from a failure to properly validate the length of data returned by callbacks during Pre-Shared Key (PSK) and cookie generation processes within OpenSSL. This oversight can lead to OpenSSL inadvertently exposing adjacent memory regions to a remote network peer. While the exact scope of impact is not detailed in the initial advisory, the potential for memory leakage raises concerns about sensitive information disclosure. Defenders should closely monitor applications utilizing rust-openssl for anomalous behavior indicative of exploitation attempts. The Microsoft Security Response Center published information regarding this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A client initiates a TLS handshake with a server using rust-openssl.</li>
<li>The server requests PSK or initiates a cookie exchange as part of the TLS handshake.</li>
<li>rust-openssl triggers a callback function to generate the PSK or cookie data.</li>
<li>The callback function returns data with a length that is not properly validated by rust-openssl.</li>
<li>Due to the unchecked length, OpenSSL reads beyond the intended buffer boundary.</li>
<li>OpenSSL copies the over-read memory region into the response sent to the client.</li>
<li>The client receives the response containing the leaked memory.</li>
<li>The client can then analyze the leaked memory for sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41898 can lead to the leakage of sensitive information from the server&rsquo;s memory. This information could include cryptographic keys, session data, or other confidential data. The extent of the leak depends on the amount of memory that is read beyond the intended buffer. The vulnerability could affect any application or service that uses rust-openssl for TLS communication and relies on PSK or cookie generation. The number of potential victims is currently unknown, but it would depend on the adoption rate of rust-openssl in security-sensitive applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusually large TLS handshake responses, which may indicate an attempt to trigger the memory leak.</li>
<li>Implement robust input validation for callback functions used in PSK and cookie generation within rust-openssl.</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts based on anomalous network connection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rust-openssl</category><category>memory-leak</category><category>tls</category><category>cve</category></item><item><title>UNC6692 Combines Social Engineering, Malware, and Cloud Abuse</title><link>https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</link><pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</guid><description>UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.</description><content:encoded><![CDATA[<p>UNC6692 is a newly tracked, financially motivated threat group that employs a multi-stage intrusion campaign combining persistent social engineering and custom modular malware. The actor begins by flooding a target&rsquo;s email inbox before contacting them via Microsoft Teams, posing as help desk personnel to resolve the issue. This leads to a phishing attack where victims are tricked into downloading and executing malicious payloads. UNC6692 abuses legitimate cloud infrastructure, specifically AWS S3 buckets, for payload delivery, command and control (C2), and data exfiltration, allowing them to bypass traditional network reputation filters. The group&rsquo;s operations are focused on gaining access and stealing credentials for further actions, ultimately aiming to exfiltrate data of interest from compromised systems. The initial campaign was observed in late December.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker floods a target&rsquo;s email inbox to create a sense of urgency.</li>
<li>The attacker contacts the target via Microsoft Teams, impersonating help desk personnel.</li>
<li>The attacker sends a phishing link via Teams, promising a local patch to fix the email spamming issue.</li>
<li>The target clicks the link, which downloads a renamed AutoHotKey binary and an AutoHotkey script from a threat actor-controlled AWS S3 bucket.</li>
<li>Execution of the AutoHotKey binary automatically runs the script, initiating reconnaissance commands and installing the SNOWBELT malicious Chromium browser extension.</li>
<li>SNOWBELT facilitates the download of additional tools, including the Snowglaze Python tunneler, the Snowbasin Python bindshell (used as a persistent backdoor), additional AutoHotkey scripts, and a portable Python executable with required libraries.</li>
<li>The attacker uses a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts.</li>
<li>The attacker uses a local administrator account to initiate an RDP session via Snowglaze from the compromised system to a backup server, then dumps LSASS process memory and uses pass-the-hash to move laterally to the domain controller.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The UNC6692 attack leads to the compromise of targeted systems, credential theft, and potential data exfiltration. If successful, the attacker gains control over the domain controller, allowing them to access sensitive information and potentially cause significant damage to the organization. The abuse of AWS S3 buckets allows the threat actor to blend in with legitimate cloud traffic, making detection more difficult. The financial motivation suggests that stolen credentials and data could be used for further malicious activities, such as ransomware attacks or sale on the dark web.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for AutoHotKey execution, especially when associated with downloads from unusual locations like AWS S3 buckets, to detect initial payload execution (see Sigma rule below).</li>
<li>Implement network monitoring to detect unusual RDP connections initiated from compromised systems to internal servers, as this is a key lateral movement technique used by UNC6692 (see Sigma rule below).</li>
<li>Monitor for the installation of new Chromium extensions, especially those not distributed through the Chrome Web Store, as this is how the SNOWBELT malware is deployed.</li>
<li>Monitor for the use of Python scripts to scan the local network for open ports (135, 445, 3389) and enumerate local administrator accounts.</li>
<li>Investigate any Microsoft Teams messages delivering links that promise to fix technical problems, as this is the initial social engineering tactic used by UNC6692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>malware</category><category>cloud-abuse</category><category>credential-theft</category><category>lateral-movement</category></item><item><title>CVE-2026-31622 NFC-A Cascade Depth Bounds Check Failure</title><link>https://feed.craftedsignal.io/briefs/2024-05-nfc-bounds-check-failure/</link><pubDate>Sun, 26 Apr 2026 07:28:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-nfc-bounds-check-failure/</guid><description>CVE-2026-31622 describes a vulnerability related to an NFC bounds check issue, specifically a failure to properly validate NFC-A cascade depth in the SDD response handler within Microsoft products, potentially leading to unexpected behavior or security compromise.</description><content:encoded><![CDATA[<p>CVE-2026-31622 involves a failure to perform adequate bounds checking of the NFC-A cascade depth in the SDD response handler. This vulnerability within Microsoft&rsquo;s NFC component could be exploited by a specially crafted NFC transmission that provides an unexpected cascade depth value, potentially leading to a denial-of-service condition or other unspecified impact. Due to the nature of NFC vulnerabilities, an attacker needs to be in close physical proximity to the targeted device. The vulnerability was reported publicly and assigned a CVE in April 2026. Defenders should prioritize applying relevant patches from Microsoft to mitigate potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker positions themselves within NFC communication range of the target device.</li>
<li>Attacker initiates an NFC communication session with the target device.</li>
<li>Attacker sends an NFC-A SDD (Single Device Detection) request.</li>
<li>The target device&rsquo;s NFC controller begins processing the SDD request.</li>
<li>Attacker crafts a malicious SDD response with an invalid cascade depth.</li>
<li>The NFC controller fails to properly validate the cascade depth value.</li>
<li>The improper cascade depth value leads to a buffer overflow or out-of-bounds read.</li>
<li>The vulnerability is triggered, potentially resulting in a denial-of-service or other unspecified impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31622 could lead to a denial-of-service condition on the targeted device. While the specific consequences are not detailed, this type of vulnerability could potentially be leveraged for more severe impacts. Given the proximity requirement for NFC attacks, the risk is somewhat mitigated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor systems for unexpected NFC activity, focusing on devices that frequently interact with NFC transmissions.</li>
<li>Apply the security update released by Microsoft to patch CVE-2026-31622 once available.</li>
<li>Implement network segmentation to limit the impact of potential exploits originating from compromised devices utilizing NFC.</li>
<li>Deploy the Sigma rules below to detect potential exploitation attempts related to unusual NFC activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>nfc</category><category>bounds-check-failure</category><category>cve-2026-31622</category></item><item><title>CVE-2026-23398 ICMP NULL Pointer Dereference</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-23398/</link><pubDate>Sun, 26 Apr 2026 07:14:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-23398/</guid><description>CVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.</description><content:encoded><![CDATA[<p>CVE-2026-23398 describes a NULL pointer dereference vulnerability within the <code>icmp_tag_validation()</code> function related to the ICMP protocol. This vulnerability, disclosed by the Microsoft Security Response Center, could be exploited by a remote attacker to trigger a denial-of-service condition on a vulnerable system. The exact mechanism involves sending crafted ICMP packets that lead to the dereferencing of a NULL pointer, causing the system to crash or become unresponsive. While specific exploitation details are not available in the provided source, the nature of the vulnerability suggests that systems processing ICMP traffic are potentially at risk. Defenders should prioritize patching systems to prevent exploitation and implement network monitoring to detect potentially malicious ICMP traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious ICMP packet specifically designed to trigger the NULL pointer dereference in <code>icmp_tag_validation()</code>.</li>
<li>The attacker sends the crafted ICMP packet to the target system.</li>
<li>The target system&rsquo;s network stack receives the ICMP packet and processes it.</li>
<li>During ICMP packet processing, the <code>icmp_tag_validation()</code> function is called to validate specific fields within the packet.</li>
<li>The crafted ICMP packet causes <code>icmp_tag_validation()</code> to attempt to dereference a NULL pointer.</li>
<li>The NULL pointer dereference causes the affected system to crash, resulting in a denial-of-service.</li>
<li>The system becomes unresponsive, impacting availability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23398 can lead to a denial-of-service condition on the targeted system. This means the system becomes unavailable to legitimate users, potentially disrupting services and network operations. The extent of the impact depends on the role of the affected system within the network. Critical infrastructure servers or network devices are most likely to be targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to remediate CVE-2026-23398 to prevent exploitation.</li>
<li>Monitor network traffic for suspicious ICMP packets that could be indicative of exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious ICMP Traffic</code> to identify potentially malicious ICMP packets based on size and frequency.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>icmp</category><category>denial-of-service</category><category>vulnerability</category><category>cve</category></item><item><title>Microsoft Product Vulnerability CVE-2026-41080</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41080/</link><pubDate>Sat, 25 Apr 2026 07:25:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-41080/</guid><description>CVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.</description><content:encoded><![CDATA[<p>A vulnerability, identified as CVE-2026-41080, has been reported in a Microsoft product. At this time, detailed information regarding the specific product affected, the nature of the vulnerability, and potential exploitation methods remains undisclosed. The lack of specifics makes it difficult to assess the immediate risk and develop targeted defenses, but the identification of a CVE by Microsoft warrants monitoring for further updates and potential exploitation attempts. Defenders should prepare for the release of more detailed information and corresponding patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Due to the lack of information, the initial access vector is unknown. This could potentially range from remote code execution vulnerabilities to privilege escalation flaws.</li>
<li><strong>Exploitation:</strong> The specific method of exploiting CVE-2026-41080 is unknown. It could involve sending a specially crafted request or file to the affected product.</li>
<li><strong>Privilege Escalation (If Applicable):</strong> Depending on the vulnerability type, attackers might attempt to escalate privileges to gain higher-level access to the system.</li>
<li><strong>Defense Evasion (If Applicable):</strong> Attackers may attempt to evade detection by disabling security features or masking their activities.</li>
<li><strong>Lateral Movement (If Applicable):</strong> If the initial exploitation leads to a foothold on the network, attackers might move laterally to compromise other systems.</li>
<li><strong>Command and Control (If Applicable):</strong> Attackers may establish command and control channels to remotely control compromised systems.</li>
<li><strong>Impact:</strong> The final impact is currently unknown but could range from data theft to system compromise and denial of service, depending on the nature of the vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The potential impact of CVE-2026-41080 is currently undetermined due to the limited information available. Successful exploitation could lead to a range of outcomes, including unauthorized access, data breaches, or denial of service. Organizations should monitor for updates and apply patches as soon as they become available to mitigate potential risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41080">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41080</a>) for updated information and patch releases related to CVE-2026-41080.</li>
<li>Implement a proactive patch management strategy to rapidly deploy security updates once they are released for the affected Microsoft product.</li>
<li>Enable and review relevant logging sources (process creation, network connection, file events) to detect potential exploitation attempts related to this vulnerability.</li>
<li>Deploy generic detection rules (see examples below) and tune them to your environment to identify suspicious activity that could be related to exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>CVE-2026-41080</category><category>vulnerability</category><category>microsoft</category></item><item><title>Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026</title><link>https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</link><pubDate>Fri, 24 Apr 2026 19:52:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</guid><description>In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.</description><content:encoded><![CDATA[<p>In early April 2026, Arctic Wolf observed a widespread phishing campaign that abused the OAuth device code flow. This campaign targeted organizations across multiple regions and sectors, mirroring the &ldquo;Riding the Rails&rdquo; campaign observed by Huntress in late March. The attackers exploited the device code grant type in the OAuth 2.0 authorization framework to obtain access tokens. By tricking users into entering a code on a legitimate Microsoft login page, attackers bypassed traditional MFA controls. Defenders should be aware of this evolving technique and implement detection strategies focused on anomalous application registrations and device code flow activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email to the victim, impersonating a legitimate service.</li>
<li>The email contains a link that redirects the victim to a fake application authorization page.</li>
<li>The fake page prompts the victim to enter a device code.</li>
<li>Unbeknownst to the victim, the device code is associated with a malicious OAuth application controlled by the attacker.</li>
<li>The victim is redirected to a legitimate Microsoft login page, where they enter the provided code and authenticate.</li>
<li>Upon successful authentication, the malicious application receives an access token.</li>
<li>The attacker uses the access token to access the victim&rsquo;s account and sensitive data.</li>
<li>The attacker may then perform actions such as reading emails, accessing files, or initiating further malicious activity within the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This OAuth device code phishing campaign affected numerous organizations across multiple sectors and regions in early April 2026. Successful attacks grant threat actors unauthorized access to user accounts, potentially leading to data exfiltration, financial fraud, and further compromise of internal systems. Due to the nature of OAuth, attackers can maintain persistent access even after password changes, posing a significant long-term risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Azure AD sign-in logs for device code flow usage to identify suspicious authentications (logsource: azuread, category: authentication).</li>
<li>Implement the Sigma rule provided below to detect suspicious application registrations in Azure AD (logsource: o365, category: configuration).</li>
<li>Educate users on the risks of device code phishing and how to identify malicious authorization requests.</li>
<li>Regularly audit OAuth applications authorized within your environment and revoke access for any suspicious or unused applications.</li>
<li>Investigate any alerts related to anomalous OAuth application activity promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>device-code</category><category>phishing</category><category>initial-access</category></item><item><title>Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</link><pubDate>Fri, 24 Apr 2026 09:09:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-microsoft-cloud-vulns/</guid><description>Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been reported affecting Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps. Successful exploitation of these vulnerabilities could enable attackers to perform a variety of malicious actions, including escalating their privileges within the affected systems, executing arbitrary code to gain further control, and conducting spoofing attacks to deceive users or bypass security measures. The full details regarding specific vulnerability types and exploitation methods are currently unavailable, but the breadth of affected products indicates a potentially widespread impact across cloud-based Microsoft services. Defenders should prioritize monitoring for suspicious activity indicative of exploitation attempts targeting these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the advisory lacks specifics, we will describe a generalized attack chain based on the potential vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a target environment, possibly through compromised credentials or a separate vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability within one of the Microsoft cloud products (Azure, Microsoft 365 Copilot, Dynamics 365, or Power Apps) to elevate their privileges to a higher level, potentially gaining administrative rights.</li>
<li><strong>Code Injection:</strong> Leveraging the escalated privileges, the attacker injects malicious code into a vulnerable component of the cloud service.</li>
<li><strong>Code Execution:</strong> The injected code is executed, allowing the attacker to perform arbitrary actions within the context of the compromised service.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised service as a pivot point to move laterally within the cloud environment, targeting other resources and services.</li>
<li><strong>Data Exfiltration/Manipulation:</strong> Once established within the environment, the attacker exfiltrates sensitive data or manipulates data for malicious purposes.</li>
<li><strong>Spoofing Attacks:</strong> The attacker leverages the compromised environment to launch spoofing attacks, potentially targeting other users or systems with phishing emails or other deceptive tactics.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence within the cloud environment to maintain access even after the initial vulnerability is patched.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences, including unauthorized access to sensitive data, disruption of critical business processes, and financial losses. The number of potential victims is substantial, given the widespread use of Microsoft cloud services across various sectors. A successful attack could result in data breaches, service outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor logs from Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps for suspicious activity indicative of privilege escalation, code execution, and spoofing attacks.</li>
<li>Enable and review audit logs within the affected Microsoft cloud services to identify anomalous user behavior and potential security breaches.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your specific environment to detect potential exploitation attempts.</li>
<li>Follow Microsoft&rsquo;s official security advisories and apply any available patches or mitigations as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>privilege-escalation</category><category>code-execution</category><category>spoofing</category></item><item><title>PhantomRPC: Windows RPC Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</link><pubDate>Fri, 24 Apr 2026 08:00:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</guid><description>A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.</description><content:encoded><![CDATA[<p>Kaspersky researchers discovered a critical vulnerability in the Windows Remote Procedure Call (RPC) architecture, dubbed PhantomRPC, that enables local privilege escalation. The flaw allows an attacker to create a rogue RPC server and, by exploiting existing processes with impersonation privileges (such as those running as Local Service or Network Service), elevate their own permissions to SYSTEM. The vulnerability resides in the architectural design of RPC itself, making it potentially exploitable across all Windows versions. The researcher has demonstrated five different exploitation paths escalating privileges from various local or network service contexts. This issue has been disclosed to Microsoft, but a patch has not yet been released. Due to the fundamental nature of the vulnerability, the number of potential attack vectors is effectively unlimited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system with low privileges.</li>
<li>The attacker identifies a service running with <code>SeImpersonatePrivilege</code>, such as Local Service or Network Service.</li>
<li>The attacker crafts a malicious RPC server application designed to exploit the PhantomRPC vulnerability.</li>
<li>The attacker triggers a connection from the target service (e.g., Group Policy Client service) to the attacker&rsquo;s malicious RPC server via ALPC.</li>
<li>The malicious RPC server uses <code>RpcImpersonateClient</code> API to impersonate the SYSTEM account.</li>
<li>The attacker&rsquo;s malicious RPC server executes code within the security context of the SYSTEM account.</li>
<li>The attacker leverages the elevated privileges to perform arbitrary actions, such as installing malware, creating new accounts, or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PhantomRPC allows a low-privileged attacker to gain complete control over the affected system by escalating privileges to SYSTEM. This can lead to complete system compromise, including data theft, malware installation, and denial of service. The vulnerability affects all Windows versions and given the number of potential attack vectors, it poses a significant risk to a large number of systems. While the exact number of potential victims remains unknown, the widespread use of RPC in Windows makes this a highly critical issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of suspicious ALPC ports, especially those targeting services with <code>SeImpersonatePrivilege</code>. Use the Sigma rule <code>Detect Suspicious ALPC Port Creation</code> to identify potential exploitation attempts.</li>
<li>Monitor for processes calling the <code>RpcImpersonateClient</code> API, especially those originating from unusual or untrusted processes. Use the Sigma rule <code>Detect RpcImpersonateClient API Call from Unusual Process</code> to identify potential exploitation attempts.</li>
<li>Restrict access to services with <code>SeImpersonatePrivilege</code> where possible, limiting the potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>rpc</category><category>windows</category></item><item><title>Trigona Ransomware Employing Custom Data Exfiltration Tool</title><link>https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</link><pubDate>Thu, 23 Apr 2026 19:02:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</guid><description>Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.</description><content:encoded><![CDATA[<p>Trigona ransomware, initially launched in October 2022, has been observed using a custom command-line tool named &ldquo;uploader_client.exe&rdquo; to exfiltrate data from compromised environments. This shift, observed in March 2026, suggests an effort to avoid detection by security solutions that commonly flag publicly available tools like Rclone and MegaSync. Symantec researchers believe this indicates a strategic investment in proprietary malware to maintain a lower profile during critical phases of attacks. The custom tool supports five simultaneous connections per file for faster data exfiltration via parallel uploads, rotates TCP connections after 2GB of traffic to evade monitoring, offers options for selective file type exfiltration, and utilizes an authentication key to restrict access to stolen data. Despite disruptions in October 2023, Trigona has resumed operations, incorporating additional techniques like installing the Huorong Network Security Suite tool HRSword and disabling security products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the target system through unspecified means.</li>
<li>Installation of the Huorong Network Security Suite tool HRSword as a kernel driver service.</li>
<li>Deployment of tools such as PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd to disable security-related products by leveraging vulnerable kernel drivers to terminate endpoint protection processes.</li>
<li>Execution of utilities with PowerRun to launch apps, executables, and scripts with elevated privileges, bypassing user-mode protections.</li>
<li>Deployment of AnyDesk for direct remote access to the breached systems.</li>
<li>Execution of Mimikatz and Nirsoft utilities for credential theft and password recovery operations.</li>
<li>Use of the custom &ldquo;uploader_client.exe&rdquo; to exfiltrate valuable documents such as invoices and PDFs from network drives via parallel uploads, rotating TCP connections to evade monitoring, and using an authentication key to restrict data access.</li>
<li>Final stage involving the deployment of Trigona ransomware, demanding ransom payment in Monero cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Trigona ransomware attacks result in significant data theft and encryption, disrupting business operations and causing financial losses. The group has demonstrated the capability to resume operations even after suffering disruptions, indicating a persistent threat. Observed data exfiltration has included high-value documents such as invoices and PDFs, demonstrating a targeted approach to data theft. Victims face potential regulatory penalties, reputational damage, and recovery costs associated with restoring systems and data. The number of victims and specific financial impact varies per campaign, but the potential for severe disruption and financial strain is consistent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of &ldquo;uploader_client.exe&rdquo; with command-line arguments indicative of data exfiltration (see Sigma rule below).</li>
<li>Implement network monitoring to detect connections to unusual or hardcoded server addresses used by the &ldquo;uploader_client.exe&rdquo; exfiltration tool (see IOC table).</li>
<li>Deploy endpoint detection rules to identify the installation of Huorong Network Security Suite (HRSword) as a kernel driver service and tools like PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd.</li>
<li>Monitor for processes launched via PowerRun, especially if followed by credential dumping or remote access tool execution.</li>
<li>Review AnyDesk usage for unusual connections or after-hours access, as this tool is used for remote access.</li>
<li>Enable robust logging for credential access attempts and password recovery activity associated with Mimikatz and Nirsoft tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>trigona</category><category>ransomware</category><category>data exfiltration</category><category>custom tool</category></item><item><title>Microsoft Product Vulnerability CVE-2026-22005</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-22005/</link><pubDate>Thu, 23 Apr 2026 08:03:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-22005/</guid><description>CVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft published a security advisory for CVE-2026-22005. The advisory indicates a vulnerability exists within a Microsoft product; however, the initial information released provides minimal details. The Microsoft Security Response Center (MSRC) update guide confirms the existence of the CVE but lacks specifics regarding the affected product, the nature of the vulnerability (e.g., remote code execution, denial of service), the attack vector, and potential mitigations. Further investigation is required to understand the scope and severity of this vulnerability. Defenders should monitor for updates from Microsoft and analyze their environment for potentially affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, a specific attack chain cannot be constructed. However, a general attack chain based on typical software vulnerabilities can be inferred and should be refined as more information becomes available:</p>
<ol>
<li><strong>Initial Access:</strong> Attacker identifies a system running the vulnerable Microsoft product. (Specific method unknown pending vulnerability details)</li>
<li><strong>Exploitation:</strong> The attacker exploits CVE-2026-22005 by sending a specially crafted request or input to the vulnerable service. (Specific exploit details unknown)</li>
<li><strong>Code Execution:</strong> Successful exploitation leads to the execution of attacker-controlled code on the target system.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges to gain higher-level access to the system. (Techniques vary depending on the vulnerability and system configuration)</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems within the network, compromising additional assets. (Using techniques like pass-the-hash or exploiting other vulnerabilities)</li>
<li><strong>Persistence:</strong> The attacker establishes persistence mechanisms to maintain access to the compromised systems. (e.g., creating new user accounts, installing backdoors, or modifying system startup scripts)</li>
<li><strong>Data Exfiltration/Ransomware Deployment:</strong> Depending on the attacker&rsquo;s objectives, they may exfiltrate sensitive data or deploy ransomware to encrypt the system and demand a ransom payment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-22005 is currently unknown due to the lack of details provided by Microsoft. Depending on the affected product and the nature of the vulnerability, successful exploitation could lead to remote code execution, denial of service, information disclosure, or other adverse effects. The potential number of victims and affected sectors will depend on the prevalence of the vulnerable product within organizations. A successful attack could result in significant data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (MSRC) page for updates regarding CVE-2026-22005 and any associated KB articles.</li>
<li>Once the affected product is identified, prioritize patching based on the severity of the vulnerability and the criticality of the affected systems.</li>
<li>Implement network segmentation and access controls to limit the potential impact of a successful exploitation.</li>
<li>Deploy the generic process creation Sigma rule below to detect suspicious processes spawned by unusual parent processes, indicative of potential exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>CVE-2026-22005</category><category>vulnerability</category><category>microsoft</category></item><item><title>Microsoft Discloses Information Regarding CVE-2026-22004</title><link>https://feed.craftedsignal.io/briefs/2024-05-cve-2026-22004/</link><pubDate>Thu, 23 Apr 2026 07:54:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-cve-2026-22004/</guid><description>Microsoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft published an advisory regarding CVE-2026-22004.
However, the advisory lacks specific details about the nature of the vulnerability, its potential impact, or affected products.
Without further information, it is challenging to determine the scope and severity of this vulnerability.
Defenders should monitor Microsoft&rsquo;s update guide and other security resources for additional details.
This brief serves as an initial notification to track and prepare for further information on CVE-2026-22004.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the lack of information about CVE-2026-22004, it is impossible to provide a detailed attack chain at this time. As a placeholder:</p>
<ol>
<li>Initial Access: Unknown, awaiting details from Microsoft.</li>
<li>Execution: Unknown, awaiting details from Microsoft.</li>
<li>Persistence: Unknown, awaiting details from Microsoft.</li>
<li>Privilege Escalation: Unknown, awaiting details from Microsoft.</li>
<li>Defense Evasion: Unknown, awaiting details from Microsoft.</li>
<li>Credential Access: Unknown, awaiting details from Microsoft.</li>
<li>Discovery: Unknown, awaiting details from Microsoft.</li>
<li>Lateral Movement: Unknown, awaiting details from Microsoft.</li>
<li>Collection: Unknown, awaiting details from Microsoft.</li>
<li>Command and Control: Unknown, awaiting details from Microsoft.</li>
<li>Exfiltration: Unknown, awaiting details from Microsoft.</li>
<li>Impact: Unknown, awaiting details from Microsoft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of CVE-2026-22004 is currently unknown.
Without specific details about the vulnerability, it is impossible to assess potential damage, affected sectors, or the consequences of successful exploitation.
Organizations should monitor for updates and prepare to assess their exposure once more information is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22004">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22004</a>) for updated information on CVE-2026-22004.</li>
<li>Deploy the generic placeholder Sigma rule to detect unusual process execution and network connections in your environment, and tune for your environment.</li>
<li>When Microsoft releases more information, analyze the details and deploy relevant detection rules and IOCs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-22004</category><category>vulnerability</category><category>microsoft</category></item><item><title>Microsoft CVE-2026-35236 Information Published</title><link>https://feed.craftedsignal.io/briefs/2024-05-cve-2026-35236-info-published/</link><pubDate>Thu, 23 Apr 2026 07:47:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-cve-2026-35236-info-published/</guid><description>Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft released a security advisory indicating the existence of CVE-2026-35236.
At the time of the advisory, no details were provided regarding the nature of the vulnerability,
affected products, potential impact, or mitigation strategies. This lack of information makes it
difficult to assess the immediate risk, but the existence of a CVE ID suggests the potential for
future exploitation. Defenders should monitor for updates from Microsoft regarding CVE-2026-35236
and prepare to implement patches or mitigations as they become available. The absence of specific
information at this stage necessitates a proactive monitoring approach to detect any potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Disclosure:</strong> Microsoft publishes the CVE ID CVE-2026-35236 without any details.</li>
<li><strong>Information Gathering (Attacker):</strong> Attackers monitor Microsoft&rsquo;s channels and other sources for further information on CVE-2026-35236.</li>
<li><strong>Vulnerability Analysis (Attacker):</strong> Once details are released (hypothetically), attackers analyze the vulnerability to develop an exploit.</li>
<li><strong>Exploit Development (Attacker):</strong> An exploit is created, potentially leveraging publicly available tools or custom-developed code.</li>
<li><strong>Target Selection (Attacker):</strong> Attackers identify vulnerable systems based on the (currently unknown) affected product.</li>
<li><strong>Exploitation Attempt (Attacker):</strong> The exploit is deployed against the target system.</li>
<li><strong>Privilege Escalation (Attacker):</strong> (Hypothetical) If the initial exploit doesn&rsquo;t provide sufficient privileges, further steps are taken to escalate privileges.</li>
<li><strong>Impact (Attacker):</strong> (Hypothetical) Depending on the vulnerability, the impact could range from remote code execution to denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The current impact is unknown due to the lack of information about the vulnerability associated with CVE-2026-35236.
If the vulnerability is severe and widely exploitable, successful attacks could lead to data breaches, system compromise,
or denial of service. The number of potential victims and affected sectors will depend on the affected product and its deployment scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Continuously monitor the Microsoft Security Response Center for updates regarding CVE-2026-35236 (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35236)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35236)</a>.</li>
<li>Once Microsoft releases details on CVE-2026-35236, prioritize patching or implementing recommended mitigations.</li>
<li>Deploy generic detection rules to identify exploitation attempts based on unusual network activity or suspicious process creation.</li>
<li>Review existing security controls and ensure they are up-to-date to protect against potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>microsoft</category></item><item><title>CVE-2026-31478 Vulnerability in Microsoft ksmbd</title><link>https://feed.craftedsignal.io/briefs/2024-01-ksmbd-cve-2026-31478/</link><pubDate>Thu, 23 Apr 2026 07:33:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ksmbd-cve-2026-31478/</guid><description>CVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-31478 is a security vulnerability within Microsoft&rsquo;s ksmbd, a kernel-based SMB server. The vulnerability arises from an error in the <code>smb2_calc_max_out_buf_len()</code> function where a hardcoded value for <code>hdr2_len</code> is used instead of calculating it dynamically using <code>offsetof()</code>. While specific exploitation details are not provided in the source, the incorrect buffer calculation could lead to memory corruption or other unexpected behavior, potentially allowing a remote attacker to cause a denial-of-service condition or, in a more severe scenario, execute arbitrary code on the affected system. The vulnerability was disclosed on 2026-04-23 as part of a Microsoft Security Update.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Due to the limited information available, the following attack chain is based on the potential exploitation of a memory corruption vulnerability resulting from an incorrect buffer length calculation.</p>
<ol>
<li>An attacker identifies a vulnerable ksmbd server.</li>
<li>The attacker crafts a malicious SMBv2 request specifically designed to trigger the flawed <code>smb2_calc_max_out_buf_len()</code> function.</li>
<li>When the <code>smb2_calc_max_out_buf_len()</code> function is called to calculate the maximum output buffer length for the response to the malicious request, it uses an incorrect value for <code>hdr2_len</code> due to the hardcoded value.</li>
<li>This incorrect calculation leads to the allocation of an undersized buffer.</li>
<li>The server attempts to write data exceeding the allocated buffer size into the undersized buffer.</li>
<li>This buffer overflow corrupts adjacent memory regions.</li>
<li>Depending on the corrupted data, the server may crash (denial-of-service), or the attacker may gain control of execution flow (remote code execution).</li>
<li>The attacker executes arbitrary code on the server, potentially leading to data exfiltration, system compromise, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31478 can lead to a denial-of-service condition, disrupting file sharing services provided by the ksmbd server. In a more severe scenario, an attacker could achieve remote code execution, allowing them to gain control of the affected system. This could lead to data breaches, system compromise, and further propagation of malicious activity within the network. The impact will vary depending on the privileges of the ksmbd service account and the data stored on the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-31478 on all systems running vulnerable versions of ksmbd (Microsoft Security Update Guide).</li>
<li>Enable SMB auditing to detect suspicious SMB activity, which could be indicative of exploitation attempts (Windows event logs).</li>
<li>Deploy network intrusion detection systems (IDS) to monitor SMB traffic for anomalous patterns associated with exploit attempts (Network traffic).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>ksmbd</category><category>smb</category><category>memory-corruption</category></item><item><title>CVE-2026-34303 Affecting Microsoft Products</title><link>https://feed.craftedsignal.io/briefs/2026-04-msrc-placeholder/</link><pubDate>Thu, 23 Apr 2026 07:27:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-msrc-placeholder/</guid><description>CVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.</description><content:encoded><![CDATA[<p>At this time, only a placeholder entry for CVE-2026-34303 exists in the Microsoft Security Response Center update guide. The entry indicates a vulnerability exists within a Microsoft product, but specifics regarding the affected product, the nature of the vulnerability, and potential impact are not yet available. Defenders should monitor the MSRC page for CVE-2026-34303 for updates. As Microsoft releases further information, this brief will be updated with specific details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Because the vulnerability details are not yet public, a detailed attack chain cannot be constructed. Placeholder steps are included below for demonstration purposes and will need to be updated when more information is available from Microsoft.</p>
<ol>
<li>Initial access is achieved through an unspecified vector.</li>
<li>Exploitation of CVE-2026-34303 occurs, leading to arbitrary code execution.</li>
<li>The attacker establishes persistence on the compromised system.</li>
<li>Lateral movement is initiated to other systems within the network.</li>
<li>Credential access techniques are employed to gain further privileges.</li>
<li>Internal reconnaissance is conducted to identify valuable data.</li>
<li>Data exfiltration commences, transferring sensitive information to an external server.</li>
<li>The attacker attempts to cover their tracks by deleting logs and other evidence of their presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The potential impact of CVE-2026-34303 is currently unknown. Depending on the affected product and the nature of the vulnerability, successful exploitation could lead to arbitrary code execution, denial of service, information disclosure, or other adverse outcomes. The severity and scope of the impact will become clearer once Microsoft releases additional details about the vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor the Microsoft Security Response Center page for CVE-2026-34303 and subscribe to updates.</li>
<li>When details of CVE-2026-34303 become available, identify affected systems within your environment.</li>
<li>Develop and deploy detections based on observed exploit activity, referring to updated threat intelligence.</li>
<li>Apply the patch released by Microsoft as soon as it becomes available to remediate CVE-2026-34303.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>cve</category><category>microsoft</category></item><item><title>CVE-2026-31507 Double-Free Vulnerability in net/smc</title><link>https://feed.craftedsignal.io/briefs/2024-05-cve-2026-31507/</link><pubDate>Thu, 23 Apr 2026 07:27:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-cve-2026-31507/</guid><description>CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.</description><content:encoded><![CDATA[<p>On April 23, 2026, Microsoft published a security update guide addressing CVE-2026-31507, a double-free vulnerability residing in the net/smc (Sockets Multiplexing Controller) module of the Linux kernel. The vulnerability stems from a flaw in how the <code>tee()</code> function handles the duplication of splice pipe buffers. Specifically, when <code>tee()</code> duplicates a splice pipe buffer associated with the <code>smc_spd_priv</code> structure, it can lead to a double-free condition. This flaw could allow a local attacker to trigger memory corruption or a denial-of-service condition. While specific exploitation details are currently lacking, the nature of double-free vulnerabilities makes them a critical concern for system stability and security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker gains access to the system.</li>
<li>The attacker crafts a malicious program that interacts with the net/smc module.</li>
<li>The program triggers the <code>tee()</code> function to duplicate a splice pipe buffer related to <code>smc_spd_priv</code>.</li>
<li>Due to the vulnerability, the same memory region associated with <code>smc_spd_priv</code> is freed twice.</li>
<li>The double-free corrupts the heap metadata.</li>
<li>Subsequent memory allocations may lead to arbitrary code execution or denial-of-service.</li>
<li>The attacker could leverage the memory corruption to escalate privileges.</li>
<li>Successful exploitation results in system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31507 can lead to memory corruption, potentially enabling arbitrary code execution and privilege escalation. A more likely outcome is a denial-of-service condition, where the system becomes unstable or crashes due to heap corruption. The vulnerability affects systems utilizing the affected net/smc module. While the number of potential victims is unknown, the wide deployment of the Linux kernel makes this a significant concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by Microsoft that addresses CVE-2026-31507 to mitigate the double-free vulnerability.</li>
<li>Monitor systems for unusual <code>tee()</code> function calls within the <code>net/smc</code> module using a process creation rule with relevant command-line arguments and process ancestry.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-31507</category><category>double-free</category><category>memory corruption</category><category>denial of service</category></item><item><title>Entra ID Excessive Account Lockouts Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-entra-id-lockouts/</link><pubDate>Wed, 22 Apr 2026 18:43:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-entra-id-lockouts/</guid><description>A high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.</description><content:encoded><![CDATA[<p>This alert identifies a surge in failed Microsoft Entra ID sign-in attempts (error code 50053) due to account lockouts, suggesting potential brute-force attacks. Attackers often employ password spraying, credential stuffing, or automated guessing to compromise accounts. This detection uses a threshold-based approach to identify coordinated campaigns targeting multiple users. The Entra ID Smart Lockout feature triggers error code 50053, utilizing IP-based tracking to differentiate between &ldquo;familiar&rdquo; and &ldquo;unfamiliar&rdquo; locations, with lockouts primarily originating from unfamiliar IPs. Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker attempts to gain access to Entra ID accounts using compromised or guessed credentials.</li>
<li><strong>Password Spraying/Credential Stuffing:</strong> The attacker performs password spraying attacks by attempting common passwords across multiple accounts, or credential stuffing attacks by using lists of breached credentials obtained from other sources.</li>
<li><strong>Authentication Failure:</strong> The sign-in attempts fail due to incorrect credentials, resulting in authentication failure events in Entra ID sign-in logs.</li>
<li><strong>Smart Lockout Triggered:</strong> Entra ID&rsquo;s Smart Lockout feature detects the repeated failed sign-in attempts from unfamiliar IPs, triggering account lockouts and generating error code 50053.</li>
<li><strong>Account Lockout:</strong> The target user accounts are locked out, preventing legitimate users from accessing their accounts.</li>
<li><strong>Potential Enumeration:</strong> Prior to the lockouts, the attacker may perform username enumeration, resulting in error code 50034 (user not found) in the sign-in logs.</li>
<li><strong>MFA Bypass Attempt (if applicable):</strong> If MFA is not enforced or bypassed, the attacker may attempt to gain access using single-factor authentication.</li>
<li><strong>Account Compromise (if successful):</strong> If the attacker successfully guesses the password before lockout or bypasses MFA, the account is compromised, allowing unauthorized access to resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful brute-force attack against Entra ID can lead to widespread account compromise. This could result in unauthorized access to sensitive data, business disruption, and potential financial loss. An attacker could leverage compromised accounts to move laterally within the network, escalate privileges, and exfiltrate data. This attack can affect any organization using Microsoft Entra ID for identity and access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID Excessive Account Lockouts Detected&rdquo; to your SIEM to detect high counts of failed sign-in attempts resulting in account lockouts.</li>
<li>Investigate alerts generated by the Sigma rule by pivoting to the raw logs in Discover or Timeline using the provided query and focusing on <code>event.dataset: &quot;azure.signinlogs&quot; and azure.signinlogs.properties.status.error_code: 50053</code>.</li>
<li>Block suspicious source IPs identified in the investigation using Conditional Access named locations to prevent further brute-force attempts.</li>
<li>Implement Conditional Access policies to block legacy authentication protocols like IMAP, SMTP, and POP, which are often targeted in password spraying attacks.</li>
<li>Review and enhance Conditional Access policies to ensure comprehensive MFA coverage and prevent MFA bypass attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>entra_id</category><category>credential_access</category><category>brute_force</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>Potential Web Shell ASPX File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</link><pubDate>Sat, 14 Dec 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</guid><description>The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.</description><content:encoded><![CDATA[<p>Attackers frequently deploy web shells to maintain persistence and execute arbitrary commands on compromised web servers. This rule identifies the creation of ASPX files, commonly used in Windows environments, within directories typically targeted for web shell deployment. The rule focuses on the &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo; path, a common location for web server extensions and potential web shell placements. By excluding legitimate processes such as msiexec.exe and psconfigui.exe, the rule aims to detect suspicious ASPX file creation events indicative of malicious activity. The detection logic helps defenders identify potential web shell installations, allowing for timely response and remediation to prevent further compromise. This activity has been observed in exploitation attempts targeting SharePoint servers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through exploiting a vulnerability in a web application or service running on the server (e.g., SharePoint).</li>
<li>The attacker leverages the compromised web application to upload a malicious ASPX file to a directory within the web server&rsquo;s file system, specifically targeting locations like &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo;.</li>
<li>The uploaded ASPX file contains malicious code designed to provide the attacker with remote access and control over the server.</li>
<li>The attacker triggers the execution of the ASPX file by sending a request to the web server, which processes the ASPX file and executes the embedded malicious code.</li>
<li>The web shell allows the attacker to execute arbitrary commands on the server, potentially escalating privileges and moving laterally within the network.</li>
<li>The attacker uses the web shell to establish persistence on the compromised server, ensuring continued access even after the initial vulnerability is patched.</li>
<li>The attacker may use the web shell to exfiltrate sensitive data from the server or to deploy additional malware and tools.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful web shell deployment can lead to complete compromise of the affected server, potentially impacting numerous organizations. Attackers can use web shells to execute arbitrary code, steal sensitive data, and establish persistent access to internal networks. The impact includes data breaches, financial losses, and reputational damage. Successful exploitation of SharePoint vulnerabilities leading to web shell deployment has been observed in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; to detect suspicious ASPX file creation events, filtering out legitimate processes to reduce false positives.</li>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events on Windows systems, which is a data source for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; by examining the file path, creating process, and network activity around the time of the event.</li>
<li>Monitor web server logs for suspicious requests targeting ASPX files in common web server directories, as referenced in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>web-shell</category><category>persistence</category><category>windows</category></item><item><title>Powercat PowerShell Implementation Detection</title><link>https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</link><pubDate>Mon, 04 Nov 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</guid><description>Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.</description><content:encoded>&lt;p>Powercat is a PowerShell script that functions similarly to the traditional Netcat utility, allowing for network communication using TCP and UDP. Attackers can use Powercat to establish reverse shells, transfer files, and perform port scanning within a compromised environment. This activity is often employed during post-exploitation phases to maintain access and propagate further into the network. Defenders should be aware of PowerShell scripts invoking Powercat, especially in environments…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>lateral-movement</category><category>powershell</category></item><item><title>Active Directory Group Modification by SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</link><pubDate>Sat, 02 Nov 2024 23:59:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-ad-group-modification-by-system/</guid><description>Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.</description><content:encoded><![CDATA[<p>This detection identifies a user being added to an Active Directory (AD) group by the SYSTEM account (S-1-5-18). This behavior is significant because it can indicate an attacker who has successfully achieved SYSTEM level privileges on a domain controller. Attackers typically obtain SYSTEM privileges by exploiting vulnerabilities in the domain controller, or by abusing default group privileges such as those assigned to Server Operators. Once SYSTEM access is achieved, the attacker can then attempt to pivot to a domain account. This allows them to gain persistent access and control over the AD environment. Successful exploitation enables attackers to perform actions with the privileges of the compromised account, leading to potential data breaches, system compromise, and further lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the network through various means, such as phishing or exploiting a public-facing application.</li>
<li><strong>Privilege Escalation:</strong> The attacker exploits a vulnerability or misconfiguration on a system within the network to achieve local administrator or SYSTEM privileges.</li>
<li><strong>Domain Controller Compromise:</strong> The attacker uses their elevated privileges to target a domain controller, exploiting vulnerabilities or weak configurations to gain SYSTEM access on the domain controller itself.</li>
<li><strong>Group Modification:</strong> Once the attacker has SYSTEM privileges on a domain controller, they use this access to add a user account to a privileged Active Directory group. This is done by modifying the group membership using tools native to the operating system.</li>
<li><strong>Persistence:</strong> By adding a user account to a privileged group, the attacker ensures they have persistent access to the domain, even if their initial access method is discovered and blocked.</li>
<li><strong>Lateral Movement:</strong> With the newly acquired group membership, the attacker can now move laterally within the network, accessing resources and systems that were previously inaccessible.</li>
<li><strong>Data Exfiltration / Impact:</strong> The attacker leverages their access to locate and exfiltrate sensitive data, or to disrupt critical business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a wide range of negative consequences, including data breaches, system compromise, and disruption of critical business operations. Attackers can use the compromised account to access sensitive data, modify system configurations, or even deploy ransomware. The scope of impact depends on the permissions and privileges associated with the compromised account and the targeted resources. Furthermore, the incident can damage the organization&rsquo;s reputation and result in regulatory fines and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Security Group Management&rdquo; to generate the necessary events for detection as detailed in the <a href="https://ela.st/audit-security-group-management">setup instructions</a>.</li>
<li>Deploy the following Sigma rule to detect potential Active Directory group modifications by the SYSTEM account and tune for your environment.</li>
<li>Investigate any event with event code 4728 where the SubjectUserSid is &ldquo;S-1-5-18&rdquo; as described in the <a href="#overview">overview</a>.</li>
<li>Review the investigation guide outlined in the rule description for triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>windows</category><category>active directory</category></item><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item><item><title>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</title><link>https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</guid><description>The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.</description><content:encoded><![CDATA[<p>The Azure AD Connect Authentication Agent facilitates pass-through authentication (PTA) in hybrid environments. Attackers may attempt to load malicious DLLs into the <code>AzureADConnectAuthenticationAgentService.exe</code> process to intercept or persist credentials. This involves placing an untrusted DLL in a location where the service will load it, such as a directory with weak permissions or through DLL side-loading. Successful exploitation allows attackers to capture user credentials as they are processed by the PTA service, potentially leading to domain compromise. This activity specifically targets systems utilizing Azure AD Connect with PTA enabled. Defenders should monitor for unexpected DLL loads by the Azure AD Connect Authentication Agent to identify and prevent credential access attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system hosting the Azure AD Connect Authentication Agent.</li>
<li>The attacker identifies a location where they can place a malicious DLL that the <code>AzureADConnectAuthenticationAgentService.exe</code> process will load, such as a directory with weak permissions or a location susceptible to DLL side-loading.</li>
<li>The attacker places a malicious DLL (e.g., <code>evil.dll</code>) into the identified location.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process is started or restarted.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process loads the malicious DLL (<code>evil.dll</code>).</li>
<li>The malicious DLL intercepts or captures credentials as they are processed by the PTA service.</li>
<li>The attacker exfiltrates the captured credentials.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept credentials handled by the Azure AD Connect Authentication Agent. This can lead to the compromise of user accounts and the ability to move laterally within the environment. Organizations using Azure AD Connect with Pass-through Authentication are at risk. The impact includes potential data breaches, unauthorized access to sensitive information, and domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</code> to detect the loading of untrusted DLLs by the Azure AD Connect Authentication Agent service in your environment.</li>
<li>Monitor process creation events for <code>AzureADConnectAuthenticationAgentService.exe</code> loading DLLs outside of the standard Microsoft directories, as defined in the Sigma rule.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Restrict write access to the Azure AD Connect Authentication Agent directories to prevent unauthorized DLL placement.</li>
<li>Review administrative access to the PTA host to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>dll-side-loading</category><category>azure-ad-connect</category></item><item><title>MsiExec Child Process Spawning Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</link><pubDate>Sat, 26 Oct 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</guid><description>Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Installer service (msiexec.exe) to proxy the execution of malicious payloads, effectively bypassing application control and other security mechanisms. This technique, known as &ldquo;Msiexec&rdquo; proxy execution (T1218.007), involves using msiexec.exe to execute malicious DLLs or scripts. The detection focuses on identifying child processes spawned by MsiExec, particularly those exhibiting network activity. This behavior is atypical for legitimate software installations and updates, making it a strong indicator of potential malicious use. Defenders should be aware of this technique as it allows attackers to blend in with legitimate system processes. The Elastic detection rule, updated on 2026-05-04, aims to identify this suspicious activity across multiple data sources including Elastic Defend, Sysmon, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or social engineering.</li>
<li>Attacker leverages msiexec.exe to execute a malicious MSI package with a <code>/v</code> parameter, commonly used to pass verbose logging options, potentially hiding malicious commands.</li>
<li>The malicious MSI package contains custom actions that execute arbitrary code.</li>
<li>Msiexec.exe spawns a child process (e.g., powershell.exe, cmd.exe, or another executable) to carry out malicious actions.</li>
<li>The child process establishes a network connection to an external server or performs DNS lookups, possibly for command and control (C2) communication or to download additional payloads.</li>
<li>The attacker uses the network connection to download and execute further tools or scripts.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass application control and execute arbitrary code on the system. This can lead to malware installation, data theft, or complete system compromise. While the exact number of victims is not specified in the provided source, the technique can be applied across various sectors. The impact can range from individual workstation compromises to large-scale breaches affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MsiExec Child Process with Unusual Executable and Network Connection</code> to detect suspicious msiexec.exe child processes initiating network connections based on unusual executable paths.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and network connection logging (Event ID 3) to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process tree, command-line arguments, and network destinations.</li>
<li>Review and whitelist legitimate software installations and automated deployment tools that use MsiExec and require network access to minimize false positives, as detailed in the &ldquo;False positive analysis&rdquo; section of the source material.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Alternate Data Stream Creation/Execution at Volume Root Directory</title><link>https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</link><pubDate>Mon, 08 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</guid><description>Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation or execution of Alternate Data Streams (ADS) within the root directory of a volume on Windows systems. Attackers leverage this technique to conceal malicious tools or data, as ADSs created in this manner are not easily discoverable by standard system utilities. This method allows for the persistence and execution of malware while evading typical detection mechanisms. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, providing broad coverage across different endpoint security solutions. Monitoring for ADS activity at the volume root is crucial to identify potential defense evasion attempts and hidden malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or program (e.g., PowerShell) to create a hidden ADS at the root of a volume (e.g., <code>C:\:evil.exe</code>).</li>
<li>The ADS is populated with malicious code, such as a reverse shell or malware payload.</li>
<li>The attacker uses a command-line tool or script to execute the hidden ADS file. For example: <code>wmic process call create &quot;cmd.exe /c start C:\:evil.exe&quot;</code>.</li>
<li>The malicious code within the ADS executes, allowing the attacker to perform unauthorized actions, such as data exfiltration or establishing persistence.</li>
<li>The attacker uses the hidden ADS to maintain persistence on the system, ensuring continued access even after reboots.</li>
<li>The attacker further leverages the compromised system to move laterally within the network, compromising additional systems and escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious tools and maintain persistence on compromised systems. The creation of ADSs at the volume root directory makes it difficult for administrators and security tools to detect the presence of malware. This can lead to prolonged compromise, data breaches, and significant disruption of business operations. The rule has a risk score of 47, and a medium severity is applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect ADS creation and execution at the volume root directory.</li>
<li>Enable logging for file creation events (Sysmon Event ID 11) and process creation events (Sysmon Event ID 1) for enhanced visibility into ADS activity.</li>
<li>Investigate alerts generated by the Sigma rules to determine the legitimacy of ADS creation or execution, focusing on processes and file paths that match the <code>[A-Z]:\\:.+</code> regex pattern in the rule query.</li>
<li>Regularly scan systems for hidden ADS files using specialized tools to uncover any potential malicious files.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications and prevent the creation of malicious ADSs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>hide-artifacts</category><category>alternate-data-stream</category></item><item><title>Potential Veeam Credential Access via SQL Commands</title><link>https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-veeam-credential-access/</guid><description>Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting backup infrastructure to maximize the impact of ransomware and data exfiltration attacks. Veeam, a popular backup and disaster recovery solution, stores credentials for backup operations in MSSQL databases. An attacker who gains access to these databases may attempt to use tools like <code>sqlcmd.exe</code> or PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to extract and decrypt these credentials. This tactic allows the attacker to compromise the backups themselves, preventing recovery and increasing pressure on the victim. This activity has been observed in real-world incidents, such as those involving the Diavol ransomware. Defenders should monitor for suspicious command-line activity targeting Veeam credentials within MSSQL environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the target environment is gained through methods such as phishing or exploiting a vulnerability in a public-facing application.</li>
<li>The attacker performs reconnaissance to identify the location of the Veeam MSSQL database server.</li>
<li>The attacker obtains valid credentials or exploits a vulnerability to gain access to the Veeam MSSQL database server.</li>
<li>The attacker executes <code>sqlcmd.exe</code> or uses PowerShell commands (e.g., <code>Invoke-Sqlcmd</code>) to query the <code>[VeeamBackup].[dbo].[Credentials]</code> table.</li>
<li>The attacker retrieves the encrypted Veeam credentials from the database.</li>
<li>The attacker decrypts the Veeam credentials using custom scripts or tools, potentially leveraging the Veeam backup server itself.</li>
<li>The attacker uses the compromised Veeam credentials to access and delete or encrypt backup data.</li>
<li>The attacker deploys ransomware on the remaining systems, knowing that recovery from backups is now impossible.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful compromise of Veeam credentials can have devastating consequences. Attackers can encrypt or delete backup data, making recovery impossible and significantly increasing the impact of ransomware attacks. This can lead to prolonged downtime, data loss, financial losses, and reputational damage. Organizations relying on Veeam for backup and recovery should prioritize monitoring and securing their Veeam infrastructure to prevent credential access and backup compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture command-line activity, specifically <code>sqlcmd.exe</code> and PowerShell.</li>
<li>Deploy the Sigma rule &ldquo;Potential Veeam Credential Access Command&rdquo; to detect suspicious command executions targeting Veeam credentials in MSSQL databases.</li>
<li>Review and restrict access controls to the Veeam MSSQL database, ensuring only authorized personnel and services have access.</li>
<li>Monitor for unusual login activity and failed login attempts to the Veeam MSSQL database server.</li>
<li>Implement multi-factor authentication for all accounts with access to Veeam infrastructure.</li>
<li>Regularly audit Veeam backup configurations and logs to identify any unauthorized modifications or access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>veeam</category><category>credential-access</category><category>mssql</category><category>windows</category><category>ransomware</category></item><item><title>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</guid><description>This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts containing artifacts indicative of NTLM relay or pass-the-hash (PtH) attacks. These techniques allow attackers to authenticate to systems without needing plaintext passwords, enabling lateral movement and privilege escalation. The rule focuses on identifying specific byte sequences and strings within PowerShell script blocks that suggest NTLM/SMB negotiation and credential access attempts. This detection helps defenders identify and respond to potential credential theft and abuse within their Windows environments. The rule is based on observed techniques used in various publicly available tools such as Invoke-TheHash, Check-LocalAdminHash, and PoshC2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system. This script could be directly executed or obfuscated to evade initial detection.</li>
<li>The PowerShell script attempts to perform NTLM relay or pass-the-hash attacks by utilizing specific byte sequences related to NTLM/SMB negotiation, such as <code>NTLMSSPNegotiate</code> or <code>0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50</code>.</li>
<li>The script may utilize tools like Invoke-WMIExec or Invoke-SMBExec to execute commands on remote systems using the stolen credentials.</li>
<li>The attacker attempts to authenticate to other systems on the network using the relayed credentials or password hashes.</li>
<li>Successful authentication allows the attacker to move laterally, accessing sensitive data or escalating privileges on other systems.</li>
<li>The attacker may deploy additional payloads or establish persistence mechanisms for continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful pass-the-hash or NTLM relay attack can grant an attacker unauthorized access to sensitive systems and data within the network. This can lead to data breaches, financial loss, or disruption of critical services. The impact could range from compromising a few systems to gaining domain administrator privileges, depending on the attacker&rsquo;s goals and the network&rsquo;s security posture. Organizations can experience significant financial and reputational damage due to data breaches and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary data for this detection. Refer to the setup instructions in the rule documentation for configuration details.</li>
<li>Deploy the Sigma rule <code>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</code> to your SIEM and tune it based on your environment.</li>
<li>Investigate any alerts generated by this rule to determine the scope and impact of the potential attack. Refer to the triage and analysis section in the rule documentation for guidance on investigation steps.</li>
<li>Implement network segmentation and access controls to limit the impact of lateral movement.</li>
<li>Monitor authentication events (event codes 4624, 4625, 4648) for suspicious activity, such as NTLM authentication from unexpected source IPs or to unusual target systems, as described in the rule&rsquo;s investigation notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>pass-the-hash</category><category>ntlm-relay</category><category>powershell</category></item><item><title>Potential Windows Session Hijacking via CcmExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</guid><description>Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.</description><content:encoded><![CDATA[<p>Attackers may attempt to hijack Windows user sessions by exploiting Microsoft&rsquo;s System Center Configuration Manager (SCCM). This involves loading malicious DLLs into <code>SCNotification.exe</code>, a process responsible for user notifications within the SCCM framework. The vulnerability arises when <code>SCNotification.exe</code> loads untrusted DLLs, potentially impersonating a user session. This activity is often characterized by recent DLL file creation or modification, coupled with the DLL lacking a trusted code signature. The references indicate this technique has been discussed publicly, raising awareness and the potential for increased exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system.</li>
<li>Attacker places a malicious DLL on the system. This DLL may be disguised to appear legitimate.</li>
<li>The attacker manipulates the system to cause <code>SCNotification.exe</code> to load the malicious DLL. This may involve modifying registry keys or file paths.</li>
<li><code>SCNotification.exe</code> loads the attacker-controlled DLL.</li>
<li>The malicious DLL executes within the context of the <code>SCNotification.exe</code> process.</li>
<li>The attacker leverages the hijacked process to impersonate a user session.</li>
<li>Attacker gains unauthorized access to user accounts and data.</li>
<li>Attacker performs malicious actions under the guise of the compromised user, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, privilege escalation, and further compromise of the network. Victims could experience data breaches, financial loss, or reputational damage. The impact depends on the extent of access gained by the attacker and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Windows Session Hijacking via CcmExec&rdquo; to your SIEM to detect suspicious DLL loads by <code>SCNotification.exe</code>.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on DLLs with recent file creation times or modifications (DLL timestamps) and untrusted signatures.</li>
<li>Implement application whitelisting to prevent unauthorized DLLs from being loaded by <code>SCNotification.exe</code> as described in the remediation steps in the note section.</li>
<li>Monitor process creation events for <code>SCNotification.exe</code> and related processes.</li>
<li>Enable Sysmon process creation logging to enhance visibility into process execution events, which activates the Sigma rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>dll-hijacking</category><category>sccm</category></item><item><title>NTDS Dump via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</guid><description>Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>wbadmin.exe</code> with arguments indicative of an attempt to access and dump the NTDS.dit file from a Windows domain controller. Attackers with sufficient privileges, specifically those belonging to groups like Backup Operators, can abuse the legitimate <code>wbadmin.exe</code> utility to create a backup of the Active Directory database (NTDS.dit). This file contains sensitive credential information, and once obtained, attackers can extract password hashes and compromise the entire domain. This activity is often part of a larger attack aimed at gaining persistent access and control over the network. The Elastic detection rule was published on 2024-06-05 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network. This may be achieved through phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>The attacker escalates privileges to obtain membership in the Backup Operators group or a similar privileged group capable of running backups.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>recovery</code> argument, targeting the NTDS.dit file. The command line includes parameters to create a system state backup.</li>
<li>Wbadmin creates a backup of the system state, including the NTDS.dit file, in a specified location.</li>
<li>The attacker copies the NTDS.dit file from the backup location to a separate location for offline analysis.</li>
<li>The attacker uses tools such as <code>ntdsutil.exe</code> or <code>secretsdump.py</code> to extract password hashes from the NTDS.dit file.</li>
<li>The attacker cracks the password hashes or uses them in pass-the-hash attacks to gain access to other systems and resources within the domain.</li>
<li>The attacker achieves domain dominance and persistence, allowing them to control critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to dump credentials from the NTDS.dit file, leading to complete compromise of the Active Directory domain. This enables them to move laterally, access sensitive data, and establish persistent control over the environment. The impact can include data breaches, ransomware deployment, and long-term disruption of business operations. The medium risk score indicates that while the attack requires specific privileges, the consequences are significant if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>wbadmin.exe</code> execution as described in the Attack Chain (Data Source: Windows Security Event Logs, Sysmon).</li>
<li>Implement the provided Sigma rule to detect suspicious <code>wbadmin.exe</code> execution with NTDS.dit related arguments in your SIEM (Rule: NTDS Dump via Wbadmin).</li>
<li>Monitor and restrict membership in privileged groups like Backup Operators to minimize the risk of abuse (Reference: <a href="https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)">https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)</a>.</li>
<li>Review and whitelist legitimate backup schedules or disaster recovery processes to reduce false positives (False positive analysis).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>wbadmin</category><category>ntds.dit</category></item><item><title>Microsoft Management Console File Execution from Unusual Path</title><link>https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</guid><description>Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may exploit Microsoft Management Console (MMC) by executing .msc files from non-standard directories to bypass security controls. This technique can be used for initial access and execution. This detection focuses on identifying the execution of <code>mmc.exe</code> with <code>.msc</code> files from paths outside the typical system directories, which are generally considered trusted. By monitoring process executions and filtering out known legitimate paths, analysts can identify potentially malicious activity related to the misuse of MMC. The rule aims to detect deviations from standard administrative practices that could indicate unauthorized access or command execution via malicious or compromised <code>.msc</code> files. The detection logic specifically excludes executions from common directories like <code>System32</code>, <code>SysWOW64</code>, and <code>Program Files</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an unspecified method.</li>
<li>The attacker places a malicious <code>.msc</code> file in an unusual or untrusted directory (e.g., <code>C:\Users\Public</code>).</li>
<li>The attacker executes <code>mmc.exe</code> with the malicious <code>.msc</code> file as an argument from the untrusted path.</li>
<li><code>mmc.exe</code> processes the <code>.msc</code> file, potentially executing embedded commands or scripts.</li>
<li>The malicious <code>.msc</code> file performs unauthorized actions on the system, such as modifying system settings or executing arbitrary code.</li>
<li>The attacker leverages the execution context of <code>mmc.exe</code> to bypass security controls and escalate privileges.</li>
<li>The attacker may establish persistence by creating a scheduled task or modifying registry keys to execute the malicious <code>.msc</code> file automatically.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access, command execution, and privilege escalation, potentially compromising the entire system. While specific victim counts or sector targeting are not available, the technique is applicable across various Windows environments. The use of a trusted system binary like <code>mmc.exe</code> for malicious purposes can evade traditional security measures, making detection more challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Microsoft Management Console File from Unusual Path</code> to detect the execution of <code>mmc.exe</code> with <code>.msc</code> files from untrusted paths.</li>
<li>Enable process creation logging with command-line arguments to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the origin and content of the <code>.msc</code> file.</li>
<li>Consider implementing application control policies to restrict the execution of <code>.msc</code> files to authorized directories only.</li>
<li>Review and audit the use of MMC in the environment to identify any legitimate use cases that might trigger false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>windows</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Suspicious Registry Hive Access via RegBack</title><link>https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</link><pubDate>Tue, 02 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</guid><description>This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access registry backup hives (SAM, SECURITY, and SYSTEM) located in the <code>RegBack</code> folder on Windows systems. These hives contain sensitive credential material, making them attractive targets for attackers seeking to compromise system security. The detection logic focuses on file access events, specifically successful file opens, while excluding known benign processes such as <code>taskhostw.exe</code> and various AV/EDR solutions (SophosScanCoordinator.exe, MsSense.exe, ccSvcHst.exe, etc.) to minimize false positives. The rule is designed to provide defenders with high-fidelity alerts when unauthorized access to these critical registry hives is detected. The scope includes any Windows system where endpoint file access logging is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means.</li>
<li>The attacker attempts to access the <code>SAM</code>, <code>SECURITY</code>, or <code>SYSTEM</code> registry hives located in the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory.</li>
<li>The attacker leverages a tool or script to open one or more of these registry hives. This could involve using built-in Windows utilities, scripting languages, or custom-developed tools.</li>
<li>If the attacker successfully opens the <code>SAM</code> and <code>SYSTEM</code> hives, they can extract user account credentials, including usernames, password hashes, and other sensitive information. The <code>SECURITY</code> hive is also useful.</li>
<li>The attacker may stage the registry hive files by copying them to a different location on the system for further analysis or exfiltration.</li>
<li>The attacker uses credential dumping tools (e.g., Mimikatz, secretsdump.py) or custom scripts to extract credentials from the staged registry hives.</li>
<li>The attacker leverages the extracted credentials to escalate privileges, move laterally within the network, or access sensitive data.</li>
<li>The final objective is typically to gain unauthorized access to critical systems, steal sensitive data, or establish long-term persistence within the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to the compromise of user account credentials, enabling attackers to escalate privileges, move laterally within the network, and gain unauthorized access to sensitive data. The impact can range from data breaches and financial losses to reputational damage and disruption of critical business operations. The number of victims can vary depending on the scope of the attacker&rsquo;s activities and the security posture of the targeted organization. Sectors commonly targeted include finance, healthcare, government, and critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file access monitoring for the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory to capture file open events.</li>
<li>Deploy the Sigma rule <code>Registry Hive Access via RegBack</code> to your SIEM and tune the exclusions based on your environment.</li>
<li>Monitor <code>process_creation</code> events for unusual processes accessing files in <code>C:\\Windows\\System32\\config\\RegBack\\</code>, using the rule <code>Suspicious Process Accessing RegBack Hives</code>.</li>
<li>Enable Sysmon process creation logging and file creation to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>regback</category><category>windows</category></item><item><title>Unauthorized Modification of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</link><pubDate>Wed, 29 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</guid><description>An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.</description><content:encoded><![CDATA[<p>Compromised or malicious actors may attempt to modify Azure Conditional Access (CA) policies to weaken security controls, elevate privileges, or establish persistence within the Azure environment. Conditional Access policies are critical for enforcing organizational security standards, and unauthorized changes can have significant security implications. This activity is detected through Azure Audit Logs by monitoring for &ldquo;Update conditional access policy&rdquo; events. Defenders should investigate any modifications to Conditional Access policies to ensure they are legitimate and align with security best practices. Detecting and responding to unauthorized CA policy modifications is crucial for maintaining the integrity and security of the Azure environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access through compromised credentials or other means (not specified in source).</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages existing privileges or exploits vulnerabilities to gain sufficient permissions to modify Conditional Access policies (e.g., through a compromised Global Administrator account).</li>
<li><strong>Policy Enumeration:</strong> The attacker enumerates existing Conditional Access policies to identify targets for modification using tools like Azure PowerShell or the Azure portal.</li>
<li><strong>Policy Modification:</strong> The attacker modifies a Conditional Access policy, for example, by weakening MFA requirements, excluding specific users or groups from the policy, or disabling the policy altogether.</li>
<li><strong>Persistence:</strong> By weakening or disabling Conditional Access policies, the attacker establishes a persistent foothold in the environment, allowing them to bypass security controls and maintain unauthorized access.</li>
<li><strong>Credential Access:</strong> With weakened MFA or other access controls, the attacker gains easier access to sensitive credentials.</li>
<li><strong>Defense Impairment:</strong> The modification of CA policies impairs the organization&rsquo;s defense mechanisms, making it easier for the attacker to perform malicious activities undetected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Conditional Access policies can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. The number of affected users and resources depends on the scope of the modified policies. Organizations may experience data loss, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;CA Policy Updated by Non Approved Actor&rdquo; Sigma rule to your SIEM to detect unauthorized modifications to Conditional Access policies within your Azure environment.</li>
<li>Review the <code>properties.message</code> field in the Azure Audit Logs for &ldquo;Update conditional access policy&rdquo; events and compare &ldquo;old&rdquo; vs &ldquo;new&rdquo; values to understand the nature of the changes.</li>
<li>Implement strict role-based access control (RBAC) to limit the number of users who can modify Conditional Access policies.</li>
<li>Investigate any alerts generated by the Sigma rule and verify whether the user identity, user agent, and/or hostname should be making changes in your environment.</li>
<li>Enable multi-factor authentication (MFA) for all users, especially those with administrative privileges, to reduce the risk of credential compromise (related to attack.credential-access tag).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>policy-modification</category><category>attack.privilege-escalation</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.defense-impairment</category><category>attack.t1548</category><category>attack.t1556</category></item><item><title>Azure AD Root Certificate Authority Added for Passwordless Authentication</title><link>https://feed.craftedsignal.io/briefs/2024-05-azuread-root-ca-add/</link><pubDate>Wed, 08 May 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-azuread-root-ca-add/</guid><description>An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.</description><content:encoded><![CDATA[<p>The addition of a new root certificate authority (CA) in Azure Active Directory (Azure AD) to support certificate-based authentication (CBA) can be a sign of malicious activity. While CBA offers passwordless authentication benefits, attackers can abuse it to establish persistent access, escalate privileges, or evade detection. An attacker with sufficient privileges in the Azure AD tenant can add a rogue CA, enabling them to authenticate as any user within the directory, even without their password. This bypasses multi-factor authentication (MFA) and grants unauthorized access to sensitive resources and data. Defenders should monitor Azure AD audit logs for unexpected modifications to the <code>TrustedCAsForPasswordlessAuth</code> setting, as this could indicate a compromised administrator account or an insider threat attempting to establish a backdoor.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Compromise an Azure AD administrator account with sufficient privileges to modify tenant-wide settings. This may be achieved through phishing, credential stuffing, or exploiting vulnerabilities.</li>
<li>The attacker authenticates to the Azure portal or uses PowerShell cmdlets to interact with Azure AD.</li>
<li>The attacker executes commands to add a new, attacker-controlled root certificate authority to the <code>TrustedCAsForPasswordlessAuth</code> setting. This involves modifying the Company Information object.</li>
<li>The attacker generates or obtains a certificate signed by the newly added root CA.</li>
<li>The attacker uses the certificate to authenticate to Azure AD as a targeted user, bypassing password requirements and multi-factor authentication.</li>
<li>The attacker gains access to the targeted user&rsquo;s resources, such as email, files, and applications.</li>
<li>The attacker escalates privileges within the Azure AD tenant by impersonating highly privileged users or roles.</li>
<li>The attacker maintains persistent access to the Azure AD tenant, even if the compromised administrator account is remediated.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete compromise of the Azure AD tenant, including access to sensitive data, applications, and resources. Attackers can use the compromised tenant to move laterally to other systems, exfiltrate data, or disrupt business operations. The number of potential victims is dependent on the size of the Azure AD tenant. Organizations across all sectors are at risk, especially those heavily reliant on Azure AD for identity and access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;New Root Certificate Authority Added&rdquo; to your SIEM to detect unauthorized modifications to the <code>TrustedCAsForPasswordlessAuth</code> setting (rule).</li>
<li>Review Azure AD audit logs regularly for suspicious activity related to the &ldquo;Set Company Information&rdquo; operation (logsource).</li>
<li>Implement multi-factor authentication (MFA) for all Azure AD accounts, including administrators, but understand that CBA can bypass it.</li>
<li>Enforce the principle of least privilege and restrict the number of accounts with permissions to modify tenant-wide settings.</li>
<li>Monitor for the use of certificates signed by unknown or untrusted CAs to authenticate to Azure AD.</li>
<li>Consult the SpecterOps and Goodworkaround articles for more information on certificate-based authentication abuse in Azure AD (references).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.privilege-escalation</category><category>attack.defense-impairment</category><category>attack.t1556</category></item><item><title>Potential ADIDNS Poisoning via Wildcard Record Creation</title><link>https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</link><pubDate>Fri, 03 May 2024 14:58:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-adidns-wildcard/</guid><description>Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.</description><content:encoded><![CDATA[<p>Active Directory Integrated DNS (ADIDNS) stores DNS zones as Active Directory objects, which, while providing access control and replication benefits, introduces security issues. A significant concern is the creation of wildcard records due to the default permission allowing any authenticated user to create DNS-named records. By exploiting this, attackers can establish wildcard records to redirect traffic for domain names lacking explicit DNS records, effectively positioning themselves as an adversary-in-the-middle. This manipulation of ADIDNS can lead to credential interception or relay attacks, similar to LLMNR/NBNS spoofing. This poses a high risk to organizations relying on ADIDNS for domain consistency and secure name resolution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the domain.</li>
<li>Attacker leverages existing privileges to create a wildcard DNS record (A record) within an ADIDNS zone.</li>
<li>The wildcard record is created with a DN like <code>DC=*,DC=example.com,CN=MicrosoftDNS,DC=DomainDnsZones,DC=example,DC=com</code>, where <code>DC=*</code> signifies the wildcard. Event ID 5137 is generated.</li>
<li>The wildcard record points to a malicious server controlled by the attacker.</li>
<li>A client attempts to resolve a domain name that does not have an explicit DNS record.</li>
<li>Due to the wildcard record, the DNS query resolves to the attacker&rsquo;s malicious server.</li>
<li>The client connects to the attacker&rsquo;s server, potentially exposing credentials or other sensitive information.</li>
<li>The attacker intercepts or relays the client&rsquo;s traffic, gaining unauthorized access or control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept network traffic, steal credentials, and potentially gain control over systems within the affected domain. The impact includes unauthorized access to sensitive data, lateral movement within the network, and potential compromise of critical domain services. This can affect any organization using Active Directory Integrated DNS, leading to widespread disruption and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Directory Service Changes&rdquo; to generate the necessary Windows Security Event Logs (5137) for detecting ADIDNS wildcard record creation as described in the <a href="https://ela.st/audit-directory-service-changes">setup instructions</a>.</li>
<li>Deploy the Sigma rule &ldquo;Potential ADIDNS Poisoning via Wildcard Record Creation&rdquo; to detect the creation of wildcard DNS records in ADIDNS based on Windows Event ID 5137.</li>
<li>Review and restrict ADIDNS permissions for DNS zones to limit wildcard-creation opportunities, focusing on authenticated-user create-child rights.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on <code>winlog.event_data.ObjectDN</code>, <code>user.name</code>, and the originating session as outlined in the rule&rsquo;s <code>note</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>adidns</category><category>windows</category><category>active-directory</category></item><item><title>GenAI Process Connection to Unusual Domain on macOS</title><link>https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</link><pubDate>Thu, 02 May 2024 14:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-genai-unusual-domain/</guid><description>This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.</description><content:encoded><![CDATA[<p>This threat brief addresses the risk of GenAI tools on macOS connecting to unusual domains, which may indicate a compromised state. Attackers can exploit GenAI tools through prompt injection, malicious MCP (Model Context Protocol) servers, or poisoned plugins to establish command-and-control (C2) channels or exfiltrate sensitive data. Given the network access capabilities of AI agents, adversaries may manipulate them to beacon to external servers, download malicious payloads, or transmit harvested credentials and documents. The Elastic detection rule <code>9050506c-df6d-4bdf-bc82-fcad0ef1e8c1</code> focuses on identifying such anomalous network connections originating from a predefined list of GenAI processes, excluding known legitimate domains. The rule has been actively maintained since its creation on December 4, 2025, with its latest update on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary compromises a GenAI tool on a macOS system through prompt injection, malicious MCP servers, or poisoned plugins.</li>
<li>The compromised GenAI tool is configured to connect to an attacker-controlled domain for C2.</li>
<li>The GenAI process initiates a network connection attempt to the unusual domain using standard web protocols (HTTP/HTTPS).</li>
<li>The macOS system&rsquo;s network stack resolves the attacker&rsquo;s domain to its corresponding IP address.</li>
<li>The GenAI process sends data to the attacker-controlled domain, potentially including sensitive information.</li>
<li>The attacker uses the C2 channel to send commands to the compromised GenAI tool.</li>
<li>The GenAI tool executes the commands, potentially leading to further compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised GenAI tools can lead to data exfiltration, unauthorized access to sensitive information, and the establishment of persistent C2 channels within an organization&rsquo;s network. The impact ranges from the loss of intellectual property and customer data to the potential disruption of business operations. The risk is amplified if the GenAI tool has access to internal systems or sensitive data stores, allowing attackers to pivot and escalate their attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GenAI Process Connecting to Unusual Domain&rdquo; to your SIEM and tune for your environment (see rule below).</li>
<li>Enable process creation and network connection logging on macOS endpoints to collect the data required for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the domain and the GenAI process&rsquo;s behavior.</li>
<li>Block any identified malicious domains at the network level (see query in the provided source).</li>
<li>Review the GenAI tool&rsquo;s configuration for unauthorized MCP servers, plugins, or extensions that initiated the connection.</li>
<li>Regularly update the list of allowed domains in the Sigma rule&rsquo;s filter to account for legitimate updates to GenAI tool infrastructure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>genai</category><category>command and control</category><category>macos</category><category>network connection</category></item><item><title>Azure AD Certificate-Based Authentication Enabled</title><link>https://feed.craftedsignal.io/briefs/2024-04-azure-ad-cba-enabled/</link><pubDate>Mon, 29 Apr 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-azure-ad-cba-enabled/</guid><description>Enabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.</description><content:encoded><![CDATA[<p>Certificate-Based Authentication (CBA) in Azure Active Directory allows users and services to authenticate using digital certificates instead of passwords. While intended to enhance security, misconfiguration or malicious use of CBA can lead to significant security risks. Attackers can exploit CBA to gain unauthorized access, establish persistent footholds, and escalate privileges within the Azure environment. This involves manipulating authentication policies to favor or require certificate authentication, potentially bypassing other security controls. Detection of CBA enablement is crucial as it can be a precursor to more sophisticated attacks targeting cloud resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure AD account with sufficient privileges to modify authentication policies (e.g., Global Administrator).</li>
<li>The attacker modifies the Azure AD authentication methods policy to enable certificate-based authentication.</li>
<li>The attacker registers a certificate authority (CA) in Azure AD, which will be used to issue certificates for authentication.</li>
<li>The attacker crafts or compromises a certificate that is trusted by the registered CA.</li>
<li>The attacker uses the crafted certificate to authenticate to Azure AD, bypassing traditional password-based authentication.</li>
<li>The attacker leverages the newly gained access to provision new resources, modify existing configurations, or access sensitive data.</li>
<li>The attacker establishes persistence by creating service principals or applications that authenticate using certificates, allowing them to maintain access even if the initial account is compromised.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CBA can lead to full compromise of an Azure AD tenant. Attackers can gain access to sensitive data, disrupt services, and deploy malicious applications. The lack of multi-factor authentication on certificate-based logins significantly increases the risk of unauthorized access. The impact can range from data breaches and financial losses to complete operational shutdown, depending on the scope of the compromised resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect when certificate-based authentication is enabled in Azure AD (<code>Authentication Methods Policy Update</code> in Audit Logs).</li>
<li>Monitor Azure AD audit logs for modifications to authentication methods policies, paying close attention to changes related to certificate-based authentication.</li>
<li>Implement strong certificate management practices, including proper key storage, certificate revocation, and monitoring of certificate usage.</li>
<li>Investigate any unexpected changes to Azure AD authentication policies or the registration of new certificate authorities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>certificate-based-authentication</category><category>persistence</category><category>privilege-escalation</category></item><item><title>Suspicious Child Processes from Communication Applications</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</guid><description>The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying suspicious child processes of communication applications such as Slack, Cisco Webex, Microsoft Teams, Discord, WhatsApp, Zoom, and Thunderbird on Windows operating systems. Attackers may attempt to masquerade as legitimate processes or exploit vulnerabilities in these applications to execute malicious code. The rule monitors for the creation of child processes by these communication apps and checks if those child processes are unexpected, untrusted, or lack a valid code signature. This detection is crucial because successful exploitation can lead to unauthorized access, data exfiltration, or further compromise of the system. The rule has been actively maintained since August 2023, with updates as recent as May 2026, indicating its relevance and ongoing refinement to address emerging threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches a communication application (e.g., Slack, Teams, Webex).</li>
<li>The communication application executes a vulnerable or compromised component.</li>
<li>The compromised component spawns a child process (e.g., powershell.exe, cmd.exe).</li>
<li>The child process executes a malicious command or script.</li>
<li>The script attempts to download additional payloads from an external source.</li>
<li>The payload executes, establishing persistence through registry modification or scheduled tasks.</li>
<li>The attacker gains remote access to the system.</li>
<li>Data exfiltration or lateral movement within the network occurs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, installation of malware, and potential lateral movement within the organization&rsquo;s network. By exploiting communication applications, attackers can gain access to internal communications, confidential documents, and user credentials. The number of affected users and the extent of the damage depend on the compromised application and the attacker&rsquo;s objectives. If successful, this attack may lead to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Communication App Child Process</code> to your SIEM to detect anomalous child processes spawned by communication applications and tune for your environment.</li>
<li>Enable process creation logging with command line arguments in Windows to ensure that the Sigma rule has the necessary data to function correctly (logsource: <code>process_creation</code>, product: <code>windows</code>).</li>
<li>Investigate any alerts generated by the rule and review the command line arguments of the spawned processes to identify potential malicious activity.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications and reduce the attack surface.</li>
<li>Ensure that all communication applications are updated to the latest versions to patch known vulnerabilities and reduce the risk of exploitation.</li>
<li>Examine the network activity of the affected system to identify any suspicious outbound connections that may indicate data exfiltration or communication with a command and control server, referencing the setup guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Azure Identity Protection Suspicious Browser Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-31-suspicious-azure-browser/</guid><description>A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.</description><content:encoded><![CDATA[<p>The &ldquo;suspiciousBrowser&rdquo; risk event in Azure Identity Protection signals unusual sign-in patterns indicative of potential account compromise or other malicious activity. This alert is triggered when the same browser is used to access multiple tenants from different countries, which is an atypical behavior for legitimate users. This type of activity could be caused by malware, credential theft, or an attacker attempting to blend in with normal user behavior after gaining unauthorized access. This detection is important for defenders because it can highlight early stages of an attack, potentially preventing lateral movement, data exfiltration, or other damaging actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials through phishing, malware, or other means (T1566, T1190).</li>
<li>The attacker configures a browser with the stolen credentials.</li>
<li>The attacker uses the same browser to attempt sign-ins to multiple Azure tenants from different geographical locations, attempting to blend in with typical user activity.</li>
<li>Azure Identity Protection detects the &ldquo;suspiciousBrowser&rdquo; risk event based on the anomalous sign-in activity.</li>
<li>If successful, the attacker may gain access to sensitive data and resources within the targeted tenants.</li>
<li>The attacker leverages the compromised accounts to escalate privileges and move laterally within the organization (T1078, T1068).</li>
<li>The attacker exfiltrates sensitive data or deploy ransomware (T1003, T1486).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting suspicious browser activity can lead to unauthorized access to multiple Azure tenants, potentially impacting numerous organizations. The compromise of user accounts can result in data breaches, financial losses, and reputational damage. The scope of the impact depends on the level of access granted to the compromised accounts and the sensitivity of the data stored within the targeted tenants.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect &ldquo;suspiciousBrowser&rdquo; risk events in your Azure environment and tune for your environment.</li>
<li>Investigate sessions flagged by this detection in the context of other sign-ins from the same user to identify false positives.</li>
<li>Enforce multi-factor authentication (MFA) to mitigate the impact of compromised credentials.</li>
<li>Monitor user sign-in activity for unusual patterns, such as sign-ins from multiple geographical locations within a short period.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azure</category><category>identity-protection</category><category>suspicious-browser</category></item><item><title>Azure Firewall Rule Collection Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</guid><description>An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.</description><content:encoded><![CDATA[<p>The modification or deletion of Azure Firewall rule collections (Application, NAT, and Network) can indicate malicious activity within an Azure environment. Threat actors may target these rules to bypass security controls, allowing unauthorized network traffic, enabling data exfiltration, or facilitating lateral movement. Monitoring these changes is crucial for maintaining the integrity of network security policies and detecting potential breaches. This activity directly impacts an organization&rsquo;s ability to enforce its security posture, potentially exposing sensitive resources to unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, potentially through compromised credentials or a vulnerability in an application.</li>
<li>The attacker enumerates existing Azure Firewall resources to identify rule collections (Application, NAT, and Network) that can be modified or deleted.</li>
<li>The attacker uses valid Azure credentials or exploits a misconfiguration to authenticate to the Azure Resource Manager API.</li>
<li>The attacker crafts a malicious request to modify the target rule collection, potentially altering allowed ports, IP addresses, or protocols.</li>
<li>Alternatively, the attacker crafts a request to delete an entire rule collection, effectively disabling its associated security controls.</li>
<li>The attacker sends the request to the Azure Resource Manager API, executing the change to the firewall configuration.</li>
<li>The modified or deleted rule collection now allows unauthorized traffic to bypass the firewall, potentially enabling lateral movement or data exfiltration.</li>
<li>The attacker exploits the newly opened network paths to achieve their final objective, such as deploying ransomware or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure Firewall rule collections can have significant consequences. Unauthorized traffic could bypass security controls, enabling data exfiltration, lateral movement, or the deployment of malware. This could lead to data breaches, service disruptions, and financial losses. The impact depends on the scope of the modified or deleted rule collection and the resources it protects.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Firewall Rule Collection Modified or Deleted&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to firewall configurations.</li>
<li>Review Azure Activity Logs for any events matching the <code>operationName</code> values specified in the Sigma rule to identify suspicious activity.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with permissions to manage firewall resources, to reduce the risk of credential compromise.</li>
<li>Regularly audit Azure role-based access control (RBAC) assignments to ensure the principle of least privilege is followed and that only authorized users have permissions to modify firewall configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-impairment</category></item><item><title>Potential Enumeration via Active Directory Web Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</link><pubDate>Wed, 31 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-adws-enumeration/</guid><description>Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.</description><content:encoded><![CDATA[<p>The Active Directory Web Service (ADWS) facilitates querying Active Directory (AD) over a network, providing a web-based interface for directory services. Adversaries may exploit ADWS to enumerate network resources and user accounts, gaining insights into the environment. This attack involves loading Active Directory related modules and establishing network connections to the ADWS dedicated TCP port 9389. The goal is to gather information about the domain, user accounts, and permissions, which can be used for lateral movement, privilege escalation, and data exfiltration. Detection focuses on identifying suspicious processes loading <code>System.DirectoryServices*.dll</code> or <code>System.IdentityModel*.dll</code> and then connecting to the ADWS port.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target network.</li>
<li>The attacker executes a reconnaissance tool or script (e.g., PowerShell) on the compromised host.</li>
<li>The reconnaissance tool loads Active Directory related modules such as <code>System.DirectoryServices*.dll</code> and <code>System.IdentityModel*.dll</code>.</li>
<li>The reconnaissance tool attempts to establish a network connection to the ADWS service on TCP port 9389, the dedicated port for ADWS.</li>
<li>The tool queries ADWS to retrieve information about domain users (T1087.002), groups (T1069.002), systems (T1018), and permissions.</li>
<li>The attacker analyzes the gathered information to identify privileged accounts and potential targets for lateral movement.</li>
<li>The attacker uses the discovered information to move laterally within the network.</li>
<li>The attacker escalates privileges, and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain detailed knowledge of the Active Directory environment. This information can be used to identify high-value targets, compromise privileged accounts, move laterally within the network, and ultimately achieve their objectives, which could include data theft, ransomware deployment, or disruption of services. The impact can range from data breaches to complete compromise of the Active Directory domain, depending on the attacker&rsquo;s goals and the level of access they achieve.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Suspicious Library Loading&rdquo; to detect processes loading AD-related DLLs (e.g., <code>System.DirectoryServices*.dll</code>, <code>System.IdentityModel*.dll</code>).</li>
<li>Deploy the Sigma rule &ldquo;Potential ADWS Enumeration via Network Connection&rdquo; to monitor for network connections to destination port 9389 from unusual processes.</li>
<li>Review and whitelist legitimate administrative tools or scripts that load Active Directory-related modules and connect to the ADWS port as described in the &ldquo;False positive analysis&rdquo; section of the original rule documentation.</li>
<li>Implement network segmentation to limit access to the ADWS port (9389) to only trusted systems and users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>active-directory</category><category>enumeration</category><category>adws</category><category>discovery</category><category>windows</category></item><item><title>Wireless Credential Dumping via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</guid><description>Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>Attackers often target wireless credentials to gain unauthorized network access. This involves using the legitimate Windows command-line tool <code>netsh.exe</code> to extract Wi-Fi passwords stored on a compromised system. By leveraging <code>netsh</code>, attackers can bypass traditional security measures and retrieve sensitive information without deploying custom malware. The technique involves specific command-line arguments that instruct <code>netsh</code> to display wireless keys in cleartext, exposing the network passwords. Defenders must monitor <code>netsh</code> command-line activity to identify potential credential access attempts. This activity can lead to lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to list available wireless profiles.</li>
<li>The attacker identifies a target wireless profile from the list.</li>
<li>The attacker executes <code>netsh.exe</code> again, this time specifying the target profile and requesting the key to be displayed in cleartext using the <code>key=clear</code> argument.</li>
<li><code>Netsh.exe</code> retrieves the Wi-Fi password from the Windows Wireless LAN service.</li>
<li>The password is displayed in the command output, which the attacker captures.</li>
<li>The attacker uses the obtained Wi-Fi password to connect to the wireless network.</li>
<li>The attacker can now perform lateral movement and access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful credential dumping allows attackers to gain unauthorized access to wireless networks. This can lead to lateral movement within the organization&rsquo;s network, access to sensitive data, and further compromise of systems and resources. The impact includes potential data breaches, financial losses, and reputational damage. This technique allows attackers to bypass traditional network access controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Wireless Credential Dumping via Netsh</code> to identify suspicious <code>netsh.exe</code> commands in your environment.</li>
<li>Enable Sysmon process creation logging to capture the <code>netsh.exe</code> command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process lineage and user context as outlined in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
<li>Implement strong password policies for Wi-Fi networks, including the use of WPA2 or WPA3 encryption.</li>
<li>Review and restrict the use of <code>netsh.exe</code> on systems where it is not required, using application control solutions.</li>
<li>Monitor for related alerts indicating lateral movement, staging, remote access, or persistence, as mentioned in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>netsh</category><category>windows</category></item><item><title>Windows Console History Clearing</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</guid><description>Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.</description><content:encoded><![CDATA[<p>Attackers can try to cover their tracks by clearing the PowerShell console history on Windows systems. PowerShell offers multiple ways to log commands, including the built-in history and the command history managed by the PSReadLine module. This activity is often part of post-compromise behavior aimed at evading detection and forensic analysis. This rule detects the execution of specific commands that clear the built-in PowerShell logs or delete the <code>ConsoleHost_history.txt</code> file. The rule focuses on PowerShell activity and covers scenarios where commands like Clear-History, Remove-Item, rm, and Set-PSReadlineOption are used to manipulate command history.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified method, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker executes PowerShell (powershell.exe, pwsh.exe, or powershell_ise.exe) to perform reconnaissance and other malicious activities.</li>
<li>The attacker attempts to clear the PowerShell command history using the <code>Clear-History</code> cmdlet.</li>
<li>Alternatively, the attacker attempts to remove the <code>ConsoleHost_history.txt</code> file using <code>Remove-Item</code> or <code>rm</code>, which stores the PSReadLine command history.</li>
<li>Another method involves using the <code>Set-PSReadlineOption</code> cmdlet with the <code>SaveNothing</code> parameter to prevent the saving of future command history.</li>
<li>The attacker may leverage other tools and techniques to further obscure their activities and maintain persistence on the compromised system.</li>
<li>The attacker attempts to move laterally to other systems within the network to increase their impact.</li>
<li>The final objective is data exfiltration, deployment of ransomware, or other malicious activities, all while attempting to evade detection by clearing logs and command history.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of console history hinders forensic investigations and incident response efforts. If command history is cleared, administrators will have difficulty reconstructing the attacker&rsquo;s actions and identifying the extent of the compromise. This can lead to prolonged incident response times, increased damage, and potential for further exploitation of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Clearing PowerShell History</code> to your SIEM to detect the use of <code>Clear-History</code> cmdlet, potentially indicating an attempt to remove command history.</li>
<li>Deploy the Sigma rule <code>Detect Removal of PowerShell History File</code> to detect the use of <code>Remove-Item</code> or <code>rm</code> command against the PowerShell history file.</li>
<li>Enable PowerShell logging and auditing policies to ensure adequate visibility into PowerShell activity as described in the <a href="https://ela.st/audit-process-creation">setup instructions</a> to improve detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>System File Ownership Change for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</guid><description>Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.</description><content:encoded><![CDATA[<p>Attackers often attempt to modify file or directory ownership to bypass access controls and gain unauthorized access to sensitive data or system resources. This involves altering permissions associated with critical files or directories, granting broader access to accounts under attacker control or resetting permissions to default values which might be more permissive. This defense evasion technique can be used to establish persistence, escalate privileges, or exfiltrate data without triggering standard security alerts. The common tools used include <code>icacls.exe</code> and <code>takeown.exe</code>, typically targeting files within the <code>C:\Windows\</code> directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromised account or vulnerability.</li>
<li>The attacker uses <code>takeown.exe /f &lt;file&gt;</code> to take ownership of a target file or directory.</li>
<li>The attacker uses <code>icacls.exe &lt;file&gt; /reset</code> to reset the ACL of the file or directory.</li>
<li>Alternatively, the attacker uses <code>icacls.exe &lt;file&gt; /grant Everyone:F</code> to grant full control to everyone, weakening security.</li>
<li>The attacker modifies the contents of the file, such as injecting malicious code or configuration changes.</li>
<li>The attacker leverages the modified file for persistence, such as a modified system DLL loaded at boot.</li>
<li>The system executes the malicious code when the compromised file is accessed or executed.</li>
<li>The attacker achieves their objective, such as maintaining persistence, escalating privileges, or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising file and directory permissions can lead to significant security breaches. Successful attacks can allow unauthorized access to sensitive data, system instability, or the execution of malicious code with elevated privileges. This can affect any Windows environment where file permissions are improperly managed, with potential for widespread system compromise and data exfiltration. The impact is most severe on systems containing sensitive data or critical infrastructure components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>icacls.exe</code> and <code>takeown.exe</code> with suspicious arguments targeting system files (e.g., <code>C:\Windows\*</code>) to detect potential permission modification attempts using the provided Sigma rules.</li>
<li>Enable Windows Security Auditing for file system changes to capture events related to permission modifications and ownership changes.</li>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment, specifically focusing on processes modifying permissions on files within the <code>C:\Windows\</code> directory.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain and the target files being modified.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Service Reconnaissance via WMIC.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</guid><description>Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.</description><content:encoded><![CDATA[<p>Attackers may leverage the Windows Management Instrumentation Command-line (WMIC) tool for reconnaissance activities within a network. Specifically, WMIC can be used to query and retrieve information about services running on remote systems. By executing WMIC commands with the &lsquo;service&rsquo; parameter, adversaries can identify the presence and status of specific services, potentially revealing vulnerable or misconfigured systems. This information can then be used to guide further exploitation attempts. WMIC is a built-in Windows utility, making its activity blend with legitimate system administration tasks, increasing the difficulty of detection. This activity is a component of the broader T1047 technique (Windows Management Instrumentation).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a compromised system within the target network.</li>
<li>The attacker executes WMIC.exe from the command line.</li>
<li>WMIC.exe is invoked with the <code>service</code> parameter to query service information.</li>
<li>The command includes a target IP address or hostname to query a remote system.</li>
<li>The command attempts to retrieve service names and status information (e.g., <code>wmic /node:&quot;192.168.1.100&quot; service get name, state</code>).</li>
<li>WMIC attempts to connect to the remote host via RPC. An error message is generated if the remote host is unreachable: &ldquo;Node - (provided IP or default) ERROR Description =The RPC server is unavailable&rdquo;.</li>
<li>If the target service is not running, a &ldquo;No instance(s) Available&rdquo; message may be displayed.</li>
<li>The attacker parses the output from WMIC to identify running services of interest for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful service reconnaissance allows attackers to map potential attack vectors within a network. By identifying specific services running on remote systems, attackers can prioritize targets for exploitation based on known vulnerabilities or misconfigurations. This can lead to unauthorized access, data breaches, and system compromise. While the reconnaissance itself does not directly cause harm, it provides crucial information that enables subsequent malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WMIC Service Enumeration</code> to your SIEM to identify potential service reconnaissance attempts via WMIC (logsource: process_creation, product: windows).</li>
<li>Monitor process creation events for <code>WMIC.exe</code> executions containing the <code>service</code> parameter using endpoint detection and response (EDR) solutions (logsource: process_creation, product: windows).</li>
<li>Implement network segmentation to limit the scope of potential reconnaissance activities.</li>
<li>Review and restrict the use of WMIC in your environment, as it is a common tool for both legitimate administration and malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1047</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item></channel></rss>