<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Palo Alto Networks — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/palo-alto-networks/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 23:13:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/palo-alto-networks/feed.xml" rel="self" type="application/rss+xml"/><item><title>Expanding Detection Beyond Endpoints to Counter Evolving Threats</title><link>https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</link><pubDate>Fri, 01 May 2026 23:13:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-detection-beyond-endpoint/</guid><description>Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.</description><content:encoded><![CDATA[<p>The 2026 Unit 42 Global Incident Response Report highlights that threat actors are moving 4x faster to exfiltration than in 2025, exploiting blind spots due to an over-reliance on endpoint data. The proliferation of cloud services, microservices, and remote users has expanded the attack surface beyond what any single tool can monitor. Unit 42 found that in 75% of incidents, critical evidence was present in logs but wasn&rsquo;t accessible or operationalized, allowing attackers to exploit the gaps. Organizations need to evolve their SOCs to ingest and correlate telemetry across their entire IT landscape, including IAM, cloud assets, OT/IoT, and AI workloads. Unit 42 recommends a single-pane-of-glass strategy powered by an AI-driven SOC platform like Cortex XSIAM to combat these threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via Cloud Misconfiguration:</strong> The attacker gains initial access through a misconfigured cloud service access key.</li>
<li><strong>Cloud Console Manipulation:</strong> The attacker manipulates the cloud console to hide their tracks from endpoint detection.</li>
<li><strong>Pivot to Cloud-Hosted Server:</strong> From the cloud console, the attacker pivots to a cloud-hosted server to begin discovery.</li>
<li><strong>Credential Theft (Covert C2):</strong> The attacker utilizes DNS tunneling to a cloud storage location for C2 communication and steals credentials to use legitimate applications.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally using the stolen credentials, triggering impossible travel alerts across SaaS apps.</li>
<li><strong>Rogue Asset Introduction:</strong> The attacker introduces a rogue device into the network, bypassing traditional endpoint security measures.</li>
<li><strong>Persistence:</strong> The attacker maintains persistence through the rogue device, using it for covert movement and access.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data, taking advantage of the gaps in security visibility.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations are increasingly vulnerable to rapid data exfiltration due to the expanded attack surface and reliance on endpoint-centric security. The inability to correlate telemetry across diverse IT zones allows attackers to operate undetected, leading to significant data breaches, financial losses, and reputational damage. Unit 42&rsquo;s research shows that attackers are moving 4x faster to exfiltration, exacerbating the impact of successful intrusions. The attacks target cloud environments, identity systems, and networks, creating a complex threat landscape for security teams to navigate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ingest and correlate telemetry from all IT zones (IAM, cloud, OT/IoT, AI workloads) into a single repository, as described in the overview, to eliminate data silos and gain holistic visibility.</li>
<li>Implement User and Entity Behavior Analytics (UEBA) as mentioned in the overview, to detect anomalous behavior indicative of compromised credentials by using a centralized workbench.</li>
<li>Deploy Cortex XSIAM, as discussed in the overview, to leverage AI-driven alert stitching, ML-based incident scoring, and UEBA for automated detection, investigation, and response.</li>
<li>Implement continuous network monitoring and external attack surface management to detect and manage rogue assets, as highlighted in the attack chain.</li>
<li>Evaluate your current visibility through a formal assessment as recommended in the conclusion, to identify gaps in security coverage.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud-security</category><category>iam</category><category>incident-response</category><category>threat-detection</category></item><item><title>Hickory DNS Recursor Cache Poisoning via Sibling Zone Delegation</title><link>https://feed.craftedsignal.io/briefs/2024-11-hickory-dns-poisoning/</link><pubDate>Thu, 30 Apr 2026 18:10:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-hickory-dns-poisoning/</guid><description>The experimental `hickory-recursor` crate in Hickory DNS is vulnerable to cross-zone cache poisoning due to storing DNS records keyed by record name/type instead of query, enabling an attacker to redirect queries for a victim zone to an attacker-controlled nameserver.</description><content:encoded><![CDATA[<p>The Hickory DNS project&rsquo;s experimental <code>hickory-recursor</code> crate, now integrated into <code>hickory-resolver</code> under the <code>recursor</code> feature, contains a vulnerability in its DNS record cache (<code>DnsLru</code>). The cache stores records based on the record&rsquo;s name and type, rather than the originating query. This design flaw allows for cross-zone cache poisoning because the <code>cache_response()</code> function chains <code>ANSWER</code>, <code>AUTHORITY</code>, and <code>ADDITIONAL</code> sections into a single record iterator during insertion. The bailiwick filter uses the zone context of the NS pool that serviced the lookup, leading to improper validation of records from sibling zones. This issue affects all published versions of the experimental <code>hickory-recursor</code> crate prior to its integration into <code>hickory-resolver</code> 0.26.0. Users of the <code>hickory-dns</code> binary configured with the <code>recursor</code> feature are affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers the domain <code>attacker.poc.</code> and sets up a malicious nameserver.</li>
<li>Hickory DNS server queries the nameserver for <code>attacker.poc.</code> to build its NS pool.</li>
<li>The attacker&rsquo;s nameserver responds with an <code>AUTHORITY</code> section that includes a malicious record delegating a sibling zone, such as <code>victim.poc.</code>, to <code>ns.evil.poc.</code>.</li>
<li>The Hickory DNS server&rsquo;s bailiwick check incorrectly validates the malicious <code>victim.poc. NS ns.evil.poc.</code> record because <code>victim.poc.</code> is a subdomain of the parent zone <code>poc.</code>.</li>
<li>The malicious NS record for <code>victim.poc.</code> is stored in the cache, keyed by <code>(victim.poc., NS)</code>.</li>
<li>A client queries the Hickory DNS server for a name within the <code>victim.poc.</code> zone.</li>
<li>Hickory DNS server builds its NS pool for <code>victim.poc.</code> using the poisoned cache entry, directing queries to <code>ns.evil.poc.</code>.</li>
<li>The attacker&rsquo;s nameserver now receives queries intended for the legitimate <code>victim.poc.</code> nameserver, allowing the attacker to intercept and manipulate DNS resolution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to redirect DNS queries for a target domain to an attacker-controlled nameserver. This can lead to various malicious activities, including phishing attacks, man-in-the-middle attacks, and the distribution of malware. The vulnerability affects any system using Hickory DNS with the <code>recursor</code> feature enabled, potentially impacting a wide range of users relying on the resolver for DNS resolution. If the targeted domain is critical for service delivery (e.g., email, web), the impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>hickory-resolver</code> version 0.26.0 or later with the <code>recursor</code> feature enabled to address the vulnerability as described in the advisory (<a href="https://github.com/advisories/GHSA-83hf-93m4-rgwq">https://github.com/advisories/GHSA-83hf-93m4-rgwq</a>).</li>
<li>If upgrading is not immediately feasible, disable the <code>recursor</code> feature in <code>hickory-dns</code> to prevent exploitation.</li>
<li>Implement monitoring for unexpected NS record changes, focusing on <code>AUTHORITY</code> sections of DNS responses, using a custom rule based on your environment and typical DNS configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dns</category><category>cache-poisoning</category><category>zone-delegation</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item></channel></rss>