<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VMware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/vmware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 08:31:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/vmware/feed.xml" rel="self" type="application/rss+xml"/><item><title>VMware Tanzu Spring Boot Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-tanzu-spring-boot-vulns/</link><pubDate>Tue, 28 Apr 2026 08:31:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tanzu-spring-boot-vulns/</guid><description>Multiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist in VMware Tanzu Spring Boot that could be exploited by malicious actors. While the specific CVEs and technical details of these vulnerabilities are not disclosed, the potential impact is significant. An attacker could leverage these vulnerabilities to achieve arbitrary code execution, circumvent security controls, manipulate or disclose confidential data, and even hijack authenticated user sessions. Given the widespread use of Spring Boot in enterprise applications, these vulnerabilities pose a substantial risk to organizations utilizing this framework. Defenders should prioritize identifying and mitigating these vulnerabilities to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable endpoint in a Tanzu Spring Boot application.</li>
<li>The attacker crafts a malicious request designed to exploit a vulnerability, such as a deserialization flaw or an SQL injection point.</li>
<li>The malicious request bypasses input validation or authentication mechanisms due to the vulnerability.</li>
<li>The exploited vulnerability allows the attacker to execute arbitrary code within the context of the Spring Boot application.</li>
<li>The attacker leverages the code execution to gain access to sensitive data, such as database credentials or API keys.</li>
<li>The attacker uses the compromised credentials to access other systems or resources within the network.</li>
<li>The attacker escalates privileges within the Spring Boot application or the underlying operating system.</li>
<li>The attacker establishes persistence and maintains long-term access to the compromised system, potentially leading to data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to a wide range of damaging outcomes. Attackers could gain unauthorized access to sensitive data, disrupt critical business processes, or deploy ransomware. The lack of specific details regarding the number of victims and targeted sectors makes it difficult to quantify the precise impact, but the potential for widespread disruption is considerable, especially given the prevalence of Spring Boot applications. The ability to execute arbitrary code provides attackers with significant control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Tanzu Spring Boot applications for unusual process execution using the rule &ldquo;Detect Suspicious Spring Boot Process Execution&rdquo;.</li>
<li>Monitor web server logs for suspicious requests that could be indicative of vulnerability exploitation with the rule &ldquo;Detect Malicious Request to Spring Boot Application&rdquo;.</li>
<li>Implement strict input validation and output encoding measures in Tanzu Spring Boot applications to prevent common web application vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vmware</category><category>spring-boot</category><category>vulnerability</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Unusual Process Loading Mozilla NSS/Mozglue Module</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-unusual-mozglue-load/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-unusual-mozglue-load/</guid><description>Detection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.</description><content:encoded><![CDATA[<p>This brief focuses on detecting anomalous loading of Mozilla NSS (Network Security Services) and Mozglue libraries (specifically <code>mozglue.dll</code> and <code>nss3.dll</code>) by processes other than known Mozilla applications like Firefox and Thunderbird. The technique leverages Windows Sysmon Event ID 7 (ImageLoaded) to identify such instances. This activity is flagged as suspicious because legitimate software rarely loads these libraries outside of the intended Mozilla ecosystem. Attackers may attempt to load these libraries into other processes to perform malicious actions such as code injection, data exfiltration, or credential theft, while masquerading as legitimate software. This detection is crucial for identifying potentially compromised systems and preventing further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system, possibly through phishing, exploiting a vulnerability, or using stolen credentials.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence on the system, ensuring continued access even after a reboot. This may involve creating scheduled tasks or modifying registry keys.</li>
<li><strong>Privilege Escalation:</strong> The attacker elevates privileges to gain higher-level access to the system. This can be achieved through exploiting kernel vulnerabilities or misconfigured services.</li>
<li><strong>Malware Installation:</strong> The attacker deploys malware or malicious tools onto the compromised system. This may involve downloading executables or scripts from a remote server.</li>
<li><strong>Code Injection:</strong> The attacker injects malicious code into a legitimate process. This is often done to evade detection and execute malicious commands in a trusted context. In this scenario, the injected code might leverage Mozilla NSS/Mozglue libraries.</li>
<li><strong>Credential Theft:</strong> The injected code attempts to steal credentials stored on the system. This may involve accessing LSASS memory or extracting credentials from web browsers.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from the compromised system. This may involve compressing data and transferring it to a remote server using protocols like HTTP or FTP.</li>
<li><strong>Lateral Movement/Impact:</strong> Using stolen credentials or the compromised system as a pivot, the attacker moves laterally within the network to compromise additional systems, or achieves their ultimate objective, such as ransomware deployment or intellectual property theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and anomalous loading of Mozilla libraries can lead to significant damage, including data breaches, financial loss, and reputational damage. Stolen credentials can be used to access sensitive systems and data, while injected code can disrupt critical business processes. The scope can range from individual workstations to entire networks, depending on the attacker&rsquo;s objectives and level of access. The detection helps prevent credential theft, data exfiltration, and lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 7 (ImageLoaded) logging on all Windows endpoints to ensure visibility into loaded modules (reference: <code>data_source</code>).</li>
<li>Deploy the Sigma rule <code>Unusual Mozilla NSS/Mozglue Module Load by Non-Mozilla Process</code> to your SIEM and tune the process exceptions for your environment (reference: <code>rules</code>).</li>
<li>Investigate any instances where Mozilla NSS/Mozglue libraries are loaded by processes not explicitly allowed in the exception list to determine if malicious activity is occurring (reference: <code>search</code>).</li>
<li>Correlate detections of unusual Mozilla library loading with other suspicious activity, such as network connections to known malicious domains or the execution of unusual processes, to identify potential compromises (reference: <code>tags</code>).</li>
<li>Review and update the list of legitimate applications that may load Mozilla NSS/Mozglue libraries in your environment to reduce false positives (reference: <code>known_false_positives</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>anomaly</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Potential Persistence via Time Provider Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-provider-modification/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-provider-modification/</guid><description>Adversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.</description><content:encoded><![CDATA[<p>The Windows Time service (W32Time) synchronizes the system clock with other devices on the network, using time providers implemented as DLL files located in the System32 folder. This architecture can be abused by adversaries to establish persistence by registering and enabling a malicious DLL as a time provider. The W32Time service starts during Windows startup and loads w32time.dll. This technique involves modifying specific registry keys associated with the Time Providers, enabling a malicious DLL to be loaded and executed every time the service starts. This can allow an attacker to maintain persistent access to the system, even after a reboot. The Elastic Security team has identified this persistence method and provided a detection rule to identify such modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit, phishing, or other means.</li>
<li>The attacker obtains administrator privileges on the target system.</li>
<li>The attacker crafts or deploys a malicious DLL to be used as a time provider.</li>
<li>The attacker modifies the registry to register the malicious DLL as a valid time provider. The registry keys under <code>HKLM\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\</code> are targeted.</li>
<li>The attacker enables the newly registered time provider.</li>
<li>The W32Time service is restarted, or the system is rebooted.</li>
<li>The W32Time service loads the malicious DLL, executing the attacker&rsquo;s code.</li>
<li>The attacker maintains persistent access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to achieve persistence on the compromised system. The attacker can execute arbitrary code every time the W32Time service starts. This may lead to further malicious activities, such as data theft, lateral movement, or the installation of additional malware. The impact is significant, as the attacker can maintain long-term control over the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Time Provider DLL Registration</code> to detect the registration of new DLL files as Time Providers in the registry.</li>
<li>Enable Sysmon registry event logging to capture registry modifications, as this is a requirement for the provided Sigma rules.</li>
<li>Investigate any registry changes to the <code>HKLM\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\</code> path, especially those adding new DLLs, using the provided Sigma rule.</li>
<li>Monitor process execution for <code>msiexec.exe</code> installing DLLs in the <code>Program Files\VMware\VMware Tools</code> directory, which could indicate legitimate activity, but should still be validated.</li>
<li>Regularly audit and validate the list of registered Time Providers on critical systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>time-provider</category></item><item><title>LSASS Loading Suspicious DLL</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</guid><description>Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component that manages security policies and user authentication. Attackers often target LSASS to dump credentials, using techniques like injecting malicious DLLs. This detection focuses on identifying instances where LSASS loads a DLL that is either unsigned or not signed by a trusted vendor. The rule excludes known legitimate signatures and file hashes to reduce false positives. This activity is a strong indicator of credential access attempts, potentially leading to further compromise of the system and network. The signatures identified in the rule contain well-known software vendors like Microsoft, McAfee and Citrix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker elevates privileges to gain sufficient access to interact with the LSASS process.</li>
<li>The attacker drops a malicious DLL onto the system, often disguised as a legitimate file.</li>
<li>The attacker injects the malicious DLL into the LSASS process using techniques like Reflective DLL Injection.</li>
<li>LSASS loads the injected DLL, granting the attacker access to sensitive credentials stored in memory.</li>
<li>The malicious DLL dumps credentials, such as plaintext passwords or NTLM hashes.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise, allowing attackers to move laterally within the network, access sensitive data, and potentially achieve complete domain dominance. This can result in data breaches, financial losses, and reputational damage. The impact depends on the level of access associated with the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>LSASS Loading Untrusted DLL</code> Sigma rule to your SIEM to detect suspicious DLLs loaded by LSASS.</li>
<li>Investigate any alerts generated by the Sigma rule and review the loaded DLL&rsquo;s code signature and hash.</li>
<li>Block the identified SHA256 hashes listed in the IOC table to prevent the execution of known malicious DLLs.</li>
<li>Implement application whitelisting to restrict which DLLs can be loaded into LSASS.</li>
<li>Enable Sysmon process creation and image load logging to provide the necessary data for detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>dll-injection</category><category>windows</category></item></channel></rss>