Cyber Threat Brief — March 2, 2026

⚠️ This report is AI-generated. Always validate findings.

Cyber Threat Brief — March 2, 2026

Two actionable drops within the last 24 hours:

  • A Metasploit module PR that highlights concrete Grav CMS admin/plugin-install request artifacts defenders can pivot on.
  • A ThreatFox IOC batch with new ClearFake payload-delivery domains that are immediately usable for blocking + retro hunts.

(24-hour rule: all sources below were published 2026-03-01 or 2026-03-02 at their original feed/source.)


1. Grav CMS Admin Direct Install Plugin Upload RCE

What’s New (Last 24 Hours)

A Metasploit PR added an exploit module for Grav CMS admin ‘Direct Install’ plugin upload RCE, exposing concrete HTTP parameter and path indicators defenders can use for telemetry pivots.

Actionable Intel (Mapped to MITRE ATT&CK)

ArtifactTypeATT&CK TechniqueHow to Use
/adminTTPT1190Hunt for external HTTP requests to Grav admin endpoints, especially those followed by plugin upload/install actions or abnormal response sizes.
task=directInstallTTPT1190Look for multipart/form-data POSTs where parameters include task=directInstall; correlate with new file writes on the web root and subsequent process execution.
admin-nonceTTPT1190Identify requests carrying an admin-nonce value during plugin installation flows; pivot to source IP/user-agent and any follow-on admin actions.
user/plugins/TTPT1505.003On Grav hosts, monitor for new/modified directories under user/plugins/ and unexpected executable content dropped during plugin installs.

Hunt Queries (Pseudo)

Telemetry scope: last 24h across endpoint + network + DNS + web logs.
- Search file/URL/path artifacts: /admin, user/plugins/
- Correlate with parent/child process context and any follow-on outbound connections.

Detect Queries (Pseudo)

Create a detection that alerts when one or more of the observables below appear in relevant telemetry:
- Observables: /admin, task=directInstall, admin-nonce, user/plugins/
- Required context: host, user, process lineage, network destination, and touched files/URLs.
- Trigger logic: suspicious observable match + suspicious behavior (execution, persistence, or outbound comms).
- Reduce noise by excluding known admin tooling and approved maintenance activity.
- Escalate when matches are followed by credential access, defense evasion, or remote command execution.

Detection Coverage (Existing Rules)

SourceExisting Detections
SplunkNone found
ElasticNone found
SigmaNone found

Sources


2. ClearFake Payload-Delivery Domains (ThreatFox IOC Batch)

What’s New (Last 24 Hours)

ThreatFox published a fresh batch of ClearFake-associated payload-delivery domains that can be immediately operationalized for DNS/proxy blocking and retrospective hunting.

Actionable Intel (Mapped to MITRE ATT&CK)

ArtifactTypeATT&CK TechniqueHow to Use
kdpofutk.safaricola.digitalIOCT1189Block at DNS/proxy. Hunt for DNS resolution, HTTP Host/SNI matches, and browser-process network connections to this domain; correlate with paste-and-run or follow-on script execution.
xmes67am.safaricola.digitalIOCT1189Alert on outbound web traffic to this domain; pivot to referrer URLs, downloaded scripts, and any subsequent PowerShell/cmd execution on the same endpoint.
vr3d0r4f.bravepepsi.digitalIOCT1189Add to web filtering. Hunt for user browsing followed by suspicious child processes from the browser (PowerShell, cmd, mshta, rundll32) within minutes.
1lf2pz2k.bravepepsi.digitalIOCT1189Hunt in DNS/proxy logs; correlate with downloaded JavaScript and any creation/execution of script files in user temp directories.

Hunt Queries (Pseudo)

Telemetry scope: last 24h across endpoint + network + DNS + web logs.
- Pivot on destination domain(s): kdpofutk.safaricola.digital, xmes67am.safaricola.digital, vr3d0r4f.bravepepsi.digital, 1lf2pz2k.bravepepsi.digital
- Correlate with parent/child process context and any follow-on outbound connections.

Detect Queries (Pseudo)

Create a detection that alerts when one or more of the observables below appear in relevant telemetry:
- Observables: kdpofutk.safaricola.digital, xmes67am.safaricola.digital, vr3d0r4f.bravepepsi.digital, 1lf2pz2k.bravepepsi.digital
- Required context: host, user, process lineage, network destination, and touched files/URLs.
- Trigger logic: suspicious observable match + suspicious behavior (execution, persistence, or outbound comms).
- Reduce noise by excluding known admin tooling and approved maintenance activity.
- Escalate when matches are followed by credential access, defense evasion, or remote command execution.

Detection Coverage (Existing Rules)

SourceExisting Detections
SplunkNone found
ElasticNone found
SigmaNone found

Sources