Cyber Threat Brief — March 8 2026
Cyber Threat Brief — March 8 2026
Generated: 2026-03-08 05:00 PT
Threats Covered: 3
Sources: GitHub PoC/exploit monitoring, X/Twitter threat intelligence, CISA KEV, Web search
1. Grafana SQL Expressions RCE via DuckDB (CVE-2024-9264)
Summary
Grafana’s experimental SQL Expressions feature contains a critical injection flaw — any authenticated user with Viewer-or-above permissions can POST raw DuckDB SQL to /api/ds/query, read local files with read_blob(), or chain in DuckDB’s community shellfs extension for full shell execution. Vulhub published a production-quality exploit environment today with copy-paste HTTP payloads, moving this from “interesting advisory” to “here’s the request body.” If you run Grafana 11.0–11.2.1 with DuckDB on the system PATH, treat this as actively weaponized.
What’s New (Last 24 Hours)
Vulhub published a fully functional Docker environment for CVE-2024-9264 (March 8 2026) with complete HTTP request bodies demonstrating: (1) local file read via read_blob('/etc/passwd'), and (2) a one-shot RCE chain that installs the DuckDB shellfs community extension and executes arbitrary shell commands via read_csv() pipe syntax — all in a single multi-query request to the SQL Expressions API endpoint.
Actionable Intel
| Artifact | Type | ATT&CK Technique | Data Source | How to Use |
|---|---|---|---|---|
POST /api/ds/query?ds_type=__expr__&expression=true&requestId=Q100 | TTP | T1190 | Web server / reverse proxy logs | Hunt for POSTs to /api/ds/query with ds_type=__expr__ and expression=true, especially from Viewer-level accounts or unexpected source IPs |
"type":"sql" with "datasource":{"type":"__expr__"} in request body | TTP | T1190 | Grafana app logs / HTTP body inspection (WAF) | Flag SQL Expression queries using the __expr__ datasource with type=sql — this is the injection surface |
read_blob('/etc/passwd') in SQL expression body | TTP | T1005 | WAF body inspection / Grafana logs | Alert on DuckDB file-read primitives in SQL Expressions request bodies; any path argument is suspicious |
INSTALL shellfs FROM community in SQL expression body | TTP | T1059 | WAF body inspection / Grafana logs | Detect DuckDB extension install attempts in SQL Expressions; no legitimate user workflow requires installing extensions via the API |
LOAD shellfs in SQL expression body | TTP | T1059 | WAF body inspection / Grafana logs | Detect DuckDB extension load commands; correlate with prior INSTALL commands in same session |
read_csv('id > /tmp/rce_out 2>&1 |', header=false) | TTP | T1059 | WAF body inspection / EDR process telemetry | Detect pipe-syntax commands in DuckDB read_csv calls — this is the shellfs RCE trigger |
/tmp/rce_out | IOC | T1005 | Linux file telemetry (auditd / EDR) | Watch for creation or read of /tmp/rce_out by the Grafana process user shortly after /api/ds/query requests |
Potential Detection Coverage Based on MITRE ATT&CK Technique
| Source | Detections | Coverage |
|---|---|---|
| Splunk | Adobe ColdFusion Unauthenticated Arbitrary File Read | Covers the T1190 web-exploit pattern of unauthenticated file read via crafted HTTP requests to web application endpoints — directly analogous to Grafana’s read_blob() primitive; adapt the URL/parameter fields for /api/ds/query |
| Elastic | Binary Executed from Shared Memory Directory | Covers post-exploitation process execution from temp/shared directories on Linux (T1059) — relevant when shellfs chain writes and executes from /tmp/rce_out |
| Sigma | Potential Local File Read Vulnerability In JVM Based Application | Covers T1190 web-app file read exploitation patterns in application logs; logic applies to any app-layer local file read including Grafana’s DuckDB read_blob() abuse |
Sources
- Add Grafana CVE-2024-9264 SQL Expressions RCE environment (Vulhub) — Published 2026-03-08
- Vulhub CVE-2024-9264 README — Published 2026-03-08
- Grafana Security Advisory CVE-2024-9264 — Published 2024-10-17 (original vendor disclosure)
2. Mythic C2 Portal Exposed (167.99.208.145:7443)
Summary
RedPacketSecurity published a Shodan-derived IOC report on March 7 documenting a live, publicly accessible Mythic C2 management portal at 167.99.208.145:7443 (DigitalOcean, Amsterdam). The report includes a stable UI asset path, JA3S and JARM TLS fingerprints, and server metadata — all usable for hunting or blocking. This is infrastructure exposure intel, not a campaign report, but any internal host communicating with this IP/port/fingerprint combination should be treated as a high-priority indicator of Mythic agent activity.
What’s New (Last 24 Hours)
RedPacketSecurity published a Shodan snapshot (March 7 2026) of an internet-exposed Mythic C2 portal, providing: the hosting IP/port, Mythic UI favicon asset path (/new/favicon.ico), nginx/1.25.5 server header, JA3S (574866101f64002c6421cc329e4d5458), JARM (1dd40d40d00040d00042d43d000000831b6af40378e2dd35eeac4e9311926e), and TLS certificate issuer Mythic valid through 2027.
Actionable Intel
| Artifact | Type | ATT&CK Technique | Data Source | How to Use |
|---|---|---|---|---|
167.99.208.145 | IOC | T1071.001 | Firewall / NetFlow / proxy logs | Block or alert on outbound connections to this IP; pivot to other internal hosts with any egress to it within the same time window |
167.99.208.145:7443 | IOC | T1071.001 | Firewall / NetFlow / proxy logs | Specifically hunt outbound HTTPS to TCP/7443 toward this IP; correlate with SNI absence (IP-direct TLS) |
/new/favicon.ico | IOC | T1071.001 | Proxy logs / HTTP access logs | Alert on HTTP(S) requests to path /new/favicon.ico on any external host — characteristic Mythic UI asset; operator portal fingerprinting or agent check-in |
JA3S 574866101f64002c6421cc329e4d5458 | IOC | T1071.001 | TLS fingerprint telemetry (Zeek / Suricata / network sensor) | Match server-side JA3S on outbound TLS sessions; cluster infrastructure with matching fingerprints for broader Mythic infrastructure discovery |
JARM 1dd40d40d00040d00042d43d000000831b6af40378e2dd35eeac4e9311926e | IOC | T1071.001 | TLS fingerprint telemetry | Hunt for JARM matches to identify additional similarly-configured Mythic portals; prioritize for block/investigation |
Potential Detection Coverage Based on MITRE ATT&CK Technique
| Source | Detections | Coverage |
|---|---|---|
| Splunk | HTTP C2 Framework User Agent | Covers T1071.001 C2 communication over HTTP by detecting known C2 framework user-agent strings; complement with the Mythic-specific IP/JARM indicators for non-UA-based detection |
| Elastic | SUNBURST Command and Control Activity | Pattern-matches C2 network activity (T1071.001) using domain/IP indicators; logic is directly applicable to Mythic IOC enrichment — substitute Mythic IP/port/path for SUNBURST indicators |
| Sigma | HackTool - CobaltStrike Malleable Profile Patterns - Proxy | Covers T1071.001 malleable C2 HTTP pattern matching via proxy logs; the /new/favicon.ico Mythic path can be added as an additional URI pattern indicator in this rule’s logic |
Sources
- Mythic C2 Detected - 167.99.208.145:7443 (RedPacketSecurity) — Published 2026-03-07
3. New KQL Detections: Scheduled Task AppData Persistence, Defender AV Exclusion, and Rare LNK Drops
Summary
BertJanCyber pushed three new Microsoft Defender XDR / Sentinel KQL detection queries on March 7 covering three common attacker behaviors: persistence via scheduled tasks pointed at AppData directories (no admin required), defense evasion via Add-MpPreference/Set-MpPreference Defender exclusion commands, and rare .lnk shortcut drops on the desktop (T1027.012 LNK Icon Smuggling). These are ready-to-deploy queries with tuning built in — useful for any team running Defender for Endpoint or Microsoft Sentinel.
What’s New (Last 24 Hours)
Three KQL queries committed to the Bert-JanP/Hunting-Queries-Detection-Rules repo on March 7 2026:
- Scheduled Tasks from AppData Created or Updated (T1053.005): Detects
ScheduledTaskCreated/ScheduledTaskUpdatedevents where task content references AppData paths; excludes known OneDrive FPs. - Defender AV Exclusion Events (T1562.001): Catches
Add-MpPreference/Set-MpPreferencewith exclusion parameters via bothDeviceProcessEventsandDeviceEventsPowerShell command telemetry. - Rare .lnk File Created on Desktop (T1027.012): Uses
ShellLinkCreateFileEvent+FileProfileto surface only low-prevalence shortcut drops on user desktops.
Actionable Intel
| Artifact | Type | ATT&CK Technique | Data Source | How to Use |
|---|---|---|---|---|
ScheduledTaskCreated or ScheduledTaskUpdated with AppData or %localappdata% or %appdata% in task content | TTP | T1053.005 | EDR process telemetry (Defender for Endpoint DeviceEvents) | Deploy KQL: filter DeviceEvents for ActionType in ('ScheduledTaskCreated','ScheduledTaskUpdated') where AdditionalFields has_any AppData path patterns; exclude OneDrive baseline entries |
Add-MpPreference or Set-MpPreference with ExclusionPath, ExclusionExtension, ExclusionProcess, or ExclusionIpAddress | TTP | T1562.001 | EDR process telemetry (DeviceProcessEvents) and PowerShell telemetry (DeviceEvents with ActionType == 'PowerShellCommand') | Union both telemetry sources to catch inline CLI usage and obfuscated script-block executions of Defender exclusion commands |
ShellLinkCreateFileEvent with FolderPath has 'Desktop' and GlobalPrevalence <= 1000 | TTP | T1027.012 | EDR file telemetry (Defender for Endpoint DeviceEvents) | Alert on rare .lnk files created on user desktops; use FileProfile enrichment to suppress high-prevalence known-good shortcuts |
Potential Detection Coverage Based on MITRE ATT&CK Technique
| Source | Detections | Coverage |
|---|---|---|
| Splunk | Powershell Windows Defender Exclusion Commands / Add or Set Windows Defender Exclusion | Direct T1562.001 coverage for Add-MpPreference/Set-MpPreference Defender exclusion commands via Sysmon/endpoint telemetry — same technique the new KQL query addresses, useful for Splunk-based environments |
| Elastic | Windows Defender Exclusions Added via PowerShell / Disabling Windows Defender Security Settings via PowerShell | T1562.001 coverage matching the same PowerShell Defender exclusion pattern; Elastic rules fire on Add-MpPreference process events with exclusion arguments |
| Sigma | Suspicious Scheduled Task Creation / Scheduled Task Executed From A Suspicious Location / Powershell Defender Exclusion | Multi-technique coverage: T1053.005 scheduled task creation and suspicious execution locations; T1562.001 PowerShell Defender exclusion; T1027.012 lacks direct Sigma coverage but the AppData scheduled task rule complements the new KQL query |
Sources
- Scheduled Task AppData (commit) — Published 2026-03-07
- Defender AV Exclusion Events (commit) — Published 2026-03-07
- Rare .lnk File Created on Desktop (commit) — Published 2026-03-07
- @BertJanCyber on X — Published 2026-03-07