΢Èí¾¯Ê¾£ºÀûÓùûÈ»ASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁÅ°
Ðû²¼Ê±¼ä 2025-02-071. ΢Èí¾¯Ê¾£ºÀûÓùûÈ»ASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁÅ°
2ÔÂ6ÈÕ£¬Î¢Èí·¢³ö¾¯¸æ£¬Ö¸³ö¹¥»÷ÕßÕýÔÚÀûÓÃÔÚÏßÕÒµ½µÄ¾²Ì¬ ASP.NET »úÆ÷ÃÜÔ¿£¬ÔÚ ViewState ´úÂë×¢Èë¹¥»÷Öв¿Êð¶ñÒâÈí¼þ¡£Ò»Ð©¿ª·¢ÈËÔ±²»É÷ÔÚÈí¼þÖÐʹÓÃÁË´Ó´úÂëÎĵµºÍ´æ´¢¿âƽ̨ÉÏÕÒµ½µÄ ASP.NET ÃÜÔ¿£¬ÕâЩÃÜÔ¿±¾Ó¦ÓÃÓÚ±£»¤ ViewState ÃâÔâ¸Ä¶¯ºÍÐÅϢй¶¡£È»¶ø£¬¹¥»÷ÕßÈ´ÀûÓÃÕâЩ¹ûÈ»À´Ô´µÄÃÜÔ¿£¬Í¨¹ý¸½¼Ó¾«ÐÄÉè¼ÆµÄÏûÏ¢ÈÏÖ¤´úÂë (MAC) ´´½¨¶ñÒâ ViewState£¬²¢ÔÚÄ¿±ê·þÎñÆ÷ÉÏÖ´ÐУ¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐкͶñÒ⸺Ôز¿Êð¡£Î¢ÈíÒÑ·¢ÏÖÁè¼Ý 3,000 ¸ö¹ûÈ»Åû¶µÄÃÜÔ¿¿ÉÓÃÓÚ´ËÀ๥»÷£¬ÕâЩÃÜÔ¿´æÔÚÓÚ¶à¸ö´úÂë´æ´¢¿âÖУ¬´øÀ´¸ß·çÏÕ¡£ÎªÓ¦¶Ô´ËÍþв£¬Î¢Èí½¨Ò鿪·¢ÈËÔ±Äþ¾²Éú³É»úÆ÷ÃÜÔ¿£¬ÖÆֹʹÓÃĬÈÏ»òÔÚÏßÕÒµ½µÄÃÜÔ¿£¬²¢Éý¼¶Ó¦Ó÷¨Ê½ÒÔÆôÓ÷´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) ¹¦Ð§¡£Í¬Ê±£¬Î¢Èí·ÖÏíÁËɾ³ý»òÌæ»» ASP.NET ¼üµÄÏêϸ²½Ö裬²¢´Ó¹«¹²ÎĵµÖÐɾ³ýÁËÃÜԿʾÀý¡£Î¢Èí¾¯¸æ³Æ£¬Èç¹û¹ûÈ»ÃÜÔ¿±»ÀûÓã¬ÂÖ»»ÃÜÔ¿¿ÉÄܲ»×ãÒÔ½â¾öÎÊÌ⣬½¨Òé¶ÔÍøÂç·þÎñÆ÷½øÐÐÈ«ÃæÊӲ죬²¢ÔÚʶ±ð³ö¹ûÈ»ÃÜÔ¿µÄÇé¿öÏ¿¼ÂÇÖØиñʽ»¯²¢ÀëÏßÖØа²×°¡£
https://www.bleepingcomputer.com/news/security/microsoft-says-attackers-use-exposed-aspnet-keys-to-deploy-malware/
2. KimsukyºÚ¿Í×éÖ¯½ÓÄɶ¨ÖÆRDP WrapperºÍÊðÀí¹¤¾ßʵʩÒþÃع¥»÷
2ÔÂ6ÈÕ£¬³¯ÏʺڿÍ×éÖ¯Kimsuky½üÆÚÔÚ¹¥»÷ÖнÓÄÉÁ˶¨ÖƵÄRDP WrapperºÍÊðÀí¹¤¾ß£¬Ö±½Ó·ÃÎÊÊÜѬȾ»úÆ÷£¬Õâ±êÖ¾×ÅÆä¼ÆıµÄת±ä¡£¾ÝAhnLabÄþ¾²Ç鱨ÖÐÐÄ(ASEC)ÊӲ죬Kimsuky²»ÔÙ½öÒÀÀµÈçPebbleDashµÈºóÃŹ¤¾ß£¬¶øÊÇʹÓÃÁ˶àÖÖ¶¨ÖƵÄÔ¶³Ì·ÃÎÊÊֶΡ£×îÐµĹ¥»÷Á´Ê¼ÓÚÒ»·â°üÂÞ¶ñÒâ¿ì½Ý·½Ê½(.LNK)Îļþ¸½¼þµÄÓã²æʽÍøÂçµöÓãµç×ÓÓʼþ£¬¸ÃÓʼþÕë¶ÔÌض¨Ä¿±ê½øÐÐÁËÕì²ì¡£´ò¿ª.LNKÎļþ»á´¥·¢PowerShell»òMshta´ÓÍⲿ·þÎñÆ÷ÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬°üÂÞPebbleDashºóÃÅ¡¢Ð޸ĺóµÄRDP Wrapper¹¤¾ßºÍÊðÀí¹¤¾ß¡£Kimsuky¶¨ÖƵÄRDP Wrapper¸Ä±äÁ˵¼³ö¹¦Ð§ÒÔÈƹý·À²¡¶¾¼ì²â£¬Ìṩ³Ö¾ÃµÄRDP·ÃÎÊ£¬²¢ÔÊÐí»ùÓÚGUIµÄÔ¶³Ì¿ØÖÆ£¬Í¬Ê±ÄÜÈƹý·À»ðǽ»òNATÏÞÖÆ¡£Ò»µ©ÔÚÍøÂçÖÐÕ¾ÎȽŸú£¬Kimsuky»¹»áͶ·Å´ÎÒªÓÐЧ¸ºÔØ£¬Èç¼üÅ̼ǼÆ÷¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½(forceCopy)ºÍ»ùÓÚPowerShellµÄReflectiveLoader¡£ASECÖ¸³ö£¬KimsukyÊÇÒ»¸öÁ¬Ðø²»Í£ÇÒ²»Í£ÑݱäµÄÍþв£¬½ÓÄɸüÒþÃصÄÔ¶³Ì·ÃÎÊÒªÁìÒÔÑÓ³¤ÔÚÊÜѬȾÍøÂçÖеÄÍ£Áôʱ¼ä¡£
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/
3. ºÚ¿ÍÀûÓÃSimpleHelp RMM©¶´´´½¨¹ÜÀíÔ±ÕÊ»§²¢ÒÉËÆΪÀÕË÷Èí¼þ¹¥»÷ÆÌ·
2ÔÂ6ÈÕ£¬ºÚ¿Í½üÆÚÃé×¼ÁË´æÔÚ©¶´µÄSimpleHelp RMM¿Í»§¶Ë£¬ÀûÓñàºÅΪCVE-2024-57726¡¢CVE-2024-57727ºÍCVE-2024-57728µÄ©¶´À´´´½¨¹ÜÀíÔ±ÕÊ»§¡¢Ö²ÈëºóÃÅ£¬²¢¿ÉÄÜΪºóÐøµÄÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¾ÝÍøÂçÄþ¾²¹«Ë¾Field Effect֤ʵ£¬ÕâЩ©¶´ÒÑÔÚ×î½üµÄ¹¥»÷Öб»ÀûÓ᣹¥»÷ÕßÊ×ÏÈÓëÄ¿±ê¶Ëµã½¨Á¢Î´¾ÊÚȨµÄÁ¬½Ó£¬È»ºóÖ´ÐÐһϵÁз¢ÏÖÃüÁîÒÔÊÕ¼¯Ä¿±ê»·¾³µÄÐÅÏ¢¡£½Ó×Å£¬¹¥»÷Õß´´½¨Ð¹ÜÀíÔ±ÕÊ»§£¬°²×°SliverºóÀûÓÿò¼Ü£¬²¢ÅäÖÃΪÁ¬½Óµ½ºÉÀ¼µÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷¡£´ËÍ⣬¹¥»÷Õß»¹Í¨¹ýSimpleHelp RMM¿Í»§¶ËÆÆ»µÓò¿ØÖÆÆ÷£¬²¢´´½¨ÁíÒ»¸ö¹ÜÀíÔ±ÕÊ»§£¬Í¬Ê±°²×°ÁËαװ³ÉWindows svchost.exeµÄCloudflare TunnelÒÔά³ÖÒþÃØ·ÃÎÊ¡£Îª±£»¤SimpleHelpÃâÊܹ¥»÷£¬½¨ÒéÓû§¾¡¿ìÓ¦ÓÃÄþ¾²¸üУ¬²éÕÒ²¢É¾³ýδ֪¹ÜÀíÔ±ÕÊ»§£¬ÒÔ¼°½«SimpleHelp·ÃÎÊÏÞÖÆÔÚÊÜÐÅÈεÄIP·¶Î§ÄÚ¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/
4. UAC-0006ÀûÓÃÍøÂçµöÓã¹¥»÷PrivatBank¿Í»§£¬²¿ÊðSmokeLoader¶ñÒâÈí¼þ
2ÔÂ6ÈÕ£¬UAC-0006ÊÇÒ»¸öÒÔ¾¼ÃÀûÒæΪĿ±êµÄÍþв×éÖ¯£¬Õë¶ÔÎÚ¿ËÀ¼×î´ó¹úÓÐÒøÐÐPrivatBankµÄ¿Í»§ÌᳫÁËÍøÂçµöÓã¹¥»÷¡£×Ô2024Äê11ÔÂÆ𣬸Ã×é֯ͨ¹ý·¢ËÍ°üÂÞÊÜÃÜÂë±£»¤µÄµµ°¸£¨Èçαװ³É¸¶¿î˵Ã÷»òÉí·ÝÖ¤Ã÷ɨÃè¼þµÄPDFÎļþ£©µÄÆÛÆÐÔµç×ÓÓʼþ£¬ÓÕÆÊܺ¦ÕßÏÂÔز¢Ö´ÐжñÒâÈí¼þ¡£ÕâЩµµ°¸Êµ¼ÊÉÏÊÇÓÃÓÚ²¿ÊðSmokeLoader¶ñÒâÈí¼þµÄ£¬Ö¼ÔÚʵÏÖÊý¾ÝÇÔÈ¡ºÍδ¾ÊÚȨµÄ·ÃÎÊ¡£¹¥»÷Õß½ÓÄÉÁ˶àÖÖÌӱܼì²â¼¼Êõ£¬ÈçÃÜÂë±£»¤ºÍÔÚѬȾÁ´ÖÐʹÓúϷ¨ÏµÍ³¶þ½øÖÆÎļþ¡£¹¥»÷Á÷³Ìͨ³£Éæ¼°´ò¿ª¸½¼þ²¢ÊäÈëÃÜÂëºó£¬Ö´ÐжñÒâJavaScriptÎļþ£¬×¢Èë´úÂëµ½ºÏ·¨Windows½ø³Ì£¬È»ºóÔËÐбàÂëµÄPowerShellÃüÁîÀ´ÏÔʾÓÕ¶üPDFÎĵµ²¢ÁªÏµC2·þÎñÆ÷ÏÂÔغÍÖ´ÐÐSmokeLoader¡£Ñо¿ÈËÔ±·¢ÏÖ£¬UAC-0006ÔÚ¹¥»÷ÖдóÁ¿Ê¹ÓÃPowerShell£¬ÒÔ¼°JavaScript¡¢VBScriptºÍLNKÎļþ£¬ÇÒÁ¬ÐøÒÔPrivatBank¿Í»§ÎªÄ¿±ê£¬±íÃ÷Æä¹Ø×¢¾¼ÃÀûÒæ¡£´ËÍ⣬¸Ã×éÖ¯µÄTTPÓëEmpireMonkeyºÍÓë¶íÂÞ˹ÓйصÄFIN7×éÖ¯ÓÐÖصþ£¬¿ÉÄÜÓë¶íÂÞ˹APT»î¶¯ÓйØÁª¡£
https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/
5. ÃÀ¹úµ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽȨÏÞÔÚ°µÍø±»³öÊÛ
2ÔÂ3ÈÕ£¬ºÚ¿ÍÂÛ̳BreachforumsÉÏ·ºÆðÁËÒ»ÔòÁîÈËÕ𾪵Ľ»Ò×ÐÅÏ¢£¬ÃûΪ¡°nastya_miyako¡±µÄÍþвÕßÕýÔÚ³öÊÛÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽrootȨÏÞ£¬±ê¼Û800ÃÀÔªÇÒ²»½ÓÊÜÒé¼Û¡£ÕâÒ»ÐÐΪ¿ÉÄÜÉæ¼°µ¼µ¯·ÀÓù¡¢ÎäÆ÷¿ª·¢»ò¾üÊÂͨÐŵÈÃô¸ÐÁìÓò£¬Òý·¢Á˹㷺¹Ø×¢¡£¾ÝϤ£¬¡°nastya_miyako¡±×ÔÈ¥Äêµ×¿ªÊ¼£¬±ãÒªÇóǢ̸Õßͨ¹ý¸üΪÄäÃûµÄSessionÈí¼þ½øÐÐÏàͬ£¬²¢Ê¹ÓÃXMR£¨ÃÅÂÞ±Ò£©½øÐн»Ò×£¬Õâһת±ä¿ÉÄÜÓëTelegramÏòÕþ¸®Í×в¢ÉϽÉÊý¾Ý£¬ÒÔ¼°BTCÄäÃûÐÔ¼õÈõÓйء£¸ÃÍþвÕßÔÚºÚ¿ÍÂÛ̳ÖÐÔøʹÓÃËĸöÓû§ÃûÐû²¼½»Ò×ÐÅÏ¢£¬»îԾʱ¼ä³¤´ïËĸöÔ£¬¹²Ðû²¼ÁË223ƪ½»Ò×Ìù£¬ÆäÖаüÂÞ197ƪ¹¥»÷Ç鱨ºÍ26ƪÊý¾ÝÊÛÂôÐÅÏ¢¡£ÔÚÆäÐû²¼µÄÊÛÂôÐÅÏ¢ÖУ¬Ö÷ÒªÒÔÃÀ¹úºÍÖйúΪĿ±ê£¬µ«Ò²Éæ¼°Å·ÖÞ¡¢¶«ÄÏÑǺÍÄÏÃÀµÈ¹ú¼Ò¡£´ËÍ⣬¡°nastya_miyako¡±»¹ÊÛÂôÁË°üÂÞÓ¢¹úºËÄܺͷÀÓù³Ð°üÉÌ·þÎñÆ÷ȨÏÞ¡¢ÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉÌȨÏÞ¡¢ÃÀ¹úÕþ¸®º½¿Õº½ÌìºÍ¹ú·À²¿È¨ÏÞÒÔ¼°ÃÀ¹úÁª°îÊÓ²ì¾ÖFBI·Ö²¿·À»ðǽȨÏÞµÈÖØ´ó¹ú¼Ê¹¥»÷Ç鱨¡£
https://breachforums.st/Thread-USA-Gov-Missile-Defense-Contractor
6. ÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ½ÓÄÉÏȽø¹æ±Ü¼ÆıÇÔÈ¡Ãô¸ÐÊý¾Ý
2ÔÂ4ÈÕ£¬MorphisecÍþвʵÑéÊÒ·¢ÏÖÁËÓëÎÛÃûÕÑÖøµÄSilver Fox APT×éÖ¯Ïà¹ØµÄÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÇþµÀÁ÷´«£¬°üÂÞµöÓãµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍÊÜѬȾÍøÕ¾£¬Ö÷ҪĿ±êÊÇ×éÖ¯Äڵĸ߼ÛÖµ¸öÈË£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÊý¾Ý¡£Óë֮ǰ°æ±¾²îÒ죬µ±Ç°±äÖÖʹÓüٵÄÖйúµçÐŹ«Ë¾¡°Karlos¡±ÍøÕ¾½øÐÐÁ÷´«£¬ÏÂÔØ°üÂÞ.NET¿ÉÖ´ÐÐÎļþÔÚÄڵĶà¸ö×é¼þ¡£¹¥»÷Á´ÒÔÐé¼ÙChromeä¯ÀÀÆ÷ÏÂÔØΪ³õʼѬȾý½é£¬ÀûÓÃÐ޸ĺóµÄ¶¶Òô¿ÉÖ´ÐÐÎļþ°æ±¾½øÐÐDLL²àÔØ£¬²¢ÀûÓÃValveÓÎÏ·ÖеĺϷ¨Tier0.dllÖ´ÐÐÒþ²Ø´úÂë¡£½âÃܵÄÓÐЧÔغÉʹÓÃDonut shellcodeÔÚÄÚ´æÖÐÖ´ÐУ¬Èƹý´«Í³¼ì²âÒªÁ죬²¢ÊÔͼ½ûÓÃÄþ¾²»úÖÆ¡£ValleyRAT¾ßÓлù±¾µÄRAT¹¦Ð§£¬½áºÏ·´VMware¼ì²éÌÓ±ÜÐéÄ⻯»·¾³¼ì²â£¬²¢Ê¹Óóõʼ»¯µÄIPµØÖ·ºÍ¶Ë¿ÚÓëC2·þÎñÆ÷Á¬½Ó¡£Silver Fox APT×éÖ¯²»Í£±ä»¯µÄ¼Æı±íÃ÷й¥»÷Ô½À´Ô½ÅÓ´ó£¬×éÖ¯Ó¦½ÓÄɸüÑϸñµÄÄþ¾²¼Æı½µµÍ·çÏÕ¡£
https://hackread.com/valleyrat-malware-variant-fake-chrome-downloads/