΢Èí¾¯Ê¾£ºÀûÓùûÈ»ASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁÅ°

Ðû²¼Ê±¼ä 2025-02-07

1. ΢Èí¾¯Ê¾£ºÀûÓùûÈ»ASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁÅ°


2ÔÂ6ÈÕ £¬Î¢Èí·¢³ö¾¯¸æ £¬Ö¸³ö¹¥»÷ÕßÕýÔÚÀûÓÃÔÚÏßÕÒµ½µÄ¾²Ì¬ ASP.NET »úÆ÷ÃÜÔ¿ £¬ÔÚ ViewState ´úÂë×¢Èë¹¥»÷Öв¿Êð¶ñÒâÈí¼þ ¡£Ò»Ð©¿ª·¢ÈËÔ±²»É÷ÔÚÈí¼þÖÐʹÓÃÁË´Ó´úÂëÎĵµºÍ´æ´¢¿âƽ̨ÉÏÕÒµ½µÄ ASP.NET ÃÜÔ¿ £¬ÕâЩÃÜÔ¿±¾Ó¦ÓÃÓÚ±£»¤ ViewState ÃâÔâ¸Ä¶¯ºÍÐÅϢй¶ ¡£È»¶ø £¬¹¥»÷ÕßÈ´ÀûÓÃÕâЩ¹ûÈ»À´Ô´µÄÃÜÔ¿ £¬Í¨¹ý¸½¼Ó¾«ÐÄÉè¼ÆµÄÏûÏ¢ÈÏÖ¤´úÂë (MAC) ´´½¨¶ñÒâ ViewState £¬²¢ÔÚÄ¿±ê·þÎñÆ÷ÉÏÖ´ÐÐ £¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐкͶñÒ⸺Ôز¿Ê𠡣΢ÈíÒÑ·¢ÏÖÁè¼Ý 3,000 ¸ö¹ûÈ»Åû¶µÄÃÜÔ¿¿ÉÓÃÓÚ´ËÀ๥»÷ £¬ÕâЩÃÜÔ¿´æÔÚÓÚ¶à¸ö´úÂë´æ´¢¿âÖÐ £¬´øÀ´¸ß·çÏÕ ¡£ÎªÓ¦¶Ô´ËÍþв £¬Î¢Èí½¨Ò鿪·¢ÈËÔ±Äþ¾²Éú³É»úÆ÷ÃÜÔ¿ £¬ÖÆֹʹÓÃĬÈÏ»òÔÚÏßÕÒµ½µÄÃÜÔ¿ £¬²¢Éý¼¶Ó¦Ó÷¨Ê½ÒÔÆôÓ÷´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) ¹¦Ð§ ¡£Í¬Ê± £¬Î¢Èí·ÖÏíÁËɾ³ý»òÌæ»» ASP.NET ¼üµÄÏêϸ²½Öè £¬²¢´Ó¹«¹²ÎĵµÖÐɾ³ýÁËÃÜԿʾÀý ¡£Î¢Èí¾¯¸æ³Æ £¬Èç¹û¹ûÈ»ÃÜÔ¿±»ÀûÓà £¬ÂÖ»»ÃÜÔ¿¿ÉÄܲ»×ãÒÔ½â¾öÎÊÌâ £¬½¨Òé¶ÔÍøÂç·þÎñÆ÷½øÐÐÈ«ÃæÊÓ²ì £¬²¢ÔÚʶ±ð³ö¹ûÈ»ÃÜÔ¿µÄÇé¿öÏ¿¼ÂÇÖØиñʽ»¯²¢ÀëÏßÖØа²×° ¡£


https://www.bleepingcomputer.com/news/security/microsoft-says-attackers-use-exposed-aspnet-keys-to-deploy-malware/


2. KimsukyºÚ¿Í×éÖ¯½ÓÄɶ¨ÖÆRDP WrapperºÍÊðÀí¹¤¾ßʵʩÒþÃع¥»÷


2ÔÂ6ÈÕ £¬³¯ÏʺڿÍ×éÖ¯Kimsuky½üÆÚÔÚ¹¥»÷ÖнÓÄÉÁ˶¨ÖƵÄRDP WrapperºÍÊðÀí¹¤¾ß £¬Ö±½Ó·ÃÎÊÊÜѬȾ»úÆ÷ £¬Õâ±êÖ¾×ÅÆä¼ÆıµÄת±ä ¡£¾ÝAhnLabÄþ¾²Ç鱨ÖÐÐÄ(ASEC)ÊÓ²ì £¬Kimsuky²»ÔÙ½öÒÀÀµÈçPebbleDashµÈºóÃŹ¤¾ß £¬¶øÊÇʹÓÃÁ˶àÖÖ¶¨ÖƵÄÔ¶³Ì·ÃÎÊÊֶΠ¡£×îÐµĹ¥»÷Á´Ê¼ÓÚÒ»·â°üÂÞ¶ñÒâ¿ì½Ý·½Ê½(.LNK)Îļþ¸½¼þµÄÓã²æʽÍøÂçµöÓãµç×ÓÓʼþ £¬¸ÃÓʼþÕë¶ÔÌض¨Ä¿±ê½øÐÐÁËÕì²ì ¡£´ò¿ª.LNKÎļþ»á´¥·¢PowerShell»òMshta´ÓÍⲿ·þÎñÆ÷ÏÂÔØÆäËûÓÐЧ¸ºÔØ £¬°üÂÞPebbleDashºóÃÅ¡¢Ð޸ĺóµÄRDP Wrapper¹¤¾ßºÍÊðÀí¹¤¾ß ¡£Kimsuky¶¨ÖƵÄRDP Wrapper¸Ä±äÁ˵¼³ö¹¦Ð§ÒÔÈƹý·À²¡¶¾¼ì²â £¬Ìṩ³Ö¾ÃµÄRDP·ÃÎÊ £¬²¢ÔÊÐí»ùÓÚGUIµÄÔ¶³Ì¿ØÖÆ £¬Í¬Ê±ÄÜÈƹý·À»ðǽ»òNATÏÞÖÆ ¡£Ò»µ©ÔÚÍøÂçÖÐÕ¾ÎȽŸú £¬Kimsuky»¹»áͶ·Å´ÎÒªÓÐЧ¸ºÔØ £¬Èç¼üÅ̼ǼÆ÷¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½(forceCopy)ºÍ»ùÓÚPowerShellµÄReflectiveLoader ¡£ASECÖ¸³ö £¬KimsukyÊÇÒ»¸öÁ¬Ðø²»Í£ÇÒ²»Í£ÑݱäµÄÍþв £¬½ÓÄɸüÒþÃصÄÔ¶³Ì·ÃÎÊÒªÁìÒÔÑÓ³¤ÔÚÊÜѬȾÍøÂçÖеÄÍ£Áôʱ¼ä ¡£


https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/


3. ºÚ¿ÍÀûÓÃSimpleHelp RMM©¶´´´½¨¹ÜÀíÔ±ÕÊ»§²¢ÒÉËÆΪÀÕË÷Èí¼þ¹¥»÷ÆÌ·


2ÔÂ6ÈÕ £¬ºÚ¿Í½üÆÚÃé×¼ÁË´æÔÚ©¶´µÄSimpleHelp RMM¿Í»§¶Ë £¬ÀûÓñàºÅΪCVE-2024-57726¡¢CVE-2024-57727ºÍCVE-2024-57728µÄ©¶´À´´´½¨¹ÜÀíÔ±ÕÊ»§¡¢Ö²ÈëºóÃÅ £¬²¢¿ÉÄÜΪºóÐøµÄÀÕË÷Èí¼þ¹¥»÷ÆÌ· ¡£¾ÝÍøÂçÄþ¾²¹«Ë¾Field Effect֤ʵ £¬ÕâЩ©¶´ÒÑÔÚ×î½üµÄ¹¥»÷Öб»ÀûÓà ¡£¹¥»÷ÕßÊ×ÏÈÓëÄ¿±ê¶Ëµã½¨Á¢Î´¾­ÊÚȨµÄÁ¬½Ó £¬È»ºóÖ´ÐÐһϵÁз¢ÏÖÃüÁîÒÔÊÕ¼¯Ä¿±ê»·¾³µÄÐÅÏ¢ ¡£½Ó×Å £¬¹¥»÷Õß´´½¨Ð¹ÜÀíÔ±ÕÊ»§ £¬°²×°SliverºóÀûÓÿò¼Ü £¬²¢ÅäÖÃΪÁ¬½Óµ½ºÉÀ¼µÄÃüÁîºÍ¿ØÖÆ·þÎñÆ÷ ¡£´ËÍâ £¬¹¥»÷Õß»¹Í¨¹ýSimpleHelp RMM¿Í»§¶ËÆÆ»µÓò¿ØÖÆÆ÷ £¬²¢´´½¨ÁíÒ»¸ö¹ÜÀíÔ±ÕÊ»§ £¬Í¬Ê±°²×°ÁËαװ³ÉWindows svchost.exeµÄCloudflare TunnelÒÔά³ÖÒþÃØ·ÃÎÊ ¡£Îª±£»¤SimpleHelpÃâÊܹ¥»÷ £¬½¨ÒéÓû§¾¡¿ìÓ¦ÓÃÄþ¾²¸üР£¬²éÕÒ²¢É¾³ýδ֪¹ÜÀíÔ±ÕÊ»§ £¬ÒÔ¼°½«SimpleHelp·ÃÎÊÏÞÖÆÔÚÊÜÐÅÈεÄIP·¶Î§ÄÚ ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/


4. UAC-0006ÀûÓÃÍøÂçµöÓã¹¥»÷PrivatBank¿Í»§ £¬²¿ÊðSmokeLoader¶ñÒâÈí¼þ


2ÔÂ6ÈÕ £¬UAC-0006ÊÇÒ»¸öÒÔ¾­¼ÃÀûÒæΪĿ±êµÄÍþв×éÖ¯ £¬Õë¶ÔÎÚ¿ËÀ¼×î´ó¹úÓÐÒøÐÐPrivatBankµÄ¿Í»§ÌᳫÁËÍøÂçµöÓã¹¥»÷ ¡£×Ô2024Äê11ÔÂÆ𠣬¸Ã×é֯ͨ¹ý·¢ËÍ°üÂÞÊÜÃÜÂë±£»¤µÄµµ°¸£¨Èçαװ³É¸¶¿î˵Ã÷»òÉí·ÝÖ¤Ã÷ɨÃè¼þµÄPDFÎļþ£©µÄÆÛÆ­ÐÔµç×ÓÓʼþ £¬ÓÕÆ­Êܺ¦ÕßÏÂÔز¢Ö´ÐжñÒâÈí¼þ ¡£ÕâЩµµ°¸Êµ¼ÊÉÏÊÇÓÃÓÚ²¿ÊðSmokeLoader¶ñÒâÈí¼þµÄ £¬Ö¼ÔÚʵÏÖÊý¾ÝÇÔÈ¡ºÍδ¾­ÊÚȨµÄ·ÃÎÊ ¡£¹¥»÷Õß½ÓÄÉÁ˶àÖÖÌӱܼì²â¼¼Êõ £¬ÈçÃÜÂë±£»¤ºÍÔÚѬȾÁ´ÖÐʹÓúϷ¨ÏµÍ³¶þ½øÖÆÎļþ ¡£¹¥»÷Á÷³Ìͨ³£Éæ¼°´ò¿ª¸½¼þ²¢ÊäÈëÃÜÂëºó £¬Ö´ÐжñÒâJavaScriptÎļþ £¬×¢Èë´úÂëµ½ºÏ·¨Windows½ø³Ì £¬È»ºóÔËÐбàÂëµÄPowerShellÃüÁîÀ´ÏÔʾÓÕ¶üPDFÎĵµ²¢ÁªÏµC2·þÎñÆ÷ÏÂÔغÍÖ´ÐÐSmokeLoader ¡£Ñо¿ÈËÔ±·¢ÏÖ £¬UAC-0006ÔÚ¹¥»÷ÖдóÁ¿Ê¹ÓÃPowerShell £¬ÒÔ¼°JavaScript¡¢VBScriptºÍLNKÎļþ £¬ÇÒÁ¬ÐøÒÔPrivatBank¿Í»§ÎªÄ¿±ê £¬±íÃ÷Æä¹Ø×¢¾­¼ÃÀûÒæ ¡£´ËÍâ £¬¸Ã×éÖ¯µÄTTPÓëEmpireMonkeyºÍÓë¶íÂÞ˹ÓйصÄFIN7×éÖ¯ÓÐÖصþ £¬¿ÉÄÜÓë¶íÂÞ˹APT»î¶¯ÓйØÁª ¡£


https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/


5. ÃÀ¹úµ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽȨÏÞÔÚ°µÍø±»³öÊÛ


2ÔÂ3ÈÕ £¬ºÚ¿ÍÂÛ̳BreachforumsÉÏ·ºÆðÁËÒ»ÔòÁîÈËÕ𾪵Ľ»Ò×ÐÅÏ¢ £¬ÃûΪ¡°nastya_miyako¡±µÄÍþвÕßÕýÔÚ³öÊÛÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽrootȨÏÞ £¬±ê¼Û800ÃÀÔªÇÒ²»½ÓÊÜÒé¼Û ¡£ÕâÒ»ÐÐΪ¿ÉÄÜÉæ¼°µ¼µ¯·ÀÓù¡¢ÎäÆ÷¿ª·¢»ò¾üÊÂͨÐŵÈÃô¸ÐÁìÓò £¬Òý·¢Á˹㷺¹Ø×¢ ¡£¾ÝϤ £¬¡°nastya_miyako¡±×ÔÈ¥Äêµ×¿ªÊ¼ £¬±ãÒªÇóǢ̸Õßͨ¹ý¸üΪÄäÃûµÄSessionÈí¼þ½øÐÐÏàͬ £¬²¢Ê¹ÓÃXMR£¨ÃÅÂÞ±Ò£©½øÐн»Ò× £¬Õâһת±ä¿ÉÄÜÓëTelegramÏòÕþ¸®Í×Э²¢ÉϽÉÊý¾Ý £¬ÒÔ¼°BTCÄäÃûÐÔ¼õÈõÓйØ ¡£¸ÃÍþвÕßÔÚºÚ¿ÍÂÛ̳ÖÐÔøʹÓÃËĸöÓû§ÃûÐû²¼½»Ò×ÐÅÏ¢ £¬»îԾʱ¼ä³¤´ïËĸöÔ £¬¹²Ðû²¼ÁË223ƪ½»Ò×Ìù £¬ÆäÖаüÂÞ197ƪ¹¥»÷Ç鱨ºÍ26ƪÊý¾ÝÊÛÂôÐÅÏ¢ ¡£ÔÚÆäÐû²¼µÄÊÛÂôÐÅÏ¢ÖÐ £¬Ö÷ÒªÒÔÃÀ¹úºÍÖйúΪĿ±ê £¬µ«Ò²Éæ¼°Å·ÖÞ¡¢¶«ÄÏÑǺÍÄÏÃÀµÈ¹ú¼Ò ¡£´ËÍâ £¬¡°nastya_miyako¡±»¹ÊÛÂôÁË°üÂÞÓ¢¹úºËÄܺͷÀÓù³Ð°üÉÌ·þÎñÆ÷ȨÏÞ¡¢ÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉÌȨÏÞ¡¢ÃÀ¹úÕþ¸®º½¿Õº½ÌìºÍ¹ú·À²¿È¨ÏÞÒÔ¼°ÃÀ¹úÁª°îÊÓ²ì¾ÖFBI·Ö²¿·À»ðǽȨÏÞµÈÖØ´ó¹ú¼Ê¹¥»÷Ç鱨 ¡£


https://breachforums.st/Thread-USA-Gov-Missile-Defense-Contractor


6. ÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ½ÓÄÉÏȽø¹æ±Ü¼ÆıÇÔÈ¡Ãô¸ÐÊý¾Ý


2ÔÂ4ÈÕ £¬MorphisecÍþвʵÑéÊÒ·¢ÏÖÁËÓëÎÛÃûÕÑÖøµÄSilver Fox APT×éÖ¯Ïà¹ØµÄÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÇþµÀÁ÷´« £¬°üÂÞµöÓãµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍÊÜѬȾÍøÕ¾ £¬Ö÷ҪĿ±êÊÇ×éÖ¯Äڵĸ߼ÛÖµ¸öÈË £¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£Óë֮ǰ°æ±¾²îÒì £¬µ±Ç°±äÖÖʹÓüٵÄÖйúµçÐŹ«Ë¾¡°Karlos¡±ÍøÕ¾½øÐÐÁ÷´« £¬ÏÂÔØ°üÂÞ.NET¿ÉÖ´ÐÐÎļþÔÚÄڵĶà¸ö×é¼þ ¡£¹¥»÷Á´ÒÔÐé¼ÙChromeä¯ÀÀÆ÷ÏÂÔØΪ³õʼѬȾý½é £¬ÀûÓÃÐ޸ĺóµÄ¶¶Òô¿ÉÖ´ÐÐÎļþ°æ±¾½øÐÐDLL²àÔØ £¬²¢ÀûÓÃValveÓÎÏ·ÖеĺϷ¨Tier0.dllÖ´ÐÐÒþ²Ø´úÂë ¡£½âÃܵÄÓÐЧÔغÉʹÓÃDonut shellcodeÔÚÄÚ´æÖÐÖ´ÐÐ £¬Èƹý´«Í³¼ì²âÒªÁì £¬²¢ÊÔͼ½ûÓÃÄþ¾²»úÖÆ ¡£ValleyRAT¾ßÓлù±¾µÄRAT¹¦Ð§ £¬½áºÏ·´VMware¼ì²éÌÓ±ÜÐéÄ⻯»·¾³¼ì²â £¬²¢Ê¹Óóõʼ»¯µÄIPµØÖ·ºÍ¶Ë¿ÚÓëC2·þÎñÆ÷Á¬½Ó ¡£Silver Fox APT×éÖ¯²»Í£±ä»¯µÄ¼Æı±íÃ÷й¥»÷Ô½À´Ô½ÅÓ´ó £¬×éÖ¯Ó¦½ÓÄɸüÑϸñµÄÄþ¾²¼Æı½µµÍ·çÏÕ ¡£


https://hackread.com/valleyrat-malware-variant-fake-chrome-downloads/