΢Èí¾¯Ê¾£ºÊ¹ÓùûÕæASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ
Ðû²¼Ê±¼ä 2025-02-071. ΢Èí¾¯Ê¾£ºÊ¹ÓùûÕæASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ
2ÔÂ6ÈÕ£¬Î¢Èí·¢³öÖÒÑÔ£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃÔÚÏßÕÒµ½µÄ¾²Ì¬ ASP.NET »úеÃÜÔ¿£¬ÔÚ ViewState ´úÂë×¢Èë¹¥»÷Öа²ÅŶñÒâÈí¼þ¡£Ò»Ð©¿ª·¢Ö°Ô±Ê§É÷ÔÚÈí¼þÖÐʹÓÃÁË´Ó´úÂëÎĵµºÍ´æ´¢¿âƽ̨ÉÏÕÒµ½µÄ ASP.NET ÃÜÔ¿£¬ÕâЩÃÜÔ¿±¾Ó¦ÓÃÓÚ±£»¤ ViewState ÃâÔâ¸Ä¶¯ºÍÐÅϢй¶¡£È»¶ø£¬¹¥»÷ÕßȴʹÓÃÕâЩ¹ûÕæÈªÔ´µÄÃÜÔ¿£¬Í¨¹ý¸½¼ÓÈ«ÐÄÉè¼ÆµÄÐÂÎÅÈÏÖ¤´úÂë (MAC) ½¨Éè¶ñÒâ ViewState£¬²¢ÔÚÄ¿µÄ·þÎñÆ÷ÉÏÖ´ÐУ¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐкͶñÒâ¸ºÔØ°²ÅÅ¡£Î¢ÈíÒÑ·¢Ã÷Áè¼Ý 3,000 ¸ö¹ûÕæÅû¶µÄÃÜÔ¿¿ÉÓÃÓÚ´ËÀ๥»÷£¬ÕâЩÃÜÔ¿±£´æÓÚ¶à¸ö´úÂë´æ´¢¿âÖУ¬´øÀ´¸ßΣº¦¡£ÎªÓ¦¶Ô´ËÍþв£¬Î¢Èí½¨Ò鿪·¢Ö°Ô±Çå¾²ÌìÉúÆøÐµÃÜÔ¿£¬×èֹʹÓÃĬÈÏ»òÔÚÏßÕÒµ½µÄÃÜÔ¿£¬²¢Éý¼¶Ó¦ÓóÌÐòÒÔÆôÓ÷´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) ¹¦Ð§¡£Í¬Ê±£¬Î¢Èí·ÖÏíÁËɾ³ý»òÌæ»» ASP.NET ¼üµÄÏêϸ°ì·¨£¬²¢´Ó¹«¹²ÎĵµÖÐɾ³ýÁËÃÜԿʾÀý¡£Î¢ÈíÖÒÑԳƣ¬ÈôÊǹûÕæÃÜÔ¿±»Ê¹Óã¬ÂÖ»»ÃÜÔ¿¿ÉÄÜȱ·¦ÒÔ½â¾öÎÊÌ⣬½¨Òé¶ÔÍøÂç·þÎñÆ÷¾ÙÐÐÖÜÈ«ÊӲ죬²¢ÔÚʶ±ð³ö¹ûÕæÃÜÔ¿µÄÇéÐÎÏÂ˼Á¿ÖØÐÂÃûÌû¯²¢ÀëÏßÖØÐÂ×°Öá£
https://www.bleepingcomputer.com/news/security/microsoft-says-attackers-use-exposed-aspnet-keys-to-deploy-malware/
2. KimsukyºÚ¿Í×éÖ¯½ÓÄɶ¨ÖÆRDP WrapperºÍÊðÀí¹¤¾ßʵÑéÒþÃØ¹¥»÷
2ÔÂ6ÈÕ£¬³¯ÏʺڿÍ×éÖ¯Kimsuky½üÆÚÔÚ¹¥»÷ÖнÓÄÉÁ˶¨ÖƵÄRDP WrapperºÍÊðÀí¹¤¾ß£¬Ö±½Ó»á¼ûÊÜѬȾ»úе£¬Õâ±ê¼Ç×ÅÆäÕ½ÂÔµÄת±ä¡£¾ÝAhnLabÇå¾²Ç鱨ÖÐÐÄ(ASEC)ÊӲ죬Kimsuky²»ÔÙ½öÒÀÀµÈçPebbleDashµÈºóÃŹ¤¾ß£¬¶øÊÇʹÓÃÁ˶àÖÖ¶¨ÖƵÄÔ¶³Ì»á¼ûÊֶΡ£×îÐµĹ¥»÷Á´Ê¼ÓÚÒ»·â°üÀ¨¶ñÒâ¿ì½Ý·½·¨(.LNK)Îļþ¸½¼þµÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬¸ÃÓʼþÕë¶ÔÌØ¶¨Ä¿µÄ¾ÙÐÐÁËÕì̽¡£·¿ª.LNKÎļþ»á´¥·¢PowerShell»òMshta´ÓÍⲿ·þÎñÆ÷ÏÂÔØÆäËûÓÐÓøºÔØ£¬°üÀ¨PebbleDashºóÃÅ¡¢Ð޸ĺóµÄRDP Wrapper¹¤¾ßºÍÊðÀí¹¤¾ß¡£Kimsuky¶¨ÖƵÄRDP Wrapper¸Ä±äÁ˵¼³ö¹¦Ð§ÒÔÈÆ¹ý·À²¡¶¾¼ì²â£¬Ìṩ³¤ÆÚµÄRDP»á¼û£¬²¢ÔÊÐí»ùÓÚGUIµÄÔ¶³Ì¿ØÖÆ£¬Í¬Ê±ÄÜÈÆ¹ý·À»ðǽ»òNATÏÞÖÆ¡£Ò»µ©ÔÚÍøÂçÖÐÕ¾ÎȽŸú£¬Kimsuky»¹»áͶ·Å´ÎÒªÓÐÓøºÔØ£¬Èç¼üÅ̼ͼÆ÷¡¢ÐÅÏ¢ÇÔÈ¡³ÌÐò(forceCopy)ºÍ»ùÓÚPowerShellµÄReflectiveLoader¡£ASECÖ¸³ö£¬KimsukyÊÇÒ»¸öÒ»Á¬Ò»Ö±ÇÒÒ»Ö±ÑݱäµÄÍþв£¬½ÓÄɸüÒþÃØµÄÔ¶³Ì»á¼ûÒªÁìÒÔÑÓÉìÔÚÊÜÑ¬È¾ÍøÂçÖеÄÍ£Áôʱ¼ä¡£
https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/
3. ºÚ¿ÍʹÓÃSimpleHelp RMMÎó²î½¨ÉèÖÎÀíÔ±ÕÊ»§²¢ÒÉËÆÎªÀÕË÷Èí¼þ¹¥»÷ÆÌ·
2ÔÂ6ÈÕ£¬ºÚ¿Í½üÆÚÃé×¼Á˱£´æÎó²îµÄSimpleHelp RMM¿Í»§¶Ë£¬Ê¹ÓñàºÅΪCVE-2024-57726¡¢CVE-2024-57727ºÍCVE-2024-57728µÄÎó²îÀ´½¨ÉèÖÎÀíÔ±ÕÊ»§¡¢Ö²ÈëºóÃÅ£¬²¢¿ÉÄÜΪºóÐøµÄÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¾ÝÍøÂçÇå¾²¹«Ë¾Field Effect֤ʵ£¬ÕâЩÎó²îÒÑÔÚ×î½üµÄ¹¥»÷Öб»Ê¹Ó᣹¥»÷ÕßÊ×ÏÈÓëÄ¿µÄ¶Ëµã½¨Éèδ¾ÊÚȨµÄÅþÁ¬£¬È»ºóÖ´ÐÐһϵÁз¢Ã÷ÏÂÁîÒÔÍøÂçÄ¿µÄÇéÐεÄÐÅÏ¢¡£½Ó×Å£¬¹¥»÷Õß½¨ÉèÐÂÖÎÀíÔ±ÕÊ»§£¬×°ÖÃSliverºóʹÓÿò¼Ü£¬²¢ÉèÖÃΪÅþÁ¬µ½ºÉÀ¼µÄÏÂÁîºÍ¿ØÖÆ·þÎñÆ÷¡£±ðµÄ£¬¹¥»÷Õß»¹Í¨¹ýSimpleHelp RMM¿Í»§¶ËÆÆËðÓò¿ØÖÆÆ÷£¬²¢½¨ÉèÁíÒ»¸öÖÎÀíÔ±ÕÊ»§£¬Í¬Ê±×°ÖÃÁËαװ³ÉWindows svchost.exeµÄCloudflare TunnelÒÔά³ÖÒþÃØ»á¼û¡£Îª±£»¤SimpleHelpÃâÊܹ¥»÷£¬½¨ÒéÓû§¾¡¿ìÓ¦ÓÃÇå¾²¸üУ¬²éÕÒ²¢É¾³ýδ֪ÖÎÀíÔ±ÕÊ»§£¬ÒÔ¼°½«SimpleHelp»á¼ûÏÞÖÆÔÚÊÜÐÅÍеÄIP¹æÄ£ÄÚ¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/
4. UAC-0006ʹÓÃÍøÂç´¹ÂÚ¹¥»÷PrivatBank¿Í»§£¬°²ÅÅSmokeLoader¶ñÒâÈí¼þ
2ÔÂ6ÈÕ£¬UAC-0006ÊÇÒ»¸öÒÔ¾¼ÃÀûÒæÎªÄ¿µÄµÄÍþв×éÖ¯£¬Õë¶ÔÎÚ¿ËÀ¼×î´ó¹úÓÐÒøÐÐPrivatBankµÄ¿Í»§ÌᳫÁËÍøÂç´¹ÂÚ¹¥»÷¡£×Ô2024Äê11ÔÂÆð£¬¸Ã×é֯ͨ¹ý·¢ËͰüÀ¨ÊÜÃÜÂë±£»¤µÄµµ°¸£¨Èçαװ³É¸¶¿î˵Ã÷»òÉí·Ý֤ʵɨÃè¼þµÄPDFÎļþ£©µÄÓÕÆÐÔµç×ÓÓʼþ£¬ÓÕÆÊܺ¦ÕßÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£ÕâЩµµ°¸ÏÖʵÉÏÊÇÓÃÓÚ°²ÅÅSmokeLoader¶ñÒâÈí¼þµÄ£¬Ö¼ÔÚʵÏÖÊý¾ÝÇÔÈ¡ºÍδ¾ÊÚȨµÄ»á¼û¡£¹¥»÷Õß½ÓÄÉÁ˶àÖÖÌӱܼì²âÊÖÒÕ£¬ÈçÃÜÂë±£»¤ºÍÔÚѬȾÁ´ÖÐʹÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ¡£¹¥»÷Á÷³Ìͨ³£Éæ¼°·¿ª¸½¼þ²¢ÊäÈëÃÜÂëºó£¬Ö´ÐжñÒâJavaScriptÎļþ£¬×¢Èë´úÂëµ½Õýµ±WindowsÀú³Ì£¬È»ºóÔËÐбàÂëµÄPowerShellÏÂÁîÀ´ÏÔʾÓÕ¶üPDFÎĵµ²¢ÁªÏµC2·þÎñÆ÷ÏÂÔØºÍÖ´ÐÐSmokeLoader¡£Ñо¿Ö°Ô±·¢Ã÷£¬UAC-0006ÔÚ¹¥»÷Öдó×ÚʹÓÃPowerShell£¬ÒÔ¼°JavaScript¡¢VBScriptºÍLNKÎļþ£¬ÇÒÒ»Á¬ÒÔPrivatBank¿Í»§ÎªÄ¿µÄ£¬Åú×¢Æä¹Ø×¢¾¼ÃÀûÒæ¡£±ðµÄ£¬¸Ã×éÖ¯µÄTTPÓëEmpireMonkeyºÍÓë¶íÂÞ˹ÓйصÄFIN7×éÖ¯ÓÐÖØµþ£¬¿ÉÄÜÓë¶íÂÞ˹APTÔ˶¯ÓйØÁª¡£
https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/
5. ÃÀ¹úµ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽȨÏÞÔÚ°µÍø±»³öÊÛ
2ÔÂ3ÈÕ£¬ºÚ¿ÍÂÛ̳BreachforumsÉÏ·ºÆðÁËÒ»ÔòÁîÈËÕ𾪵ÄÉúÒâÐÅÏ¢£¬ÃûΪ¡°nastya_miyako¡±µÄÍþвÕßÕýÔÚ³öÊÛÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽrootȨÏÞ£¬±ê¼Û800ÃÀÔªÇÒ²»½ÓÊÜÒé¼Û¡£ÕâÒ»ÐÐΪ¿ÉÄÜÉæ¼°µ¼µ¯·ÀÓù¡¢ÎäÆ÷¿ª·¢»ò¾üÊÂͨѶµÈÃô¸ÐÁìÓò£¬Òý·¢ÁËÆÕ±é¹Ø×¢¡£¾ÝϤ£¬¡°nastya_miyako¡±×ÔÈ¥Äêµ××îÏÈ£¬±ãÒªÇóǢ̸Õßͨ¹ý¸üΪÄäÃûµÄSessionÈí¼þ¾ÙÐÐÏàͬ£¬²¢Ê¹ÓÃXMR£¨ÃÅÂÞ±Ò£©¾ÙÐÐÉúÒ⣬Õâһת±ä¿ÉÄÜÓëTelegramÏòÕþ¸®Í×в¢ÉϽÉÊý¾Ý£¬ÒÔ¼°BTCÄäÃûÐÔÏ÷ÈõÓйء£¸ÃÍþвÕßÔÚºÚ¿ÍÂÛ̳ÖÐÔøÊ¹ÓÃËĸöÓû§ÃûÐû²¼ÉúÒâÐÅÏ¢£¬»îԾʱ¼ä³¤´ïËĸöÔ£¬¹²Ðû²¼ÁË223ƪÉúÒâÌù£¬ÆäÖаüÀ¨197ƪ¹¥»÷Ç鱨ºÍ26ƪÊý¾ÝÊÛÂôÐÅÏ¢¡£ÔÚÆäÐû²¼µÄÊÛÂôÐÅÏ¢ÖУ¬Ö÷ÒªÒÔÃÀ¹úºÍÖйúΪĿµÄ£¬µ«Ò²Éæ¼°Å·ÖÞ¡¢¶«ÄÏÑǺÍÄÏÃÀµÈ¹ú¼Ò¡£±ðµÄ£¬¡°nastya_miyako¡±»¹ÊÛÂôÁ˰üÀ¨Ó¢¹úºËÄܺͷÀÓù³Ð°üÉÌ·þÎñÆ÷ȨÏÞ¡¢ÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉÌȨÏÞ¡¢ÃÀ¹úÕþ¸®º½¿Õº½ÌìºÍ¹ú·À²¿È¨ÏÞÒÔ¼°ÃÀ¹úÁª°îÊÓ²ì¾ÖFBI·Ö²¿·À»ðǽȨÏÞµÈÖØ´ó¹ú¼Ê¹¥»÷Ç鱨¡£
https://breachforums.st/Thread-USA-Gov-Missile-Defense-Contractor
6. ÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ½ÓÄÉÏȽø¹æ±ÜÕ½ÂÔÇÔÈ¡Ãô¸ÐÊý¾Ý
2ÔÂ4ÈÕ£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÓëÎÛÃûÕÑÖøµÄSilver Fox APT×éÖ¯Ïà¹ØµÄÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÇþµÀÈö²¥£¬°üÀ¨´¹ÂÚµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍÊÜÑ¬È¾ÍøÕ¾£¬Ö÷ҪĿµÄÊÇ×éÖ¯Äڵĸ߼ÛֵСÎÒ˽¼Ò£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÊý¾Ý¡£Óë֮ǰ°æ±¾²î±ð£¬Ä¿½ñ±äÖÖʹÓüٵÄÖйúµçÐŹ«Ë¾¡°Karlos¡±ÍøÕ¾¾ÙÐÐÈö²¥£¬ÏÂÔØ°üÀ¨.NET¿ÉÖ´ÐÐÎļþÔÚÄڵĶà¸ö×é¼þ¡£¹¥»÷Á´ÒÔÐéαChromeä¯ÀÀÆ÷ÏÂÔØÎª³õʼѬȾǰÑÔ£¬Ê¹ÓÃÐ޸ĺóµÄ¶¶Òô¿ÉÖ´ÐÐÎļþ°æ±¾¾ÙÐÐDLL²àÔØ£¬²¢Ê¹ÓÃValveÓÎÏ·ÖеÄÕýµ±Tier0.dllÖ´ÐÐÒþ²Ø´úÂë¡£½âÃܵÄÓÐÓÃÔØºÉʹÓÃDonut shellcodeÔÚÄÚ´æÖÐÖ´ÐУ¬Èƹý¹Å°å¼ì²âÒªÁ죬²¢ÊÔͼ½ûÓÃÇå¾²»úÖÆ¡£ValleyRAT¾ßÓлù±¾µÄRAT¹¦Ð§£¬ÍŽᷴVMware¼ì²éÌÓ±ÜÐéÄ⻯ÇéÐμì²â£¬²¢Ê¹Óóõʼ»¯µÄIPµØµãºÍ¶Ë¿ÚÓëC2·þÎñÆ÷ÅþÁ¬¡£Silver Fox APT×é֯һֱת±äµÄÕ½ÂÔÅúעй¥»÷Ô½À´Ô½ÖØ´ó£¬×éÖ¯Ó¦½ÓÄɸüÑÏ¿áµÄÇå¾²Õ½ÂÔ½µµÍΣº¦¡£
https://hackread.com/valleyrat-malware-variant-fake-chrome-downloads/


¾©¹«Íø°²±¸11010802024551ºÅ