΢Èí¾¯Ê¾£ºÀûÓù«¿ªASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ

°ä²¼¹¦·ò 2025-02-07

1. ΢Èí¾¯Ê¾£ºÀûÓù«¿ªASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ


2ÔÂ6ÈÕ£¬Î¢Èí·¢³öÖҸ棬ָ³ö¹¥»÷ÕßÔÚÀûÓÃÔÚÏßÕÒµ½µÄ¾²Ì¬ ASP.NET »úеÃÜÔ¿£¬ÔÚ ViewState ´úÂë×¢Èë¹¥»÷Öв¿Êð¶ñÒâÈí¼þ¡£Ò»Ð©¿ª·¢ÈËԱʧÉ÷ÔÚÈí¼þÖÐʹÓÃÁË´Ó´úÂëÎĵµºÍ´æ´¢¿âƽ̨ÉÏÕÒµ½µÄ ASP.NET ÃÜÔ¿£¬ÕâЩÃÜÔ¿±¾ÀûÓÃÓÚ± £»¤ ViewState ÃâÔâ´Û¸ÄºÍÐÅϢй¶¡£È»¶ø£¬¹¥»÷ÕßÈ´ÀûÓÃÕâЩ¹«¿ªÆðÔ´µÄÃÜÔ¿£¬Í¨¹ý¸½¼Ó¾«ÐÄÉè¼ÆµÄÐÂÎÅÈÏÖ¤´úÂë (MAC) ´´½¨¶ñÒâ ViewState£¬²¢ÔÚÖ¸±ê·þÎñÆ÷ÉÏÖ´ÐУ¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐкͶñÒâ¸ºÔØ²¿Êð¡£Î¢ÈíÒÑ·¢ÏÖ³¬¹ý 3,000 ¸ö¹«¿ªÅû¶µÄÃÜÔ¿¿ÉÓÃÓÚ´ËÀ๥»÷£¬ÕâЩÃÜÔ¿´æÔÚÓÚ¶à¸ö´úÂë´æ´¢¿âÖУ¬´øÀ´¸ß·çÏÕ¡£ÎªÓ¦¶Ô´ËÍþв£¬Î¢Èí½¨Ò鿪·¢ÈËÔ±°²È«Ìì»îÁ¦ÐµÃÜÔ¿£¬Ô¤·ÀʹÓÃĬÈÏ»òÔÚÏßÕÒµ½µÄÃÜÔ¿£¬²¢Éý¼¶ÀûÓ÷¨Ê½ÒÔÆôÓ÷´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) Ö°ÄÜ¡£Í¬Ê±£¬Î¢Èí·ÖÏíÁËɾ³ý»ò´úÌæ ASP.NET ¼üµÄ¾ßÌå²½Ö裬²¢´Ó¹«¹²ÎĵµÖÐɾ³ýÁËÃÜԿʾÀý¡£Î¢ÈíÖÒ¸æ³Æ£¬ÈôÊǹ«¿ªÃÜÔ¿±»ÀûÓã¬ÂÖ»»ÃÜÔ¿¿ÉÄܲ»¼°ÒÔ½â¾öÎÊÌ⣬½¨Òé¶ÔÍøÂç·þÎñÆ÷½øÐÐÈ«Ãæµ÷²é£¬²¢ÔÚ¼ø±ð³ö¹«¿ªÃÜÔ¿µÄÇé¿öÏÂ˼¿¼³ÁÐÂÌåʽ»¯²¢ÀëÏß³ÁÐÂ×°Öá£


https://www.bleepingcomputer.com/news/security/microsoft-says-attackers-use-exposed-aspnet-keys-to-deploy-malware/


2. KimsukyºÚ¿Í×é֯ѡȡ¶¨ÔìRDP WrapperºÍ´úÀí¹¤¾ßÖ´ÐÐÒþÃØ¹¥»÷


2ÔÂ6ÈÕ£¬³¯ÏʺڿÍ×éÖ¯Kimsuky½üÆÚÔÚ¹¥»÷µ±Ñ¡È¡Á˶¨ÔìµÄRDP WrapperºÍ´úÀí¹¤¾ß£¬Ö±½Ó½Ó¼ûÊÜϰȾ»úе£¬Õâ±ê־ȡÆäÕ½ÊõµÄת±ä¡£¾ÝAhnLab°²È«µý±¨ÖÐÐÄ(ASEC)¹Û²ì£¬Kimsuky²»ÔÙ½öÒÀÀµÈçPebbleDashµÈºóÃŹ¤¾ß£¬¶øÊÇʹÓÃÁ˶àÖÖ¶¨ÔìµÄÔ¶³Ì½Ó¼û¼¿Á©¡£×îÐµĹ¥»÷Á´Ê¼ÓÚÒ»·âÔ̺¬¶ñÒâ¿ì½Ý·½Ê½(.LNK)Îļþ¸½¼þµÄÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþ£¬¸ÃÓʼþÕë¶ÔÌØ¶¨Ö¸±ê½øÐÐÁË¿úËÅ¡£´ò¿ª.LNKÎļþ»á´¥·¢PowerShell»òMshta´Ó±í²¿·þÎñÆ÷ÏÂÔØÆäËûÓÐЧ¸ºÔØ£¬Ô̺¬PebbleDashºóÃÅ¡¢Åú¸ÄºóµÄRDP Wrapper¹¤¾ßºÍ´úÀí¹¤¾ß¡£Kimsuky¶¨ÔìµÄRDP WrapperŤתÁ˵¼³öÖ°ÄÜÒÔÈÆ¹ý·À²¡¶¾¼ì²â£¬Ìá¹©ÓÆ¾ÃµÄRDP½Ó¼û£¬²¢ÔÊÐí»ùÓÚGUIµÄÔ¶³Ì½ÚÔ죬ͬʱÄÜÈÆ¹ý·À»ðǽ»òNATÏÞ¶È¡£Ò»µ©ÔÚÍøÂçÖÐÕ¾ÎȽŸú£¬Kimsuky»¹»áͶ·Å´ÎÒªÓÐЧ¸ºÔØ£¬Èç¼üÅ̼ͼÆ÷¡¢ÐÅÏ¢ÇÔÈ¡·¨Ê½(forceCopy)ºÍ»ùÓÚPowerShellµÄReflectiveLoader¡£ASECÖ¸³ö£¬KimsukyÊÇÒ»¸ö³ÖÐø²»ÐÝÇÒ²»ÐÝÑݱäµÄÍþв£¬Ñ¡È¡¸üÒþÃØµÄÔ¶³Ì½Ó¼û²½ÖèÒÔµ¢¸éÔÚÊÜÏ°È¾ÍøÂçÖеÄÍ£¶Ù¹¦·ò¡£


https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/


3. ºÚ¿ÍÀûÓÃSimpleHelp RMM·ì϶´´½¨ÖÎÀíÔ¹ØÊ»§²¢ÒÉËÆÎªÀÕË÷Èí¼þ¹¥»÷ÆÌ·


2ÔÂ6ÈÕ£¬ºÚ¿Í½üÆÚ¶Ô×¼ÁË´æÔÚ·ì϶µÄSimpleHelp RMM¿Í»§¶Ë£¬ÀûÓñàºÅΪCVE-2024-57726¡¢CVE-2024-57727ºÍCVE-2024-57728µÄ·ì϶À´´´½¨ÖÎÀíÔ¹ØÊ»§¡¢Ö²ÈëºóÃÅ£¬²¢¿ÉÄÜΪºóÐøµÄÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¾ÝÍøÂ簲ȫ¹«Ë¾Field Effect֤ʵ£¬ÕâЩ·ì϶ÒÑÔÚ×î½üµÄ¹¥»÷Öб»ÀûÓ᣹¥»÷ÕßÊ×ÏÅ×ëÖ¸±ê¶Ëµã³ÉÁ¢Î´¾­ÊÚȨµÄÏνÓ£¬¶øºóÖ´ÐÐһϵÁз¢ÏÖºÅÁîÒÔÍøÂçÖ¸±ê»·¾³µÄÐÅÏ¢¡£½Ó×Å£¬¹¥»÷Õß´´½¨ÐÂÖÎÀíÔ¹ØÊ»§£¬×°ÖÃSliverºóÀûÓÿò¼Ü£¬²¢ÅäÖÃΪÏνӵ½ºÉÀ¼µÄºÅÁîºÍ½ÚÔì·þÎñÆ÷¡£´Ë±í£¬¹¥»÷Õß»¹Í¨¹ýSimpleHelp RMM¿Í»§¶Ë·ÛËéÓò½ÚÔìÆ÷£¬²¢´´½¨ÁíÒ»¸öÖÎÀíÔ¹ØÊ»§£¬Í¬Ê±×°ÖÃÁ˼Ù×°³ÉWindows svchost.exeµÄCloudflare TunnelÒÔά³ÖÒþÃØ½Ó¼û¡£Îª± £»¤SimpleHelpÃâÊܹ¥»÷£¬½¨ÒéÓû§¾¡¿ìÀûÓð²È«¸üУ¬²éÕÒ²¢É¾³ýδ֪ÖÎÀíÔ¹ØÊ»§£¬ÒÔ¼°½«SimpleHelp½Ó¼ûÏÞ¶ÈÔÚÊÜÐÅÀµµÄIPÁìÓòÄÚ¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/


4. UAC-0006ÀûÓÃÍøÂç´¹µö¹¥»÷PrivatBank¿Í»§£¬²¿ÊðSmokeLoader¶ñÒâÈí¼þ


2ÔÂ6ÈÕ£¬UAC-0006ÊÇÒ»¸öÒÔ¾­¼ÃÀûÒæÎªÖ¸±êµÄÍþв×éÖ¯£¬Õë¶ÔÎÚ¿ËÀ¼×î´ó¹úÓÐÒøÐÐPrivatBankµÄ¿Í»§ÌáÒéÁËÍøÂç´¹µö¹¥»÷¡£×Ô2024Äê11ÔÂÆð£¬¸Ã×é֯ͨ¹ý·¢ËÍÔ̺¬ÊÜÃÜÂë± £»¤µÄµµ°¸£¨Èç¼Ù×°³É¸¶¿î×¢Ã÷»òÉí·ÝÖ¤Ã÷ɨÃè¼þµÄPDFÎļþ£©µÄºýŪÐÔµç×ÓÓʼþ£¬ÓÕÆ­Êܺ¦ÕßÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£ÕâЩµµ°¸ÏÖʵÉÏÊÇÓÃÓÚ²¿ÊðSmokeLoader¶ñÒâÈí¼þµÄ£¬Ö¼ÔÚʵÏÖÊý¾ÝÇÔÈ¡ºÍδ¾­ÊÚȨµÄ½Ó¼û¡£¹¥»÷ÕßѡȡÁ˶àÖÖÌӱܼì²â¼¼Êõ£¬ÈçÃÜÂë± £»¤ºÍÔÚϰȾÁ´ÖÐʹÓúϷ¨ÏµÍ³¶þ½øÔìÎļþ¡£¹¥»÷Á÷³Ìͨ³£Éæ¼°´ò¿ª¸½¼þ²¢ÊäÈëÃÜÂëºó£¬Ö´ÐжñÒâJavaScriptÎļþ£¬×¢Èë´úÂëµ½ºÏ·¨Windows¹ý³Ì£¬¶øºóÔËÐбàÂëµÄPowerShellºÅÁîÀ´ÏÔʾµö¶üPDFÎĵµ²¢ÁªÏµC2·þÎñÆ÷ÏÂÔØºÍÖ´ÐÐSmokeLoader¡£×êÑÐÈËÔ±·¢ÏÖ£¬UAC-0006ÔÚ¹¥»÷ÖдóÁ¿Ê¹ÓÃPowerShell£¬ÒÔ¼°JavaScript¡¢VBScriptºÍLNKÎļþ£¬ÇÒ³ÖÐøÒÔPrivatBank¿Í»§ÎªÖ¸±ê£¬Åú×¢Æä¹Ø×¢¾­¼ÃÀûÒæ¡£´Ë±í£¬¸Ã×éÖ¯µÄTTPÓëEmpireMonkeyºÍÓë¶íÂÞ˹ÓйصÄFIN7×éÖ¯ÓгÁµþ£¬¿ÉÄÜÓë¶íÂÞ˹APT»î¶¯ÓйØÁª¡£


https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/


5. ÃÀ¹úµ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽȨÏÞÔÚ°µÍø±»ÏúÊÛ


2ÔÂ3ÈÕ£¬ºÚ¿ÍÂÛ̳BreachforumsÉϳöÏÖÁËÒ»ÔòÁîÈËÕ𾪵ÄÂòÂôÐÅÏ¢£¬ÃûΪ¡°nastya_miyako¡±µÄÍþвÕßÔÚÏúÊÛÃÀ¹úµ±¾Öµ¼µ¯·ÀÓù³Ð°üÉ̵ķþÎñÆ÷ÍйܷÀ»ðǽrootȨÏÞ£¬±ê¼Û800ÃÀÔªÇÒ²»½ÓÊÜÒé¼Û¡£ÕâÒ»ÐÐΪ¿ÉÄÜÉæ¼°µ¼µ¯·ÀÓù¡¢±øÆ÷¿ª·¢»ò¾üÊÂͨѶµÈÃô¸ÐÁìÓò£¬Òý·¢ÁË¿í·º¹Ø×¢¡£¾ÝϤ£¬¡°nastya_miyako¡±×ÔÈ¥Äêµ×ÆðÍ·£¬±ãÒªÇóǢ̸Õßͨ¹ý¸üΪÄäÃûµÄSessionÈí¼þ½øÐйµÍ¨£¬²¢Ê¹ÓÃXMR£¨ÃÅÂÞ±Ò£©½øÐÐÂòÂô£¬Õâһת±ä¿ÉÄÜÓëTelegramÏòµ±¾ÖÍ×Э²¢ÉϽÉÊý¾Ý£¬ÒÔ¼°BTCÄäÃûÐÔ¼õÈõÓйØ¡£¸ÃÍþвÕßÔÚºÚ¿ÍÂÛ̳ÖÐÔøÊ¹ÓÃËĸöÓû§Ãû°ä²¼ÂòÂôÐÅÏ¢£¬»îÔ¾¹¦·ò³¤´ïËĸöÔ£¬¹²°ä²¼ÁË223ƪÂòÂôÌù£¬ÆäÖÐÔ̺¬197ƪ¹¥»÷µý±¨ºÍ26ƪÊý¾ÝÊÛÂôÐÅÏ¢¡£ÔÚÆä°ä²¼µÄÊÛÂôÐÅÏ¢ÖУ¬ÖØÒªÒÔÃÀ¹úºÍÖйúΪָ±ê£¬µ«Ò²Éæ¼°Å·ÖÞ¡¢¶«ÄÏÑǺÍÄÏÃÀµÈ¹ú¶È¡£´Ë±í£¬¡°nastya_miyako¡±»¹ÊÛÂôÁËÔ̺¬Ó¢¹úºËÄܺͷÀÓù³Ð°üÉÌ·þÎñÆ÷ȨÏÞ¡¢ÃÀ¹úµ±¾Öµ¼µ¯·ÀÓù³Ð°üÉÌȨÏÞ¡¢ÃÀ¹úµ±¾Öº½¿Õº½ÌìºÍ¹ú·À²¿È¨ÏÞÒÔ¼°ÃÀ¹úÁª¹úµ÷²é¾ÖFBI·Ö²¿·À»ðǽȨÏ޵ȳÁ´ó¹ú¼Ê¹¥»÷µý±¨¡£


https://breachforums.st/Thread-USA-Gov-Missile-Defense-Contractor


6. ÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖѡȡÏȽø¶ã±ÜÕ½ÊõÇÔÈ¡Ãô¸ÐÊý¾Ý


2ÔÂ4ÈÕ£¬MorphisecÍþв³¢ÊÔÊÒ·¢ÏÖÁËÓë³ôÃûÔ¶ÑïµÄSilver Fox APT×éÖ¯ÓйصÄÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÇþ·´«²¼£¬Ô̺¬´¹µöµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍÊÜÏ°È¾ÍøÕ¾£¬ÖØÒªÖ¸±êÊÇ×éÖ¯Äڵĸ߼ÛÖµÓ×ÎÒ£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÊý¾Ý¡£Óë֮ǰ°æ±¾·ÖÆç£¬µ±Ç°±äÖÖʹÓüٵÄÖйúµçÐŹ«Ë¾¡°Karlos¡±ÍøÕ¾½øÐд«²¼£¬ÏÂÔØÔ̺¬.NET¿ÉÖ´ÐÐÎļþÔÚÄڵĶà¸ö×é¼þ¡£¹¥»÷Á´ÒÔÐéαChromeä¯ÀÀÆ÷ÏÂÔØÎª³õʼϰȾý½é£¬ÀûÓÃÅú¸ÄºóµÄ¶¶Òô¿ÉÖ´ÐÐÎļþ°æ±¾½øÐÐDLL²àÔØ£¬²¢ÀûÓÃValveÓÎÏ·ÖеĺϷ¨Tier0.dllÖ´Ðаµ²Ø´úÂë¡£½âÃܵÄÓÐÐ§ÔØºÉʹÓÃDonut shellcodeÔÚÄÚ´æÖÐÖ´ÐУ¬Èƹý´«Í³¼ì²â²½Ö裬²¢ÊÔͼ½ûÓð²È«»úÔì¡£ValleyRATÓµÓиù»ùµÄRATÖ°ÄÜ£¬½áºÏ·´VMware²é³­ÌÓ±ÜÐé¹¹»¯»·¾³¼ì²â£¬²¢Ê¹Óóõʼ»¯µÄIPµØÖ·ºÍ¶Ë¿ÚÓëC2·þÎñÆ÷ÏνÓ¡£Silver Fox APT×éÖ¯²»Ðݱ䶯µÄÕ½ÊõÅúעй¥»÷Ô½À´Ô½¸´ÔÓ£¬×é֯Ӧѡȡ¸üÑϸñµÄ°²È«Õ½Êõ½µµÍ·çÏÕ¡£


https://hackread.com/valleyrat-malware-variant-fake-chrome-downloads/