΢Èí¾¯Ê¾£ºÊ¹ÓùûÕæASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ

Ðû²¼Ê±¼ä 2025-02-07

1. ΢Èí¾¯Ê¾£ºÊ¹ÓùûÕæASP.NETÃÜÔ¿µÄViewState´úÂë×¢Èë¹¥»÷ËÁŰ


2ÔÂ6ÈÕ£¬ £¬£¬ £¬£¬£¬Î¢Èí·¢³öÖÒÑÔ£¬ £¬£¬ £¬£¬£¬Ö¸³ö¹¥»÷ÕßÕýÔÚʹÓÃÔÚÏßÕÒµ½µÄ¾²Ì¬ ASP.NET »úеÃÜÔ¿£¬ £¬£¬ £¬£¬£¬ÔÚ ViewState ´úÂë×¢Èë¹¥»÷Öа²ÅŶñÒâÈí¼þ¡£¡£Ò»Ð©¿ª·¢Ö°Ô±Ê§É÷ÔÚÈí¼þÖÐʹÓÃÁË´Ó´úÂëÎĵµºÍ´æ´¢¿âƽ̨ÉÏÕÒµ½µÄ ASP.NET ÃÜÔ¿£¬ £¬£¬ £¬£¬£¬ÕâЩÃÜÔ¿±¾Ó¦ÓÃÓÚ±£»£»£»¤ ViewState ÃâÔâ¸Ä¶¯ºÍÐÅϢй¶¡£¡£È»¶ø£¬ £¬£¬ £¬£¬£¬¹¥»÷ÕßȴʹÓÃÕâЩ¹ûÕæÈªÔ´µÄÃÜÔ¿£¬ £¬£¬ £¬£¬£¬Í¨¹ý¸½¼ÓÈ«ÐÄÉè¼ÆµÄÐÂÎÅÈÏÖ¤´úÂë (MAC) ½¨Éè¶ñÒâ ViewState£¬ £¬£¬ £¬£¬£¬²¢ÔÚÄ¿µÄЧÀÍÆ÷ÉÏÖ´ÐУ¬ £¬£¬ £¬£¬£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐкͶñÒâ¸ºÔØ°²ÅÅ¡£¡£Î¢ÈíÒÑ·¢Ã÷Áè¼Ý 3,000 ¸ö¹ûÕæÅû¶µÄÃÜÔ¿¿ÉÓÃÓÚ´ËÀ๥»÷£¬ £¬£¬ £¬£¬£¬ÕâЩÃÜÔ¿±£´æÓÚ¶à¸ö´úÂë´æ´¢¿âÖУ¬ £¬£¬ £¬£¬£¬´øÀ´¸ßΣº¦¡£¡£ÎªÓ¦¶Ô´ËÍþв£¬ £¬£¬ £¬£¬£¬Î¢Èí½¨Ò鿪·¢Ö°Ô±Çå¾²ÌìÉúÆøÐµÃÜÔ¿£¬ £¬£¬ £¬£¬£¬×èֹʹÓÃĬÈÏ»òÔÚÏßÕÒµ½µÄÃÜÔ¿£¬ £¬£¬ £¬£¬£¬²¢Éý¼¶Ó¦ÓóÌÐòÒÔÆôÓ÷´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) ¹¦Ð§¡£¡£Í¬Ê±£¬ £¬£¬ £¬£¬£¬Î¢Èí·ÖÏíÁËɾ³ý»òÌæ»» ASP.NET ¼üµÄÏêϸ°ì·¨£¬ £¬£¬ £¬£¬£¬²¢´Ó¹«¹²ÎĵµÖÐɾ³ýÁËÃÜԿʾÀý¡£¡£Î¢ÈíÖÒÑԳƣ¬ £¬£¬ £¬£¬£¬ÈôÊǹûÕæÃÜÔ¿±»Ê¹Ó㬠£¬£¬ £¬£¬£¬ÂÖ»»ÃÜÔ¿¿ÉÄÜȱ·¦ÒÔ½â¾öÎÊÌ⣬ £¬£¬ £¬£¬£¬½¨Òé¶ÔÍøÂçЧÀÍÆ÷¾ÙÐÐÖÜÈ«ÊӲ죬 £¬£¬ £¬£¬£¬²¢ÔÚʶ±ð³ö¹ûÕæÃÜÔ¿µÄÇéÐÎÏÂ˼Á¿ÖØÐÂÃûÌû¯²¢ÀëÏßÖØÐÂ×°Öᣡ£


https://www.bleepingcomputer.com/news/security/microsoft-says-attackers-use-exposed-aspnet-keys-to-deploy-malware/


2. KimsukyºÚ¿Í×éÖ¯½ÓÄɶ¨ÖÆRDP WrapperºÍÊðÀí¹¤¾ßʵÑéÒþÃØ¹¥»÷


2ÔÂ6ÈÕ£¬ £¬£¬ £¬£¬£¬³¯ÏʺڿÍ×éÖ¯Kimsuky½üÆÚÔÚ¹¥»÷ÖнÓÄÉÁ˶¨ÖƵÄRDP WrapperºÍÊðÀí¹¤¾ß£¬ £¬£¬ £¬£¬£¬Ö±½Ó»á¼ûÊÜѬȾ»úе£¬ £¬£¬ £¬£¬£¬Õâ±ê¼Ç×ÅÆäÕ½ÂÔµÄת±ä¡£¡£¾ÝAhnLabÇå¾²Ç鱨ÖÐÐÄ(ASEC)ÊӲ죬 £¬£¬ £¬£¬£¬Kimsuky²»ÔÙ½öÒÀÀµÈçPebbleDashµÈºóÃŹ¤¾ß£¬ £¬£¬ £¬£¬£¬¶øÊÇʹÓÃÁ˶àÖÖ¶¨ÖƵÄÔ¶³Ì»á¼ûÊֶΡ£¡£×îÐµĹ¥»÷Á´Ê¼ÓÚÒ»·â°üÀ¨¶ñÒâ¿ì½Ý·½·¨(.LNK)Îļþ¸½¼þµÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ£¬ £¬£¬ £¬£¬£¬¸ÃÓʼþÕë¶ÔÌØ¶¨Ä¿µÄ¾ÙÐÐÁËÕì̽¡£¡£·­¿ª.LNKÎļþ»á´¥·¢PowerShell»òMshta´ÓÍⲿЧÀÍÆ÷ÏÂÔØÆäËûÓÐÓøºÔØ£¬ £¬£¬ £¬£¬£¬°üÀ¨PebbleDashºóÃÅ¡¢Ð޸ĺóµÄRDP Wrapper¹¤¾ßºÍÊðÀí¹¤¾ß¡£¡£Kimsuky¶¨ÖƵÄRDP Wrapper¸Ä±äÁ˵¼³ö¹¦Ð§ÒÔÈÆ¹ý·À²¡¶¾¼ì²â£¬ £¬£¬ £¬£¬£¬Ìṩ³¤ÆÚµÄRDP»á¼û£¬ £¬£¬ £¬£¬£¬²¢ÔÊÐí»ùÓÚGUIµÄÔ¶³Ì¿ØÖÆ£¬ £¬£¬ £¬£¬£¬Í¬Ê±ÄÜÈÆ¹ý·À»ðǽ»òNATÏÞÖÆ¡£¡£Ò»µ©ÔÚÍøÂçÖÐÕ¾ÎȽŸú£¬ £¬£¬ £¬£¬£¬Kimsuky»¹»áͶ·Å´ÎÒªÓÐÓøºÔØ£¬ £¬£¬ £¬£¬£¬Èç¼üÅ̼ͼÆ÷¡¢ÐÅÏ¢ÇÔÈ¡³ÌÐò(forceCopy)ºÍ»ùÓÚPowerShellµÄReflectiveLoader¡£¡£ASECÖ¸³ö£¬ £¬£¬ £¬£¬£¬KimsukyÊÇÒ»¸öÒ»Á¬Ò»Ö±ÇÒÒ»Ö±ÑݱäµÄÍþв£¬ £¬£¬ £¬£¬£¬½ÓÄɸüÒþÃØµÄÔ¶³Ì»á¼ûÒªÁìÒÔÑÓÉìÔÚÊÜÑ¬È¾ÍøÂçÖеÄÍ£Áôʱ¼ä¡£¡£


https://www.bleepingcomputer.com/news/security/kimsuky-hackers-use-new-custom-rdp-wrapper-for-remote-access/


3. ºÚ¿ÍʹÓÃSimpleHelp RMMÎó²î½¨ÉèÖÎÀíÔ±ÕÊ»§²¢ÒÉËÆÎªÀÕË÷Èí¼þ¹¥»÷ÆÌ·


2ÔÂ6ÈÕ£¬ £¬£¬ £¬£¬£¬ºÚ¿Í½üÆÚÃé×¼Á˱£´æÎó²îµÄSimpleHelp RMM¿Í»§¶Ë£¬ £¬£¬ £¬£¬£¬Ê¹ÓñàºÅΪCVE-2024-57726¡¢CVE-2024-57727ºÍCVE-2024-57728µÄÎó²îÀ´½¨ÉèÖÎÀíÔ±ÕÊ»§¡¢Ö²ÈëºóÃÅ£¬ £¬£¬ £¬£¬£¬²¢¿ÉÄÜΪºóÐøµÄÀÕË÷Èí¼þ¹¥»÷ÆÌ·¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Field Effect֤ʵ£¬ £¬£¬ £¬£¬£¬ÕâЩÎó²îÒÑÔÚ×î½üµÄ¹¥»÷Öб»Ê¹Óᣡ£¹¥»÷ÕßÊ×ÏÈÓëÄ¿µÄ¶Ëµã½¨Éèδ¾­ÊÚȨµÄÅþÁ¬£¬ £¬£¬ £¬£¬£¬È»ºóÖ´ÐÐһϵÁз¢Ã÷ÏÂÁîÒÔÍøÂçÄ¿µÄÇéÐεÄÐÅÏ¢¡£¡£½Ó×Å£¬ £¬£¬ £¬£¬£¬¹¥»÷Õß½¨ÉèÐÂÖÎÀíÔ±ÕÊ»§£¬ £¬£¬ £¬£¬£¬×°ÖÃSliverºóʹÓÿò¼Ü£¬ £¬£¬ £¬£¬£¬²¢ÉèÖÃΪÅþÁ¬µ½ºÉÀ¼µÄÏÂÁîºÍ¿ØÖÆÐ§ÀÍÆ÷¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬£¬¹¥»÷Õß»¹Í¨¹ýSimpleHelp RMM¿Í»§¶ËÆÆËðÓò¿ØÖÆÆ÷£¬ £¬£¬ £¬£¬£¬²¢½¨ÉèÁíÒ»¸öÖÎÀíÔ±ÕÊ»§£¬ £¬£¬ £¬£¬£¬Í¬Ê±×°ÖÃÁËαװ³ÉWindows svchost.exeµÄCloudflare TunnelÒÔά³ÖÒþÃØ»á¼û¡£¡£Îª±£»£»£»¤SimpleHelpÃâÊܹ¥»÷£¬ £¬£¬ £¬£¬£¬½¨ÒéÓû§¾¡¿ìÓ¦ÓÃÇå¾²¸üУ¬ £¬£¬ £¬£¬£¬²éÕÒ²¢É¾³ýδ֪ÖÎÀíÔ±ÕÊ»§£¬ £¬£¬ £¬£¬£¬ÒÔ¼°½«SimpleHelp»á¼ûÏÞÖÆÔÚÊÜÐÅÈεÄIP¹æÄ£ÄÚ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/


4. UAC-0006ʹÓÃÍøÂç´¹ÂÚ¹¥»÷PrivatBank¿Í»§£¬ £¬£¬ £¬£¬£¬°²ÅÅSmokeLoader¶ñÒâÈí¼þ


2ÔÂ6ÈÕ£¬ £¬£¬ £¬£¬£¬UAC-0006ÊÇÒ»¸öÒÔ¾­¼ÃÀûÒæÎªÄ¿µÄµÄÍþв×éÖ¯£¬ £¬£¬ £¬£¬£¬Õë¶ÔÎÚ¿ËÀ¼×î´ó¹úÓÐÒøÐÐPrivatBankµÄ¿Í»§ÌᳫÁËÍøÂç´¹ÂÚ¹¥»÷¡£¡£×Ô2024Äê11ÔÂÆð£¬ £¬£¬ £¬£¬£¬¸Ã×é֯ͨ¹ý·¢ËͰüÀ¨ÊÜÃÜÂë±£»£»£»¤µÄµµ°¸£¨Èçαװ³É¸¶¿î˵Ã÷»òÉí·Ý֤ʵɨÃè¼þµÄPDFÎļþ£©µÄÓÕÆ­ÐÔµç×ÓÓʼþ£¬ £¬£¬ £¬£¬£¬ÓÕÆ­Êܺ¦ÕßÏÂÔØ²¢Ö´ÐжñÒâÈí¼þ¡£¡£ÕâЩµµ°¸ÏÖʵÉÏÊÇÓÃÓÚ°²ÅÅSmokeLoader¶ñÒâÈí¼þµÄ£¬ £¬£¬ £¬£¬£¬Ö¼ÔÚʵÏÖÊý¾ÝÇÔÈ¡ºÍδ¾­ÊÚȨµÄ»á¼û¡£¡£¹¥»÷Õß½ÓÄÉÁ˶àÖÖÌӱܼì²âÊÖÒÕ£¬ £¬£¬ £¬£¬£¬ÈçÃÜÂë±£»£»£»¤ºÍÔÚѬȾÁ´ÖÐʹÓÃÕýµ±ÏµÍ³¶þ½øÖÆÎļþ¡£¡£¹¥»÷Á÷³Ìͨ³£Éæ¼°·­¿ª¸½¼þ²¢ÊäÈëÃÜÂëºó£¬ £¬£¬ £¬£¬£¬Ö´ÐжñÒâJavaScriptÎļþ£¬ £¬£¬ £¬£¬£¬×¢Èë´úÂëµ½Õýµ±WindowsÀú³Ì£¬ £¬£¬ £¬£¬£¬È»ºóÔËÐбàÂëµÄPowerShellÏÂÁîÀ´ÏÔʾÓÕ¶üPDFÎĵµ²¢ÁªÏµC2ЧÀÍÆ÷ÏÂÔØºÍÖ´ÐÐSmokeLoader¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬ £¬£¬ £¬£¬£¬UAC-0006ÔÚ¹¥»÷Öдó×ÚʹÓÃPowerShell£¬ £¬£¬ £¬£¬£¬ÒÔ¼°JavaScript¡¢VBScriptºÍLNKÎļþ£¬ £¬£¬ £¬£¬£¬ÇÒÒ»Á¬ÒÔPrivatBank¿Í»§ÎªÄ¿µÄ£¬ £¬£¬ £¬£¬£¬Åú×¢Æä¹Ø×¢¾­¼ÃÀûÒæ¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬£¬¸Ã×éÖ¯µÄTTPÓëEmpireMonkeyºÍÓë¶íÂÞ˹ÓйصÄFIN7×éÖ¯ÓÐÖØµþ£¬ £¬£¬ £¬£¬£¬¿ÉÄÜÓë¶íÂÞ˹APT»î¶¯ÓйØÁª¡£¡£


https://hackread.com/ukraine-largest-bank-privatbank-smokeloader-malware/


5. ÃÀ¹úµ¼µ¯·ÀÓù³Ð°üÉ̵ÄЧÀÍÆ÷ÍйܷÀ»ðǽȨÏÞÔÚ°µÍø±»³öÊÛ


2ÔÂ3ÈÕ£¬ £¬£¬ £¬£¬£¬ºÚ¿ÍÂÛ̳BreachforumsÉÏ·ºÆðÁËÒ»ÔòÁîÈËÕ𾪵ÄÉúÒâÐÅÏ¢£¬ £¬£¬ £¬£¬£¬ÃûΪ¡°nastya_miyako¡±µÄÍþвÕßÕýÔÚ³öÊÛÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉ̵ÄЧÀÍÆ÷ÍйܷÀ»ðǽrootȨÏÞ£¬ £¬£¬ £¬£¬£¬±ê¼Û800ÃÀÔªÇÒ²»½ÓÊÜÒé¼Û¡£¡£ÕâÒ»ÐÐΪ¿ÉÄÜÉæ¼°µ¼µ¯·ÀÓù¡¢ÎäÆ÷¿ª·¢»ò¾üÊÂͨѶµÈÃô¸ÐÁìÓò£¬ £¬£¬ £¬£¬£¬Òý·¢ÁËÆÕ±é¹Ø×¢¡£¡£¾ÝϤ£¬ £¬£¬ £¬£¬£¬¡°nastya_miyako¡±×ÔÈ¥Äêµ××îÏÈ£¬ £¬£¬ £¬£¬£¬±ãÒªÇóǢ̸Õßͨ¹ý¸üΪÄäÃûµÄSessionÈí¼þ¾ÙÐÐÏàͬ£¬ £¬£¬ £¬£¬£¬²¢Ê¹ÓÃXMR£¨ÃÅÂÞ±Ò£©¾ÙÐÐÉúÒ⣬ £¬£¬ £¬£¬£¬Õâһת±ä¿ÉÄÜÓëTelegramÏòÕþ¸®Í×Э²¢ÉϽÉÊý¾Ý£¬ £¬£¬ £¬£¬£¬ÒÔ¼°BTCÄäÃûÐÔÏ÷ÈõÓйØ¡£¡£¸ÃÍþвÕßÔÚºÚ¿ÍÂÛ̳ÖÐÔøÊ¹ÓÃËĸöÓû§ÃûÐû²¼ÉúÒâÐÅÏ¢£¬ £¬£¬ £¬£¬£¬»îԾʱ¼ä³¤´ïËĸöÔ£¬ £¬£¬ £¬£¬£¬¹²Ðû²¼ÁË223ƪÉúÒâÌù£¬ £¬£¬ £¬£¬£¬ÆäÖаüÀ¨197ƪ¹¥»÷Ç鱨ºÍ26ƪÊý¾ÝÊÛÂôÐÅÏ¢¡£¡£ÔÚÆäÐû²¼µÄÊÛÂôÐÅÏ¢ÖУ¬ £¬£¬ £¬£¬£¬Ö÷ÒªÒÔÃÀ¹úºÍÖйúΪĿµÄ£¬ £¬£¬ £¬£¬£¬µ«Ò²Éæ¼°Å·ÖÞ¡¢¶«ÄÏÑǺÍÄÏÃÀµÈ¹ú¼Ò¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬£¬¡°nastya_miyako¡±»¹ÊÛÂôÁ˰üÀ¨Ó¢¹úºËÄܺͷÀÓù³Ð°üÉÌЧÀÍÆ÷ȨÏÞ¡¢ÃÀ¹úÕþ¸®µ¼µ¯·ÀÓù³Ð°üÉÌȨÏÞ¡¢ÃÀ¹úÕþ¸®º½¿Õº½ÌìºÍ¹ú·À²¿È¨ÏÞÒÔ¼°ÃÀ¹úÁª°îÊÓ²ì¾ÖFBI·Ö²¿·À»ðǽȨÏÞµÈÖØ´ó¹ú¼Ê¹¥»÷Ç鱨¡£¡£


https://breachforums.st/Thread-USA-Gov-Missile-Defense-Contractor


6. ÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ½ÓÄÉÏȽø¹æ±ÜÕ½ÂÔÇÔÈ¡Ãô¸ÐÊý¾Ý


2ÔÂ4ÈÕ£¬ £¬£¬ £¬£¬£¬MorphisecÍþвʵÑéÊÒ·¢Ã÷ÁËÓëÎÛÃûÕÑÖøµÄSilver Fox APT×éÖ¯Ïà¹ØµÄÐÂÐÍValleyRAT¶ñÒâÈí¼þ±äÖÖ¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶àÖÖÇþµÀÈö²¥£¬ £¬£¬ £¬£¬£¬°üÀ¨´¹ÂÚµç×ÓÓʼþ¡¢¼´Ê±Í¨Ñ¶Æ½Ì¨ºÍÊÜÑ¬È¾ÍøÕ¾£¬ £¬£¬ £¬£¬£¬Ö÷ҪĿµÄÊÇ×éÖ¯Äڵĸ߼ÛֵСÎÒ˽¼Ò£¬ £¬£¬ £¬£¬£¬Ö¼ÔÚÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£Óë֮ǰ°æ±¾²î±ð£¬ £¬£¬ £¬£¬£¬Ä¿½ñ±äÖÖʹÓüٵÄÖйúµçÐŹ«Ë¾¡°Karlos¡±ÍøÕ¾¾ÙÐÐÈö²¥£¬ £¬£¬ £¬£¬£¬ÏÂÔØ°üÀ¨.NET¿ÉÖ´ÐÐÎļþÔÚÄڵĶà¸ö×é¼þ¡£¡£¹¥»÷Á´ÒÔÐéαChromeä¯ÀÀÆ÷ÏÂÔØÎª³õʼѬȾǰÑÔ£¬ £¬£¬ £¬£¬£¬Ê¹ÓÃÐ޸ĺóµÄ¶¶Òô¿ÉÖ´ÐÐÎļþ°æ±¾¾ÙÐÐDLL²àÔØ£¬ £¬£¬ £¬£¬£¬²¢Ê¹ÓÃValveÓÎÏ·ÖеÄÕýµ±Tier0.dllÖ´ÐÐÒþ²Ø´úÂë¡£¡£½âÃܵÄÓÐÓÃÔØºÉʹÓÃDonut shellcodeÔÚÄÚ´æÖÐÖ´ÐУ¬ £¬£¬ £¬£¬£¬Èƹý¹Å°å¼ì²âÒªÁ죬 £¬£¬ £¬£¬£¬²¢ÊÔͼ½ûÓÃÇå¾²»úÖÆ¡£¡£ValleyRAT¾ßÓлù±¾µÄRAT¹¦Ð§£¬ £¬£¬ £¬£¬£¬Á¬Ïµ·´VMware¼ì²éÌÓ±ÜÐéÄ⻯ÇéÐμì²â£¬ £¬£¬ £¬£¬£¬²¢Ê¹Óóõʼ»¯µÄIPµØµãºÍ¶Ë¿ÚÓëC2ЧÀÍÆ÷ÅþÁ¬¡£¡£Silver Fox APT×é֯һֱת±äµÄÕ½ÂÔÅúעй¥»÷Ô½À´Ô½ÖØ´ó£¬ £¬£¬ £¬£¬£¬×éÖ¯Ó¦½ÓÄɸüÑÏ¿áµÄÇå¾²Õ½ÂÔ½µµÍΣº¦¡£¡£


https://hackread.com/valleyrat-malware-variant-fake-chrome-downloads/