Microsoft released a blog this week which I don’t think people have fully understood the implications of, but it’s great research and a great attack by the threat actor.
I think it’s highly likely multiple threat actors will now jump on this, it’s even automatable.
The attack:
1) take a web.config file. They’re really easy to find.
2) POST request to RCE in IIS
The architecture of .net means this is surprisingly easy to do and you don’t patch your way out of it.
I’ve bookmarked this thread so it doesn’t auto delete the toots, put it that way. You could just automate spraying the internet with this one.
@GossiTheDog “ publicly available, static ASP.NET machine key” THE. WHAT.
This is like finding the string “pass=replaceme” AND SHIPPING THAT TO PROD.
@GossiTheDog MS Defender alerts if it finds configs with those leaked keys. Quite useful
Is it possible that Broadcom has spotted these same attacks earlier?
Or ASEC: https://asec.ahnlab.com/en/85088/
They go in more detail, but mention ASP.NET environments with vulnerable configurations.
Unfortunately, I don't know enough about ASP.NET to make an educated guess whether these attacks could be related.
@buherator @GossiTheDog There's long list of "default" secret keys used for JWT and session cookies collected in various github projects. On Ruby on Rails, Django the secret session key can lead to RCE through unmarshalling. JWT can give you admin role etc.
@zeljkazorz @buherator @GossiTheDog ASEC's appears to be the closest and I'm trying to determine if Godzilla (web shell) and Godzilla (post-exploitation framework) are one and the same.
This is the web shell version https://github.com/BeichenDream/Godzilla frequently referenced
@buherator@infosec.place @GossiTheDog @screaminggoat
Symantec says their protection bulletin was prompted by the AhnLab blog post.
I believe @buherator is right. Whether Microsoft found a continuation of the same campaign, with a slightly different approach / toolset, is impossible to tell.
Judging by the capabilities provided by the Godzilla post-exploitation framework and the Godzilla webshell, I wold venture to say that they are one and the same, only Microsoft used that particular expression (and did not elaborate on it, which means they expect the readers to be familiar with it already - i.e., it's known and documented).
@buherator @GossiTheDog Yep, quite a few CTF repos in here.