Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Posted on July 9, 2025July 9, 2025 By CWS

Jul 09, 2025Ravie LakshmananCyber Menace / Malware
The Preliminary Entry Dealer (IAB) referred to as Gold Melody has been attributed to a marketing campaign that exploits leaked ASP.NET machine keys to acquire unauthorized entry to organizations and peddle that entry to different menace actors.
The exercise is being tracked by Palo Alto Networks Unit 42 below the moniker TGR-CRI-0045, the place “TGR” stands for “momentary group” and “CRI” refers to legal motivation. The hacking group is also referred to as Prophet Spider and UNC961, with considered one of its instruments additionally utilized by an preliminary entry dealer referred to as ToyMaker.
“The group appears to observe an opportunistic method however has attacked organizations in Europe and the U.S. within the following industries: monetary companies, manufacturing, wholesale and retail, excessive know-how, and transportation and logistics,” researchers Tom Marsden and Chema Garcia mentioned.

The abuse of ASP.NET machine keys within the wild was first documented by Microsoft in February 2025, with the corporate noting that it had recognized over 3,000 such publicly disclosed keys that may very well be weaponized for ViewState code injection assaults, in the end resulting in arbitrary code execution.
The primary signal of those assaults was detected by the Home windows maker in December 2024, when an unknown adversary leveraged a publicly accessible, static ASP.NET machine key to inject malicious code and ship the Godzilla post-exploitation framework.
Unit 42’s evaluation exhibits that the TGR-CRI-0045 is following the same modus operandi, using the leaked keys to signal malicious payloads that present unauthorized entry to focused servers, a method referred to as ASP.NET ViewState deserialization.
“This system enabled the IAB to execute malicious payloads instantly in server reminiscence, minimizing their on-disk presence and leaving few forensic artifacts, making detection tougher,” the cybersecurity firm mentioned, including it discovered proof of earliest exploitation in October 2024.Not like conventional internet shell implants or file-based payloads, this memory-resident method bypasses many legacy EDR options that depend on file system or course of tree artifacts. Organizations relying solely on file integrity monitoring or antivirus signatures might fully miss the intrusion, making it vital to implement behavioral detections primarily based on anomalous IIS request patterns, little one processes spawned by w3wp.exe, or sudden adjustments in .NET software conduct.

A major spike in exercise is claimed to have been detected between late January and March 2025, throughout which interval the assaults led to the deployment of post-exploitation instruments resembling open-source port scanners and bespoke C# applications like updf for native privilege escalation.
In no less than two incidents noticed by Unit 42, the assaults are characterised by command shell execution originating from Web Info Providers (IIS) internet servers. One other notable facet is the possible use of an open-source .NET deserialization payload generator referred to as ysoserial.internet and ViewState plugin to construct the payloads.

These payloads bypass ViewState protections and set off the execution of a .NET meeting in reminiscence. 5 completely different IIS modules have been recognized as loaded into reminiscence up to now –

Cmd /c, which is used to passing a command to be executed to the system’s command shell and execute arbitrary directions on the server
File add, which permits for importing recordsdata to the server by specifying a goal file path and a byte buffer containing the file’s contents
Winner, which is probably going a test for profitable exploitation
File obtain (not recovered), which seems to be a downloader that permits an attacker to retrieve delicate knowledge from the compromised server
Reflective loader (not recovered), which seemingly acts as a reflective loader to dynamically load and execute extra .NET assemblies in reminiscence with out leaving a path

“Between October 2024 and January 2025, the menace actor’s exercise primarily centered on exploiting techniques, deploying modules — just like the exploit checker — and performing fundamental shell reconnaissance,” Unit 42 mentioned. “Submit-exploitation exercise has primarily concerned reconnaissance of the compromised host and surrounding community.”
A few of the different instruments downloaded onto the techniques embody an ELF binary named atm from an exterior server (“195.123.240[.]233:443”) and a Golang port scanner referred to as TXPortMap to map out the inner community and determine potential exploitation targets.
“TGR-CRI-0045 makes use of a simplistic method to ViewState exploitation, loading a single, stateless meeting instantly,” the researchers famous. “Every command execution requires re-exploitation and re-uploading the meeting (e.g., operating the file add meeting a number of instances).”
“Exploiting ASP.NET View State deserialization vulnerabilities by way of uncovered Machine Keys permits minimal on-disk presence and permits long-term entry. The group’s opportunistic concentrating on and ongoing device growth spotlight the necessity for organizations to prioritize figuring out and remediating compromised Machine Keys.”This marketing campaign additionally highlights a broader class of cryptographic key publicity threats, together with weak machineKey technology insurance policies, lacking MAC validation, and insecure defaults in older ASP.NET purposes. Increasing inner menace fashions to incorporate cryptographic integrity dangers, ViewState MAC tampering, and IIS middleware abuse will help organizations construct extra resilient AppSec and id safety methods.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Access, ASP.NET, Exploits, Exposed, Gold, IAB, Keys, Machine, Melody, Targets, Unauthorized

Post navigation

Previous Post: Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors 
Next Post: How to Manage Security Patches in Organizations

Related Posts

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware The Hacker News
Security Tools Alone Don’t Protect You — Control Effectiveness Does The Hacker News
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign The Hacker News
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server The Hacker News
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
  • McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
  • Microsoft Confirms Teams Outage for Users, Investigation Underway
  • How to Manage Security Patches in Organizations
  • Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
  • McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
  • Microsoft Confirms Teams Outage for Users, Investigation Underway
  • How to Manage Security Patches in Organizations
  • Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News