Skip to main content

Exploitation of Leaked Machine Keys by Initial Access Broker

Medium
Published: Wed Jul 09 2025 (07/09/2025, 13:25:55 UTC)
Source: AlienVault OTX General

Description

An initial access broker exploited leaked Machine Keys on ASP.NET sites to gain unauthorized access to organizations. The group, tracked as TGR-CRI-0045, targeted industries in Europe and the U.S. including finance, manufacturing, and technology. They used ASP.NET View State deserialization to execute malicious payloads in server memory, minimizing forensic artifacts. The attackers deployed post-exploitation tools for persistence and privilege escalation. The campaign began in October 2024, with increased activity from January to March 2025. Organizations are advised to review and remediate compromised Machine Keys following Microsoft's guidance. The threat group is possibly linked to Gold Melody based on overlapping indicators and tactics.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:54:37 UTC

Technical Analysis

This threat involves an initial access broker group identified as TGR-CRI-0045 exploiting leaked Machine Keys from ASP.NET web applications to gain unauthorized access to targeted organizations. Machine Keys in ASP.NET are cryptographic keys used to protect View State data, authentication tokens, and other sensitive information. If these keys are leaked or compromised, attackers can manipulate or forge View State data, enabling deserialization attacks that execute arbitrary code in server memory. The attackers leverage ASP.NET View State deserialization vulnerabilities to run malicious payloads directly in memory, which reduces forensic footprints and complicates detection. After initial access, the threat actors deploy post-exploitation tools to maintain persistence and escalate privileges within the compromised environment. The campaign, active since October 2024 with heightened activity from January to March 2025, targets industries including finance, manufacturing, and technology sectors primarily in Europe and the United States. The group’s tactics and indicators overlap with those attributed to the Gold Melody threat actor, suggesting possible linkage. The exploitation technique focuses on abusing leaked cryptographic keys rather than exploiting software vulnerabilities directly, making traditional patching ineffective. Organizations are advised to audit and rotate Machine Keys following Microsoft's remediation guidance to invalidate compromised keys and prevent further exploitation. Indicators of compromise include multiple IP addresses and file hashes associated with the attack infrastructure and payloads. The attack chain involves initial access via crafted View State payloads, in-memory execution of malicious code, and subsequent lateral movement and privilege escalation using known techniques such as token manipulation and service persistence. The threat leverages IIS-hosted ASP.NET applications, which are prevalent in enterprise environments, making this a significant risk vector for organizations relying on this technology stack.

Potential Impact

For European organizations, the exploitation of leaked Machine Keys poses a substantial risk to confidentiality, integrity, and availability of critical systems. Successful exploitation allows attackers to bypass authentication mechanisms, execute arbitrary code in memory, and maintain stealthy persistence. This can lead to unauthorized data access, theft of intellectual property, disruption of business operations, and potential regulatory non-compliance under GDPR due to data breaches. The targeted sectors—finance, manufacturing, and technology—are vital to the European economy and infrastructure, amplifying the potential economic and reputational damage. The in-memory execution and minimal forensic artifacts complicate incident detection and response, increasing dwell time and potential damage. Additionally, the use of post-exploitation tools for privilege escalation can enable attackers to move laterally and compromise additional systems, escalating the scope of impact. Given the campaign’s ongoing activity and targeting of European entities, organizations face an elevated threat environment requiring immediate attention to secure ASP.NET applications and cryptographic assets.

Mitigation Recommendations

1. Immediately audit all ASP.NET applications for exposure of Machine Keys, including checking source code repositories, configuration files, and deployment pipelines for accidental leaks. 2. Rotate and regenerate Machine Keys following Microsoft's official guidance to invalidate any leaked keys and prevent their reuse by attackers. 3. Implement strict access controls and encryption for configuration files and secrets management to protect cryptographic keys. 4. Enable and monitor ASP.NET View State MAC validation to detect tampering attempts and reject invalid View State data. 5. Deploy runtime application self-protection (RASP) or Web Application Firewalls (WAF) configured to detect and block malicious View State deserialization payloads. 6. Enhance logging and monitoring for IIS and ASP.NET applications focusing on unusual deserialization events, process injections, and anomalous network connections. 7. Conduct threat hunting exercises using the provided IoCs (IP addresses, hashes) to identify potential compromises. 8. Harden post-exploitation detection by monitoring for privilege escalation techniques such as token manipulation and service creation. 9. Educate development and operations teams on secure handling of cryptographic keys and secure coding practices to prevent future leaks. 10. Regularly update and patch IIS and ASP.NET frameworks to mitigate other potential vulnerabilities that could be chained with this attack.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/initial-access-broker-exploits-leaked-machine-keys/"]
Adversary
TGR-CRI-0045
Pulse Id
686e6de3779dc49cad71265b
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip194.5.82.11
ip190.211.254.95
ip109.176.229.89
ip169.150.198.91
ip194.114.136.95
ip195.123.240.233
ip213.252.232.237
ip67.43.234.96
ip98.159.108.69

Hash

ValueDescriptionCopy
hash106506ebc7156be116fe5d2a4d662917ddbbfb286007b6ee7a2b01c9536b1ee4
hash18a90b3702776b23f87738b26002e013301f60d9801d83985a57664b133cadd1
hash52a72f899991506d2b1df958dd8736f7baa26592d664b771c3c3dbaef8d3114a
hash55656f7b2817087183ceedeb4d9b78d3abee02409666bffbe180d6ea87ee20fb
hash87bd7e24af5f10fe1e01cfa640ce26e9160b0e0e13488d7ee655e83118d16697
hashb3c085672ac34f1b738879096af5fcd748953116e319367e6e371034366eaeca
hashc1f66cadc1941b566e2edad0d1f288c93bf060eef383c79638306638b6cefdf8
hashd3767be11d9b211e74645bf434c9a5974b421cb96ec40d856f4b232a5ef9e56d
hashd4bfaf3fd3d3b670f585114b4619aaf9b10173c5b1e92d42be0611b6a9b1eff2
hashd5d0772cb90d54ac3e3093c1ea9fcd7b878663f7ddd1f96efea0725ce47d46d5
hashf368ec59fb970cc23f955f127016594e2c72de168c776ae8a3f9c21681860e9c

Url

ValueDescriptionCopy
urlhttp://195.123.240.233:443/atm

Threat ID: 686e71156f40f0eb7203f20f

Added to database: 7/9/2025, 1:39:33 PM

Last enriched: 7/9/2025, 1:54:37 PM

Last updated: 7/9/2025, 4:33:12 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats