Exploitation of Leaked Machine Keys by Initial Access Broker
An initial access broker exploited leaked Machine Keys on ASP.NET sites to gain unauthorized access to organizations. The group, tracked as TGR-CRI-0045, targeted industries in Europe and the U.S. including finance, manufacturing, and technology. They used ASP.NET View State deserialization to execute malicious payloads in server memory, minimizing forensic artifacts. The attackers deployed post-exploitation tools for persistence and privilege escalation. The campaign began in October 2024, with increased activity from January to March 2025. Organizations are advised to review and remediate compromised Machine Keys following Microsoft's guidance. The threat group is possibly linked to Gold Melody based on overlapping indicators and tactics.
AI Analysis
Technical Summary
This threat involves an initial access broker group identified as TGR-CRI-0045 exploiting leaked Machine Keys from ASP.NET web applications to gain unauthorized access to targeted organizations. Machine Keys in ASP.NET are cryptographic keys used to protect View State data, authentication tokens, and other sensitive information. If these keys are leaked or compromised, attackers can manipulate or forge View State data, enabling deserialization attacks that execute arbitrary code in server memory. The attackers leverage ASP.NET View State deserialization vulnerabilities to run malicious payloads directly in memory, which reduces forensic footprints and complicates detection. After initial access, the threat actors deploy post-exploitation tools to maintain persistence and escalate privileges within the compromised environment. The campaign, active since October 2024 with heightened activity from January to March 2025, targets industries including finance, manufacturing, and technology sectors primarily in Europe and the United States. The group’s tactics and indicators overlap with those attributed to the Gold Melody threat actor, suggesting possible linkage. The exploitation technique focuses on abusing leaked cryptographic keys rather than exploiting software vulnerabilities directly, making traditional patching ineffective. Organizations are advised to audit and rotate Machine Keys following Microsoft's remediation guidance to invalidate compromised keys and prevent further exploitation. Indicators of compromise include multiple IP addresses and file hashes associated with the attack infrastructure and payloads. The attack chain involves initial access via crafted View State payloads, in-memory execution of malicious code, and subsequent lateral movement and privilege escalation using known techniques such as token manipulation and service persistence. The threat leverages IIS-hosted ASP.NET applications, which are prevalent in enterprise environments, making this a significant risk vector for organizations relying on this technology stack.
Potential Impact
For European organizations, the exploitation of leaked Machine Keys poses a substantial risk to confidentiality, integrity, and availability of critical systems. Successful exploitation allows attackers to bypass authentication mechanisms, execute arbitrary code in memory, and maintain stealthy persistence. This can lead to unauthorized data access, theft of intellectual property, disruption of business operations, and potential regulatory non-compliance under GDPR due to data breaches. The targeted sectors—finance, manufacturing, and technology—are vital to the European economy and infrastructure, amplifying the potential economic and reputational damage. The in-memory execution and minimal forensic artifacts complicate incident detection and response, increasing dwell time and potential damage. Additionally, the use of post-exploitation tools for privilege escalation can enable attackers to move laterally and compromise additional systems, escalating the scope of impact. Given the campaign’s ongoing activity and targeting of European entities, organizations face an elevated threat environment requiring immediate attention to secure ASP.NET applications and cryptographic assets.
Mitigation Recommendations
1. Immediately audit all ASP.NET applications for exposure of Machine Keys, including checking source code repositories, configuration files, and deployment pipelines for accidental leaks. 2. Rotate and regenerate Machine Keys following Microsoft's official guidance to invalidate any leaked keys and prevent their reuse by attackers. 3. Implement strict access controls and encryption for configuration files and secrets management to protect cryptographic keys. 4. Enable and monitor ASP.NET View State MAC validation to detect tampering attempts and reject invalid View State data. 5. Deploy runtime application self-protection (RASP) or Web Application Firewalls (WAF) configured to detect and block malicious View State deserialization payloads. 6. Enhance logging and monitoring for IIS and ASP.NET applications focusing on unusual deserialization events, process injections, and anomalous network connections. 7. Conduct threat hunting exercises using the provided IoCs (IP addresses, hashes) to identify potential compromises. 8. Harden post-exploitation detection by monitoring for privilege escalation techniques such as token manipulation and service creation. 9. Educate development and operations teams on secure handling of cryptographic keys and secure coding practices to prevent future leaks. 10. Regularly update and patch IIS and ASP.NET frameworks to mitigate other potential vulnerabilities that could be chained with this attack.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
Indicators of Compromise
- ip: 194.5.82.11
- ip: 190.211.254.95
- hash: 106506ebc7156be116fe5d2a4d662917ddbbfb286007b6ee7a2b01c9536b1ee4
- hash: 18a90b3702776b23f87738b26002e013301f60d9801d83985a57664b133cadd1
- hash: 52a72f899991506d2b1df958dd8736f7baa26592d664b771c3c3dbaef8d3114a
- hash: 55656f7b2817087183ceedeb4d9b78d3abee02409666bffbe180d6ea87ee20fb
- hash: 87bd7e24af5f10fe1e01cfa640ce26e9160b0e0e13488d7ee655e83118d16697
- hash: b3c085672ac34f1b738879096af5fcd748953116e319367e6e371034366eaeca
- hash: c1f66cadc1941b566e2edad0d1f288c93bf060eef383c79638306638b6cefdf8
- hash: d3767be11d9b211e74645bf434c9a5974b421cb96ec40d856f4b232a5ef9e56d
- hash: d4bfaf3fd3d3b670f585114b4619aaf9b10173c5b1e92d42be0611b6a9b1eff2
- hash: d5d0772cb90d54ac3e3093c1ea9fcd7b878663f7ddd1f96efea0725ce47d46d5
- hash: f368ec59fb970cc23f955f127016594e2c72de168c776ae8a3f9c21681860e9c
- ip: 109.176.229.89
- ip: 169.150.198.91
- ip: 194.114.136.95
- ip: 195.123.240.233
- ip: 213.252.232.237
- ip: 67.43.234.96
- ip: 98.159.108.69
- url: http://195.123.240.233:443/atm
Exploitation of Leaked Machine Keys by Initial Access Broker
Description
An initial access broker exploited leaked Machine Keys on ASP.NET sites to gain unauthorized access to organizations. The group, tracked as TGR-CRI-0045, targeted industries in Europe and the U.S. including finance, manufacturing, and technology. They used ASP.NET View State deserialization to execute malicious payloads in server memory, minimizing forensic artifacts. The attackers deployed post-exploitation tools for persistence and privilege escalation. The campaign began in October 2024, with increased activity from January to March 2025. Organizations are advised to review and remediate compromised Machine Keys following Microsoft's guidance. The threat group is possibly linked to Gold Melody based on overlapping indicators and tactics.
AI-Powered Analysis
Technical Analysis
This threat involves an initial access broker group identified as TGR-CRI-0045 exploiting leaked Machine Keys from ASP.NET web applications to gain unauthorized access to targeted organizations. Machine Keys in ASP.NET are cryptographic keys used to protect View State data, authentication tokens, and other sensitive information. If these keys are leaked or compromised, attackers can manipulate or forge View State data, enabling deserialization attacks that execute arbitrary code in server memory. The attackers leverage ASP.NET View State deserialization vulnerabilities to run malicious payloads directly in memory, which reduces forensic footprints and complicates detection. After initial access, the threat actors deploy post-exploitation tools to maintain persistence and escalate privileges within the compromised environment. The campaign, active since October 2024 with heightened activity from January to March 2025, targets industries including finance, manufacturing, and technology sectors primarily in Europe and the United States. The group’s tactics and indicators overlap with those attributed to the Gold Melody threat actor, suggesting possible linkage. The exploitation technique focuses on abusing leaked cryptographic keys rather than exploiting software vulnerabilities directly, making traditional patching ineffective. Organizations are advised to audit and rotate Machine Keys following Microsoft's remediation guidance to invalidate compromised keys and prevent further exploitation. Indicators of compromise include multiple IP addresses and file hashes associated with the attack infrastructure and payloads. The attack chain involves initial access via crafted View State payloads, in-memory execution of malicious code, and subsequent lateral movement and privilege escalation using known techniques such as token manipulation and service persistence. The threat leverages IIS-hosted ASP.NET applications, which are prevalent in enterprise environments, making this a significant risk vector for organizations relying on this technology stack.
Potential Impact
For European organizations, the exploitation of leaked Machine Keys poses a substantial risk to confidentiality, integrity, and availability of critical systems. Successful exploitation allows attackers to bypass authentication mechanisms, execute arbitrary code in memory, and maintain stealthy persistence. This can lead to unauthorized data access, theft of intellectual property, disruption of business operations, and potential regulatory non-compliance under GDPR due to data breaches. The targeted sectors—finance, manufacturing, and technology—are vital to the European economy and infrastructure, amplifying the potential economic and reputational damage. The in-memory execution and minimal forensic artifacts complicate incident detection and response, increasing dwell time and potential damage. Additionally, the use of post-exploitation tools for privilege escalation can enable attackers to move laterally and compromise additional systems, escalating the scope of impact. Given the campaign’s ongoing activity and targeting of European entities, organizations face an elevated threat environment requiring immediate attention to secure ASP.NET applications and cryptographic assets.
Mitigation Recommendations
1. Immediately audit all ASP.NET applications for exposure of Machine Keys, including checking source code repositories, configuration files, and deployment pipelines for accidental leaks. 2. Rotate and regenerate Machine Keys following Microsoft's official guidance to invalidate any leaked keys and prevent their reuse by attackers. 3. Implement strict access controls and encryption for configuration files and secrets management to protect cryptographic keys. 4. Enable and monitor ASP.NET View State MAC validation to detect tampering attempts and reject invalid View State data. 5. Deploy runtime application self-protection (RASP) or Web Application Firewalls (WAF) configured to detect and block malicious View State deserialization payloads. 6. Enhance logging and monitoring for IIS and ASP.NET applications focusing on unusual deserialization events, process injections, and anomalous network connections. 7. Conduct threat hunting exercises using the provided IoCs (IP addresses, hashes) to identify potential compromises. 8. Harden post-exploitation detection by monitoring for privilege escalation techniques such as token manipulation and service creation. 9. Educate development and operations teams on secure handling of cryptographic keys and secure coding practices to prevent future leaks. 10. Regularly update and patch IIS and ASP.NET frameworks to mitigate other potential vulnerabilities that could be chained with this attack.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/initial-access-broker-exploits-leaked-machine-keys/"]
- Adversary
- TGR-CRI-0045
- Pulse Id
- 686e6de3779dc49cad71265b
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip194.5.82.11 | — | |
ip190.211.254.95 | — | |
ip109.176.229.89 | — | |
ip169.150.198.91 | — | |
ip194.114.136.95 | — | |
ip195.123.240.233 | — | |
ip213.252.232.237 | — | |
ip67.43.234.96 | — | |
ip98.159.108.69 | — |
Hash
Value | Description | Copy |
---|---|---|
hash106506ebc7156be116fe5d2a4d662917ddbbfb286007b6ee7a2b01c9536b1ee4 | — | |
hash18a90b3702776b23f87738b26002e013301f60d9801d83985a57664b133cadd1 | — | |
hash52a72f899991506d2b1df958dd8736f7baa26592d664b771c3c3dbaef8d3114a | — | |
hash55656f7b2817087183ceedeb4d9b78d3abee02409666bffbe180d6ea87ee20fb | — | |
hash87bd7e24af5f10fe1e01cfa640ce26e9160b0e0e13488d7ee655e83118d16697 | — | |
hashb3c085672ac34f1b738879096af5fcd748953116e319367e6e371034366eaeca | — | |
hashc1f66cadc1941b566e2edad0d1f288c93bf060eef383c79638306638b6cefdf8 | — | |
hashd3767be11d9b211e74645bf434c9a5974b421cb96ec40d856f4b232a5ef9e56d | — | |
hashd4bfaf3fd3d3b670f585114b4619aaf9b10173c5b1e92d42be0611b6a9b1eff2 | — | |
hashd5d0772cb90d54ac3e3093c1ea9fcd7b878663f7ddd1f96efea0725ce47d46d5 | — | |
hashf368ec59fb970cc23f955f127016594e2c72de168c776ae8a3f9c21681860e9c | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://195.123.240.233:443/atm | — |
Threat ID: 686e71156f40f0eb7203f20f
Added to database: 7/9/2025, 1:39:33 PM
Last enriched: 7/9/2025, 1:54:37 PM
Last updated: 7/9/2025, 4:33:12 PM
Views: 7
Related Threats
Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates
MediumSpyware Targets Employees via Weaponized Word Documents Delivering Malware Payloads
MediumBypassing Live HTML Filtering to Trigger Stored XSS – DOM-Based Exploitation
MediumThreatFox IOCs for 2025-07-08
MediumPakistan’s APT36 Transparent Tribe Targets Indian Defense Sector with New Linux Malware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.