<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>aeolus (Posts by CISA)</title><link>https://yieldsfalsehood.com/aeolus/</link><description></description><atom:link href="https://yieldsfalsehood.com/aeolus/sources/cisa.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2025 &lt;a href="mailto:elliot@yieldsfalsehood.com"&gt;elliot&lt;/a&gt; </copyright><lastBuildDate>Thu, 07 Aug 2025 12:04:18 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>CISA Issues Alert on Vulnerability affecting Microsoft Exchange</title><link>https://yieldsfalsehood.com/aeolus/posts/cisa-issues-alert-on-vulnerability-affecting-microsoft-exchange-c1ee672d/</link><dc:creator>CISA</dc:creator><description></description><guid>https://yieldsfalsehood.com/aeolus/posts/cisa-issues-alert-on-vulnerability-affecting-microsoft-exchange-c1ee672d/</guid><pubDate>Wed, 06 Aug 2025 12:00:00 GMT</pubDate></item><item><title>CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities</title><link>https://yieldsfalsehood.com/aeolus/posts/cisa-releases-malware-analysis-report-associated-with-microsoft-sharepoint-vulnerabilities-6707d2c8/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2025-49704" target="_blank" title="CVE-2025-49704"&gt;CVE-2025-49704&lt;/a&gt; [&lt;a href="https://cwe.mitre.org/data/definitions/94.html" target="_blank" title="CWE 94"&gt;CWE-94: Code Injection&lt;/a&gt;],&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord/SearchResults?query=CVE-2025-49706" target="_blank" title="CVE-2025-49706"&gt;CVE-2025-49706&lt;/a&gt; [&lt;a href="https://cwe.mitre.org/data/definitions/287.html" target="_blank" title="CWE 287"&gt;CWE-287: Improper Authentication&lt;/a&gt;],&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-53770" target="_blank" title="CVE-2025-53770"&gt;CVE-2025-53770&lt;/a&gt; [&lt;a href="https://cwe.mitre.org/data/definitions/502.html" target="_blank" title="CWE 502"&gt;CWE-502: Deserialization of Untrusted Data&lt;/a&gt;], and&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-53771" target="_blank" title="CVE-2025-53771"&gt;CVE-2025-53771&lt;/a&gt; [&lt;a href="https://cwe.mitre.org/data/definitions/287.html" target="_blank" title="CWE 287"&gt;CWE-287: Improper Authentication&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Cyber threat actors have chained CVE-2025-49704 and CVE-2025-49706 (in an exploit chain publicly known as “ToolShell”) to gain unauthorized access to on-premises SharePoint servers. CISA analyzed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.  &lt;/p&gt;
&lt;p&gt;CISA added CVE-2025-49704 and CVE-2025-49706 to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="KEV Catalog"&gt;Known Exploited Vulnerabilities Catalog&lt;/a&gt; on July 22, 2025, and CVE-2025-53770 on July 20, 2025.&lt;/p&gt;
&lt;p&gt;CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this MAR to identify malware.&lt;/p&gt;
&lt;p&gt;Downloadable copy of IOCs associated with this malware:&lt;/p&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/MAR-251132.c1.v1.CLEAR_stix2.json" target="_blank"&gt;MAR-251132.c1.v1.CLEAR_stix2&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(JSON,       84.95 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Downloadable copies of the SIGMA rule associated with this malware:&lt;/p&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_1_CVE_2025_53770_ToolShell_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132 1&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       4.22 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_2_CVE_2025_53770_ToolShell_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132 2&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       2.86 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_CVE_2025_53770_ToolShell_IOCs_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       5.55 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;For more information on the malware files and YARA rules for detection, see &lt;a href="https://www.cisa.gov/news-events/analysis-reports/ar25-218a?utm_source=MAR&amp;amp;utm_medium=AlertAdvisory" title="MAR-251132.c1.v1"&gt;MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer:  &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. &lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/cisa-releases-malware-analysis-report-associated-with-microsoft-sharepoint-vulnerabilities-6707d2c8/</guid><pubDate>Wed, 06 Aug 2025 12:00:00 GMT</pubDate></item><item><title>MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities</title><link>https://yieldsfalsehood.com/aeolus/posts/mar-251132-c1-v1-exploitation-of-sharepoint-vulnerabilities-8de2a906/</link><dc:creator>CISA</dc:creator><description>&lt;h3&gt;Notification&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;p&gt;This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.&lt;/p&gt;
&lt;p&gt;This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Summary&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;CISA received six files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [CWE-94: Code Injection], CVE-2025-49706 [CWE-287: Improper Authentication], CVE-2025-53770 [CWE-502: Deserialization of Trusted Data], and CVE-2025-53771 [CWE-287: Improper Authentication]. According to Microsoft, cyber threat actors have chained CVE-2025-49706 (a network spoofing vulnerability) and CVE-2025-49704 (a remote code execution (RCE) vulnerability) in an exploit chain known as “ToolShell” to gain unauthorized access to on-premise SharePoint servers. Microsoft has not confirmed exploitation of CVE-2025-53771; however, CISA assesses exploitation is likely because it can be chained with CVE-2025-53770 to bypass previously disclosed vulnerabilities CVE-2025-49704 and &lt;br&gt;CVE-2025-49706. &lt;br&gt;&lt;br&gt;The analysis includes two Base64 encoded .NET Dynamic-link Library (DLL) binaries and four Active Server Page Extended [ASPX] files. The decoded DLLs are designed to retrieve machine key settings within an ASP[.]NET application's configuration and add the retrieved machine key values to the Hypertext Transfer Protocol (HTTP) response header. &lt;br&gt;&lt;br&gt;The first ASPX file is used to retrieve and output machine key information from an ASP[.]NET application’s configuration. The next ASPX file contains a command-line instruction used to execute a PowerShell command. The PowerShell command is designed to Base64 decode and install a malicious ASPX webshell on disk. The webshell is used to handle various web-related operations, including setting and retrieving HTTP cookies, command execution and uploading files. The remaining two ASPX webshells are used to execute a command using PowerShell on the server. &lt;br&gt;&lt;br&gt;CISA encourages organizations to use the indicators of compromise (IOCs) and detection signatures in this Malware Analysis Report to identify malware samples. For more information on these CVEs, see CISA Alert &lt;a href="https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities"&gt;Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Download the PDF version of this report:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/MAR-251132.c1.v1.CLEAR_.pdf" target="_blank"&gt;MAR-251132.c1.v1&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(PDF,       2.03 MB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For a downloadable copy of IOCs associated with this MAR, see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/MAR-251132.c1.v1.CLEAR_stix2.json" target="_blank"&gt;MAR-251132.c1.v1.CLEAR_stix2&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(JSON,       84.95 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For a downloadable copy of the SIGMA rules associated with this MAR, see version in .pdf or .yaml format: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_CVE_2025_53770_ToolShell_IOCs_TLP_CLEAR.pdf" target="_blank"&gt;CMA_SIGMA_251132_CVE_2025_53770_ToolShell_IOCs&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(PDF,       42.50 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_CVE_2025_53770_ToolShell_IOCs_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       5.55 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_1_CVE_2025_53770_ToolShell_TLP_CLEAR.pdf" target="_blank"&gt;CMA_SIGMA_251132_1_CVE_2025_53770_ToolShell&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(PDF,       41.03 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_1_CVE_2025_53770_ToolShell_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132 1&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       4.22 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_2_CVE_2025_53770_ToolShell_TLP_CLEAR.pdf" target="_blank"&gt;CMA_SIGMA_251132_2_CVE_2025_53770_ToolShell&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(PDF,       39.79 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/CMA_SIGMA_251132_2_CVE_2025_53770_ToolShell_TLP_CLEAR.yaml" target="_blank"&gt;CMA SIGMA 251132 2&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(YAML,       2.86 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;Submitted Files (6)&lt;/h5&gt;
&lt;p&gt;3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997 (osvmhdfl.dll)&lt;/p&gt;
&lt;p&gt;60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7 (stage3.txt)&lt;/p&gt;
&lt;p&gt;92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514 (spinstall0.aspx)&lt;/p&gt;
&lt;p&gt;9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7 (info3.aspx)&lt;/p&gt;
&lt;p&gt;d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170 (spinstallp.aspx)&lt;/p&gt;
&lt;p&gt;d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00 (spinstallb.aspx)&lt;/p&gt;
&lt;h5&gt;Additional Files (2)&lt;/h5&gt;
&lt;p&gt;675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc (info3.aspx)&lt;/p&gt;
&lt;p&gt;bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72 (bjcloiyq.dll)&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Findings&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7&lt;/h4&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;stage3.txt&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;15893 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;ASCII text, with very long lines&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;921ac86b258fa9ea3da4c39462bad782&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;b8662c8cc9e383b4a0ac980e0fd94941fe12c31d&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;6fd128a33e432d8fd5ea5dcf419a0b90f09648d7b4b95ceb6a5634fc01d8e0613d6d231bc038e2796f6a4d8fc277ebbea7b90ab773c0020dd2ad67149e52e4ff&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;384:AQG6NVJiZbXhKth3s0bA2rhvhundOXz5D:AQG6NVJmbX0h3zs21vsndO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;4.902435&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_01 : steals_authentication_credentials exfiltrates_data&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250724_721"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "steals-authentication-credentials exfiltrates-data"&lt;br&gt;       malware_type = "unknown"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects Encoded .Net DLL samples"&lt;br&gt;       sha256_1 = "60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 4E 62 32 52 6C 41 46 4E 30 63 6D 6C 75 5A 77 42 44 62 32 35 6A 59 58 51 }&lt;br&gt;       $s1 = { 41 45 41 55 77 42 30 41 48 49 41 61 51 42 75 41 47 63 41 52 67 42 70 41 }&lt;br&gt;       $s2 = { 59 58 52 76 63 6D 41 79 57 31 74 54 65 58 4E 30 5A 57 30 75 51 6E 6C 30 }&lt;br&gt;       $s3 = { 4A 7A 61 57 39 75 50 54 51 75 4D 43 34 77 4C 6A 41 73 49 45 4E 31 62 48 }&lt;br&gt;       $s4 = { 43 42 57 5A 58 4A 7A 61 57 39 75 50 54 51 75 4D 43 34 77 4C 6A 41 73 49 }&lt;br&gt;       $s5 = { 4D 54 6B 7A 4E 47 55 77 4F 44 6C 64 58 53 42 48 5A 58 52 46 62 6E 56 74 }&lt;br&gt;       $s6 = { 5A 58 4A 68 64 47 39 79 4B 43 6B 49 41 41 41 41 43 67 46 }&lt;br&gt;       $s7 = { 54 65 58 4E 30 5A 57 30 75 52 6E 56 75 59 32 41 79 57 31 }&lt;br&gt;       $s8 = { 74 54 65 58 4E 30 5A 57 30 75 51 32 39 73 62 47 56 6A 64 47 6C 76 62 6E 4D 75 52 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;                             ## CISA Code &amp;amp; Media Analysis ##&lt;/p&gt;
&lt;p&gt;                           ############ README ###############&lt;br&gt;## Edit rules and queries as needed for your hunt and based on your environment.&lt;br&gt;## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. &lt;br&gt;## Do not edit "logsource-product:" unless you are editing this rule to meet specific logsources/fields and know your environment.&lt;br&gt;## TLP GREEN + Please use local installation of Sigma to convert this rule.&lt;br&gt;## TLP CLEAR may convert rules using online converter of choice.&lt;br&gt;                           ###################################&lt;/p&gt;
&lt;p&gt;title: Detects ToolShell CVE-2025-53770 Exploitation IOCs and Activity&lt;br&gt;incident: 251133.r1&lt;br&gt;tlp: CLEAR&lt;br&gt;id: aba8967f-6613-47a8-87d1-e5d7aae31e9b&lt;br&gt;status: test&lt;br&gt;description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Previous related CVEs are CVE-2025-49706 and CVE-2025-49704. CVE-2025-53770 is new and stealthy webshell called SharpyShell, that extracts and leaks cryptographic secrets from the SharePoint server using a simple GET request.&lt;br&gt;references:&lt;br&gt;   - https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770&lt;br&gt;   - https://research.eye.security/sharepoint-under-siege/&lt;br&gt;   - https://x.com/codewhitesec/status/1944743478350557232/photo/1&lt;br&gt;   - 251132.r1&lt;br&gt;author: CISA Code &amp;amp; Media Analysis&lt;br&gt;date: 2025-07-21&lt;br&gt;modified: 2025-07-22&lt;br&gt;tags: &lt;br&gt;   - cve.2025.53770&lt;br&gt;logsource:&lt;br&gt;   product: cma&lt;br&gt;detection:&lt;br&gt;   keywords:&lt;br&gt;       - '92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514'        &lt;br&gt;       - '107.191.58.76'&lt;br&gt;       - '104.238.159.149'&lt;br&gt;       - '96.9.125.147'&lt;br&gt;       - 'Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64;+rv:120.0)+Gecko/20100101+Firefox/120.0 /_layouts/SignOut.aspx'&lt;br&gt;       - '-EncodedCommand JABiAGEAcwBlADYANABTAHQAcgBpAG4AZwAgAD0'&lt;br&gt;       - 'TEMPLATE\LAYOUTS\spinstall0.aspx'        &lt;br&gt;       - '/_layouts/15/ToolPane.aspx DisplayMode=Edit'&lt;br&gt;       - '/_layouts/15/spinstall0.aspx'&lt;br&gt;       - 'spinstall'&lt;br&gt;       - 'yoserial'&lt;/p&gt;
&lt;p&gt;   keywords_1:&lt;br&gt;       - 'POST'&lt;br&gt;       - 'GET'&lt;br&gt;   keywords_2:&lt;br&gt;       - '/_layouts/15/ToolPane.aspx'&lt;br&gt;   keywords_3:&lt;br&gt;       - 'DisplayMode=Edit'&lt;/p&gt;
&lt;p&gt;   keywords_4:&lt;br&gt;       - 'POST'&lt;br&gt;       - 'GET'&lt;br&gt;       - 'curl'              &lt;br&gt;   keywords_5:&lt;br&gt;       - '/_layouts/'&lt;br&gt;       - 'layouts'  &lt;br&gt;   keywords_6:&lt;br&gt;       - 'ToolPane.aspx'&lt;br&gt;       - 'SignOut.aspx'&lt;br&gt;       - 'spinstall'&lt;br&gt;       - 'info3.aspx'&lt;/p&gt;
&lt;p&gt;   keywords_7:&lt;br&gt;       - 'HTTP'&lt;br&gt;   keywords_8:&lt;br&gt;       - 'X-TXT-NET'&lt;/p&gt;
&lt;p&gt;   keywords_9:&lt;br&gt;       - '.exe'&lt;br&gt;   keywords_10:&lt;br&gt;       - '-ap'&lt;br&gt;   keywords_11:&lt;br&gt;       - 'SharePoint'&lt;br&gt;   keywords_12:&lt;br&gt;       - '8080'&lt;br&gt;   keywords_13:&lt;br&gt;       - '.dll'&lt;br&gt;   keywords_14:&lt;br&gt;       - 'pipe'&lt;br&gt;   keywords_15:&lt;br&gt;       - 'inetpub'&lt;br&gt;   keywords_16:&lt;br&gt;       - 'config'&lt;/p&gt;
&lt;p&gt;   keywords_17:&lt;br&gt;       - 'ysoserial'&lt;br&gt;   keywords_18:&lt;br&gt;       - 'ViewState'&lt;br&gt;   keywords_19:&lt;br&gt;       - 'TypeConfuseDelegate'&lt;br&gt;   keywords_20:&lt;br&gt;       - 'powershell'&lt;br&gt;   keywords_21:&lt;br&gt;       - '-EncodedCommand'&lt;/p&gt;
&lt;p&gt;   keywords_22:&lt;br&gt;       - 'BiAGEAcwBlADYANABTAHQAcgBpAG4AZwAgAD0'&lt;br&gt;       - 'base64String='&lt;br&gt;   keywords_23:&lt;br&gt;       - 'BkAGUAYwBvAGQAZQBk'&lt;br&gt;       - 'decoded' &lt;br&gt;   keywords_24:&lt;br&gt;       - 'BGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBn'&lt;br&gt;       - 'FromBase64String'&lt;br&gt;   keywords_25:&lt;br&gt;       - 'cwBwAGkAbgBzAHQAYQBsAGwAMAAuAGEAcwBwAHg'&lt;br&gt;       - 'AuAGEAcwBwAHg'&lt;br&gt;       - 'spinstall0.aspx'&lt;br&gt;       - '.aspx'&lt;/p&gt;
&lt;p&gt;   keywords_26:&lt;br&gt;       - 'V3JpdGUoY2cuVm'&lt;br&gt;   keywords_27:&lt;br&gt;       - 'bisifCIrY2cuRG'     &lt;br&gt;   keywords_28:&lt;br&gt;       - 'mFsaW'&lt;/p&gt;
&lt;p&gt;&lt;br&gt;   condition: keywords or keywords_1 and keywords_2 and keywords_3 or keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 or keywords_9 and keywords_10 and keywords_11 and keywords_12 and keywords_13 and keywords_14 and keywords_15 and keywords_16 or keywords_17 and keywords_18 and keywords_19 and keywords_20 and keywords_21 or keywords_22 and keywords_23 and keywords_24 and keywords_25 or keywords_26 and keywords_27 and keywords_28&lt;/p&gt;
&lt;p&gt;falsepositives:&lt;br&gt;   - Rate of FP moderate with some strings.&lt;br&gt;   - Use this rule in an infected environment/logs.&lt;br&gt;   - Analyst may need to make adjustments to the query as required.&lt;br&gt;level: critical&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Relationships&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;60a37499f9...&lt;/td&gt;
&lt;td&gt;Contains&lt;/td&gt;
&lt;td&gt;bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a data file containing the Base64 encoded .NET DLL "bjcloiyq.dll" (bee94b93c1...).&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure1" height="495" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure1.jpeg?itok=Jhqj-SkT" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 1 - &lt;/strong&gt;Screenshot of a snippet of the data file.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72&lt;/h4&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;bjcloiyq.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;10813 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;0e36ecda6fc4b5661f9a181984a53bb5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;3a438b239d8451b8e12e9cdd3c24d1240dd758c9&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;033f215fde36025a7ce434daddb70304d1e56f2dd2600e18a44d0af825a348fda388ee8fb1d684c2cdd006cdf042005bb26ab67cdf6c5eaac331650ea0ab9422&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;192:fJhh81DzgDZnSxPKgL6YBAxmrFMxmrFARmrF9RmrFj4U0QiKpM9aMg3AxmrFaxmi:xhh81Dz4pSxPKg2YBAxeFMxeFAReF9RL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;4.986214&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_02 : steals_authentication_credentials exfiltrates_data&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250724_721"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "steals-authentication-credentials exfiltrates-data"&lt;br&gt;       malware_type = "unknown"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects .Net DLL payload samples"&lt;br&gt;       sha256_1 = "bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 62 6A 63 6C 6F 69 79 71 2E 64 6C 6C }&lt;br&gt;       $s1 = { 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E 00 54 79 70 65 }&lt;br&gt;       $s2 = { 67 65 74 5F 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 }&lt;br&gt;       $s3 = { 67 65 74 5F 43 75 72 72 65 6E 74 00 48 74 74 70 52 65 73 70 6F 6E 73 65 }&lt;br&gt;       $s4 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 }&lt;br&gt;       $s5 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E }&lt;br&gt;       $s6 = { 53 79 73 74 65 6D 2E 57 65 62 2E 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;   ## CISA Code &amp;amp; Media Analysis ##&lt;/p&gt;
&lt;p&gt;                           ############ README ###############&lt;br&gt;## Edit rules and queries as needed for your hunt and based on your environment.&lt;br&gt;## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. &lt;br&gt;## Do not edit "logsource-product:" unless you are editing this rule to meet specific logsources/fields and know your environment.&lt;br&gt;## TLP GREEN + Please use local installation of Sigma to convert this rule.&lt;br&gt;## TLP CLEAR may convert rules using online converter of choice.&lt;br&gt;                           ###################################&lt;/p&gt;
&lt;p&gt;title: Detects CVE-2025-53770 IOCs and Activity Based on Submitted Files 251132.r2&lt;br&gt;incident: 251133.r2&lt;br&gt;tlp: CLEAR&lt;br&gt;id: a9327942-4cf7-48e4-9ea4-ad0b54db4bf7 &lt;br&gt;status: test&lt;br&gt;description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Detects IOCs and Activity Based on Submitted Files 251132.r2.&lt;br&gt;references:&lt;br&gt;   - 251132.r2&lt;br&gt;author: CISA Code &amp;amp; Media Analysis&lt;br&gt;date: 2025-07-23&lt;br&gt;modified: 2025-07-23&lt;br&gt;tags: &lt;br&gt;   - cve.2025.53770&lt;br&gt;logsource:&lt;br&gt;   product: cma&lt;br&gt;detection:&lt;br&gt;   keywords_1:&lt;br&gt;       - 'CVAUGFnZSBMYW5ndWFnZT0i'&lt;br&gt;       - '%@Page Language="'&lt;br&gt;   keywords_2:&lt;br&gt;       - 'Jwb3dlcnNoZWxsLmV4ZS'&lt;br&gt;       - 'powershell.exe'&lt;br&gt;   keywords_3:&lt;br&gt;       - 'ItZW5j'&lt;br&gt;       - '-enc'&lt;br&gt;       - 'LUVuY29kZWRDb21tYW5k'&lt;br&gt;       - '-EncodedCommand'&lt;br&gt;   keywords_4:&lt;br&gt;       - '0Jhc2U2NFN0cmluZy'&lt;br&gt;       - 'Base64String'&lt;br&gt;   keywords_5:&lt;br&gt;       - 'FJlcXVlc3QuRm9ybV'&lt;br&gt;       - 'Request.Form'&lt;br&gt;   keywords_6:&lt;br&gt;       - 'sicCJ'&lt;br&gt;       - '"p"'&lt;/p&gt;
&lt;p&gt;   keywords_7:&lt;br&gt;       - '*.exe'&lt;br&gt;   keywords_8:&lt;br&gt;       - 'powershell*'&lt;br&gt;   keywords_9:&lt;br&gt;       - '-Command'&lt;br&gt;   keywords_10:&lt;br&gt;       - 'Get-ChildItem'&lt;br&gt;       - 'ForEach-Object' &lt;br&gt;   keywords_11:&lt;br&gt;       - '*\TEMPLATE\LAYOUTS\*'&lt;/p&gt;
&lt;p&gt;   keywords_12:&lt;br&gt;       - '*.exe'&lt;br&gt;   keywords_13:&lt;br&gt;       - 'certutil*'&lt;br&gt;   keywords_14:&lt;br&gt;       - '-decode'&lt;/p&gt;
&lt;p&gt;   keywords_15:&lt;br&gt;       - 'c:\progra~1\common~1\micros~1\webser~1\16\template\layouts\owa\resources\*'&lt;br&gt;       - 'c:\progra~1\common~1\micros~1\webser~1\16\template\layouts\*'&lt;br&gt;       - '\template\layouts\*'&lt;br&gt;       - '\template\layouts\owa\*'&lt;br&gt;   keywords_16:&lt;br&gt;       - '*.aspx'&lt;br&gt;       - '*.txt'&lt;/p&gt;
&lt;p&gt;   keywords_17:&lt;br&gt;       - '*\TEMPLATE\LAYOUTS\*'&lt;br&gt;   keywords_18:&lt;br&gt;       - 'spinstall*'&lt;br&gt;   keywords_19:&lt;br&gt;       - '*.aspx'&lt;/p&gt;
&lt;p&gt;   condition: keywords_1 and keywords_2 and keywords_3 and keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 and keywords_9 and keywords_10 and keywords_11 or keywords_12 and keywords_13 and keywords_14 or keywords_15 and keywords_16 or keywords_17 and keywords_18 and keywords_19&lt;/p&gt;
&lt;p&gt;falsepositives:&lt;br&gt;   - Rate of FP low-moderate with some strings.&lt;br&gt;   - Use this rule in an infected environment/logs.&lt;br&gt;   - Analyst may need to make adjustments to the query as required.&lt;br&gt;level: critical&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;PE Metadata&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Compile Date&lt;/th&gt;
&lt;td&gt;2025-07-18 03:25:36+00:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Import Hash&lt;/th&gt;
&lt;td&gt;dae02f32a21e03ce65412f6e56942daa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;File Description&lt;/th&gt;
&lt;td&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Internal Name&lt;/th&gt;
&lt;td&gt;bjcloiyq.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Legal Copyright&lt;/th&gt;
&lt;td&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Original Filename&lt;/th&gt;
&lt;td&gt;bjcloiyq.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Product Version&lt;/th&gt;
&lt;td&gt;0.0.0.0&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;PE Sections&lt;/h5&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;th&gt;Raw Size&lt;/th&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;93185bd1019bd277eef9815a17f1d074&lt;/td&gt;
&lt;td&gt;header&lt;/td&gt;
&lt;td&gt;512&lt;/td&gt;
&lt;td&gt;2.540889&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;f7cb6b7293c5082045ba423cab20a758&lt;/td&gt;
&lt;td&gt;.text&lt;/td&gt;
&lt;td&gt;2048&lt;/td&gt;
&lt;td&gt;4.519674&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;b73c90a61195ef7457efab9d898490d9&lt;/td&gt;
&lt;td&gt;.rsrc&lt;/td&gt;
&lt;td&gt;1024&lt;/td&gt;
&lt;td&gt;2.172802&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;039675253cb6c73f5458348295ff2f28&lt;/td&gt;
&lt;td&gt;.reloc&lt;/td&gt;
&lt;td&gt;512&lt;/td&gt;
&lt;td&gt;0.081539&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Packers/Compilers/Cryptors&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Visual C# / Basic .NET&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Relationships&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;bee94b93c1...&lt;/td&gt;
&lt;td&gt;Contained_Within&lt;/td&gt;
&lt;td&gt;60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a 64-bit .NET DLL that contains a class named "E" (Figure 2) used to extract and concatenate machine key configuration settings within an ASP[.]NET application's configuration. The file uses reflection to access the "MachineKeySection" from the "System.Web" assembly, which contains cryptographic keys used for validation and decryption in ASP[.]NET. The file uses reflection to get and invoke the "GetApplicationConfig" method of the "MachineKeySection" class to retrieve the "machineKey" configuration, which holds the actual key values. The file constructs a string containing the "ValidationKey", "Validation", "DecryptionKey", "Decryption", and "CompatibilityMode" properties of the "machineKeySection" and adds it as a custom header named "X-TXT-NET" to the HTTP response.&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure2" height="529" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure2.jpeg?itok=JSk3YEav" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 2 - &lt;/strong&gt;Screenshot of the decompiled .NET assembly within a class named "E" used to extract the machine key configuration.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997&lt;/h4&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;osvmhdfl.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;13373 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;40e609840ef3f7fea94d53998ec9f97f&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;141af6bcefdcf6b627425b5b2e02342c081e8d36&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;deaed6b7657cc17261ae72ebc0459f8a558baf7b724df04d8821c7a5355e037a05c991433e48d36a5967ae002459358678873240e252cdea4dcbcd89218ce5c2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;384:cMQLQ5VU1DcZugg2YBAxeFMxeFAReF9ReFj4U0QiKy8Mg3AxeFaxeFAReFLxTYma:ElHh1gtX10u5A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;4.966672&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_08 : steals_authentication_credentials exfiltrates_data&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250725_712"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "steals-authentication-credentials exfiltrates-data"&lt;br&gt;       malware_type = "unknown"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects .Net DLL payload samples"&lt;br&gt;       sha256_1 = "3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 47 65 74 4C 6F 67 69 63 61 6C 44 72 69 76 65 73 }&lt;br&gt;       $s1 = { 67 65 74 5F 4D 61 63 68 69 6E 65 4E 61 6D 65 }&lt;br&gt;       $s2 = { 67 65 74 5F 53 79 73 74 65 6D 44 69 72 65 63 74 6F 72 79 }&lt;br&gt;       $s3 = { 67 65 74 5F 43 75 72 72 65 6E 74 44 69 72 65 63 74 6F 72 79 }&lt;br&gt;       $s4 = { 67 65 74 5F 50 72 6F 63 65 73 73 6F 72 43 6F 75 6E 74 }&lt;br&gt;       $s5 = { 67 65 74 5F 55 73 65 72 4E 61 6D 65 }&lt;br&gt;       $s6 = { 67 65 74 5F 4F 53 56 65 72 73 69 6F 6E }&lt;br&gt;       $s7 = { 45 6E 76 69 72 6F 6E 6D 65 6E 74 56 61 72 69 61 62 6C 65 73 }&lt;br&gt;       $s8 = { 53 79 73 74 65 6D 2E 57 65 62 2E 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E }&lt;br&gt;       $s9 = { 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E }&lt;br&gt;       $s10 = { 67 65 74 5F 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 }&lt;br&gt;       $s11 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 }&lt;br&gt;       $s12 = { 67 65 74 5F 44 65 63 72 79 70 74 69 6F 6E }&lt;br&gt;       $s13 = { 67 65 74 5F 43 6F 6D 70 61 74 69 62 69 6C 69 74 79 4D 6F 64 65 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt; ## CISA Code &amp;amp; Media Analysis ##&lt;/p&gt;
&lt;p&gt;                           ############ README ###############&lt;br&gt;## Edit rules and queries as needed for your hunt and based on your environment.&lt;br&gt;## Ensure your EDR/SIEM instance has enough memory to run these AND/OR condition based queries. May take longer to run than conventional Sigma rule query. &lt;br&gt;## Do not edit "logsource-product:" unless you are editing this rule to meet specific logsources/fields and know your environment.&lt;br&gt;## TLP GREEN + Please use local installation of Sigma to convert this rule.&lt;br&gt;## TLP CLEAR may convert rules using online converter of choice.&lt;br&gt;                           ###################################&lt;/p&gt;
&lt;p&gt;title: Detects CVE-2025-53770 CVE-2025-53771 Updated IOCs and Activity &lt;br&gt;incident: 251133.r2&lt;br&gt;tlp: CLEAR&lt;br&gt;id: 32bba1a1-3900-4cf9-b379-3e71a63998a3&lt;br&gt;status: test&lt;br&gt;description: Detects ToolShell CVE-2025-53770 Exploitation of SharePoint servers. Detects updated IOCs and Activity. CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771. TA - Linen Typhoon, Violet Typhoon, Storm-2603.&lt;br&gt;references:&lt;br&gt;   - https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/?msockid=3e14885e8c2b643323129d998d366597&lt;br&gt;   - https://socradar.io/toolshell-sharepoint-zero-day-cve-2025-53770/&lt;br&gt;   - https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/&lt;br&gt;   - https://github.com/kaizensecurity/CVE-2025-53770/blob/master/payload&lt;br&gt;   - https://www.picussecurity.com/resource/blog/cve-2025-53770-critical-unauthenticated-rce-in-microsoft-sharepoint&lt;br&gt;   - https://www.trendmicro.com/en_us/research/25/g/cve-2025-53770-and-cve-2025-53771-sharepoint-attacks.html&lt;br&gt;author: CISA Code &amp;amp; Media Analysis&lt;br&gt;date: 2025-07-23&lt;br&gt;modified: 2025-07-23&lt;br&gt;tags: &lt;br&gt;   - cve.2025.49704 &lt;br&gt;   - cve.2025.49706&lt;br&gt;   - cve.2025.53770&lt;br&gt;   - cve.2025.53771 &lt;br&gt;logsource:&lt;br&gt;   product: cma&lt;br&gt;detection:&lt;br&gt;   keywords:&lt;br&gt;       - '92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514'&lt;br&gt;       - '4a02a72aedc3356d8cb38f01f0e0b9f26ddc5ccb7c0f04a561337cf24aa84030'&lt;br&gt;       - 'b39c14becb62aeb55df7fd55c814afbb0d659687d947d917512fe67973100b70'&lt;br&gt;       - 'fa3a74a6c015c801f5341c02be2cbdfb301c6ed60633d49fc0bc723617741af7'&lt;br&gt;       - '390665bdd93a656f48c463bb6c11a4d45b7d5444bdd1d1f7a5879b0f6f9aac7e'&lt;br&gt;       - '66af332ce5f93ce21d2fe408dffd49d4ae31e364d6802fff97d95ed593ff3082'&lt;br&gt;       - '7baf220eb89f2a216fcb2d0e9aa021b2a10324f0641caf8b7a9088e4e45bec95'&lt;br&gt;       - '8d3d3f3a17d233bc8562765e61f7314ca7a08130ac0fb153ffd091612920b0f2'&lt;br&gt;       - '30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27'&lt;br&gt;       - 'b336f936be13b3d01a8544ea3906193608022b40c28dd8f1f281e361c9b64e93'&lt;/p&gt;
&lt;p&gt;       - '107.191.58.76'&lt;br&gt;       - '104.238.159.149'&lt;br&gt;       - '96.9.125.147'&lt;br&gt;       - '103.186.30.186'&lt;br&gt;       - '45.77.155.170'&lt;br&gt;       - '139.144.199.41'&lt;br&gt;       - '172.174.82.132'&lt;br&gt;       - '89.46.223.88'  &lt;br&gt;       - '45.77.155.170'    &lt;br&gt;       - '154.223.19.106'   &lt;br&gt;       - '185.197.248.131'  &lt;br&gt;       - '149.40.50.15' &lt;br&gt;       - '64.176.50.109'    &lt;br&gt;       - '149.28.124.70'   &lt;br&gt;       - '206.166.251.228'  &lt;br&gt;       - '95.179.158.42' &lt;br&gt;       - '86.48.9.38'&lt;br&gt;       - '128.199.240.182'  &lt;br&gt;       - '212.125.27.102' &lt;br&gt;       - '91.132.95.60'&lt;br&gt;       - '134.199.202.205'&lt;br&gt;       - '131.226.2.6'&lt;br&gt;       - '188.130.206.168'&lt;/p&gt;
&lt;p&gt;       - 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0'&lt;br&gt;       - 'Mozilla/5.0+(Windows+NT+10.0;+Win64;+x64;+rv:120.0)+Gecko/20100101+Firefox/120.0'&lt;br&gt;       - 'c34718cbb4c6.ngrok-free.app/file.ps1'&lt;/p&gt;
&lt;p&gt;   keywords_1:&lt;br&gt;       - '*\TEMPLATE\LAYOUTS\*'&lt;br&gt;   keywords_2:&lt;br&gt;       - 'spinstall*'&lt;br&gt;       - 'debug*'&lt;br&gt;       - 'info*'&lt;br&gt;   keywords_3:&lt;br&gt;       - '*.aspx'&lt;br&gt;       - '*.js'&lt;/p&gt;
&lt;p&gt;   keywords_4:&lt;br&gt;       - 'POST'&lt;br&gt;       - 'GET'&lt;br&gt;       - 'curl'&lt;br&gt;   keywords_5:&lt;br&gt;       - '*/_layouts/*'&lt;br&gt;       - '*/layouts/*'&lt;br&gt;       - '*layouts*'&lt;br&gt;   keywords_6:&lt;br&gt;       - '*ToolPane.aspx'&lt;br&gt;       - '*DisplayMode'&lt;br&gt;       - '*SignOut.aspx'&lt;br&gt;       - '*spinstall*'&lt;br&gt;       - 'VIEWSTATE'&lt;/p&gt;
&lt;p&gt;   keywords_7:&lt;br&gt;       - 'cmd.exe'&lt;br&gt;   keywords_8:&lt;br&gt;       - 'powershell.exe' &lt;br&gt;   keywords_9:&lt;br&gt;       - '-EncodedCommand'&lt;br&gt;       - '-ec'&lt;br&gt;       - '-enc'&lt;br&gt;       - 'VIEWSTATE'&lt;br&gt;       - 'yoserial*'&lt;/p&gt;
&lt;p&gt;   keywords_10:&lt;br&gt;       - '*\TEMPLATE\LAYOUTS\*'&lt;br&gt;   keywords_11:&lt;br&gt;       - 'ChildItem'&lt;br&gt;   keywords_12:&lt;br&gt;       - 'targetFile'&lt;br&gt;   keywords_13:&lt;br&gt;       - 'NewLine'&lt;br&gt;   keywords_14:&lt;br&gt;       - '*web.config*'&lt;/p&gt;
&lt;p&gt;   keywords_15:&lt;br&gt;       - 'Ry2cuVmFsaWRhd'&lt;br&gt;       - 'Validation'&lt;br&gt;   keywords_16:&lt;br&gt;       - 'ifCIRy2cuQ29tc'&lt;br&gt;       - 'Decryption'&lt;br&gt;   keywords_17:&lt;br&gt;       - 'dGlvb'&lt;br&gt;       - 'Key'&lt;br&gt;   keywords_18:&lt;br&gt;       - 'UZtleVNlY3Rpb2'&lt;br&gt;       - 'MachineKey'&lt;br&gt;   keywords_19:&lt;br&gt;       - 'ShudWxsLC'&lt;br&gt;       - 'Invoke'&lt;br&gt;   keywords_20:&lt;br&gt;       - 'XIiIGxhbmd1Y'&lt;br&gt;       - 'language'&lt;br&gt;   keywords_21:&lt;br&gt;       - 'qZWN0WzBdKTsNC'&lt;br&gt;       - 'new object'&lt;/p&gt;
&lt;p&gt;   keywords_22:&lt;br&gt;       - 'POST'&lt;br&gt;       - 'powershell*'&lt;br&gt;       - '*layouts*'&lt;br&gt;   keywords_23:&lt;br&gt;       - 'ToolPane.aspx'&lt;br&gt;       - '*spinstall*'&lt;/p&gt;
&lt;p&gt;&lt;br&gt;   condition: keywords or keywords_1 and keywords_2 and keywords_3 or keywords_4 and keywords_5 and keywords_6 or keywords_7 and keywords_8 and keywords_9 or keywords_10 and keywords_11 and keywords_12 and keywords_13 and keywords_14 or keywords_15 and keywords_16 and keywords_17 and keywords_18 and keywords_19 and keywords_20 and keywords_21 or keywords_22 and keywords_23&lt;/p&gt;
&lt;p&gt;falsepositives:&lt;br&gt;   - Rate of FP low-moderate with some strings.&lt;br&gt;   - Use this rule in an infected environment/logs.&lt;br&gt;   - Analyst may need to make adjustments to the query as required.&lt;br&gt;level: critical&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;PE Metadata&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Compile Date&lt;/th&gt;
&lt;td&gt;2025-07-22 08:33:22+00:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Import Hash&lt;/th&gt;
&lt;td&gt;dae02f32a21e03ce65412f6e56942daa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;File Description&lt;/th&gt;
&lt;td&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Internal Name&lt;/th&gt;
&lt;td&gt;osvmhdfl.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Legal Copyright&lt;/th&gt;
&lt;td&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Original Filename&lt;/th&gt;
&lt;td&gt;osvmhdfl.dll&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Product Version&lt;/th&gt;
&lt;td&gt;0.0.0.0&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;PE Sections&lt;/h5&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;th&gt;Raw Size&lt;/th&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2a11da5809d47c180a7aa559605259b5&lt;/td&gt;
&lt;td&gt;header&lt;/td&gt;
&lt;td&gt;512&lt;/td&gt;
&lt;td&gt;2.545281&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;531ff1038e010be3c55de9cf1f212b56&lt;/td&gt;
&lt;td&gt;.text&lt;/td&gt;
&lt;td&gt;4608&lt;/td&gt;
&lt;td&gt;4.532967&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ef6793ef1a2f938cddc65b439e44ea07&lt;/td&gt;
&lt;td&gt;.rsrc&lt;/td&gt;
&lt;td&gt;1024&lt;/td&gt;
&lt;td&gt;2.170401&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;403090c0870bb56c921d82a159dca5a3&lt;/td&gt;
&lt;td&gt;.reloc&lt;/td&gt;
&lt;td&gt;512&lt;/td&gt;
&lt;td&gt;0.057257&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Packers/Compilers/Cryptors&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Visual C# / Basic .NET&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a 32-bit .NET DLL that contains a class named "E" (Figure 3) used to retrieve system and environment information, along with the machine key configuration settings (Figure 3). This class file is designed to iterate through and collect environment variables as well as retrieve and format .NET and system properties below: &lt;br&gt;&lt;br&gt;--Begin System Properties-- &lt;br&gt;Number of logical drives &lt;br&gt;Drive letters &lt;br&gt;Computer name &lt;br&gt;Full path of the system directory &lt;br&gt;Current directory &lt;br&gt;Processor count &lt;br&gt;System uptime (milliseconds since start) &lt;br&gt;Username &lt;br&gt;Operating system version &lt;br&gt;.NET version &lt;br&gt;--End System Properties-- &lt;br&gt;&lt;br&gt;The file uses reflection to access the "MachineKeySection" from the "System.Web" assembly, which contains cryptographic keys used for validation and decryption in ASP[.]NET. The file uses reflection to invoke the "GetApplicationConfig" method of the "MachineKeySection" class to retrieve the "machineKey" configuration, which holds the actual key values. The file constructs a string containing the "ValidationKey", "Validation", "DecryptionKey", "Decryption", and "CompatibilityMode" properties of the "machineKeySection". The gathered information and the "MachineKeySection" details are formatted into a string before written to the HTTP response (current.Response object).&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure3" height="564" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure3.jpeg?itok=kYzyZ-Qg" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 3 - &lt;/strong&gt;Screenshot of the decompiled .NET assembly that contains a class named "E" used to retrieve and display system and environment information, along with the machine key configuration settings.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514&lt;/h4&gt;
&lt;h5&gt;Tags&lt;/h5&gt;
&lt;p&gt;webshell&lt;/p&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;spinstall0.aspx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;756 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;HTML document, ASCII text, with CRLF line terminators&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;02b4571470d83163d103112f07f1c434&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;f5b60a8ead96703080e73a1f79c3e70ff44df271&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;2e6799393458d42acd4586c9792c24edf10b5e4aa761419758fec8da6670197c0e7c21e46dab224673818146ea4811446b4fbeaeed581e98f2add0980eb9d47d&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;12:iWVx8OaBngupDLI4MKisEKFhbCT5a05MQ+SuEKd2Eswl1HwAbPYMv:5VxWBnrE4JtbCT5f5exB1tbPYMv&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;5.313146&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_03 : steals_authentication_credentials exfiltrates_data&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250724_721"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "steals-authentication-credentials exfiltrates-data"&lt;br&gt;       malware_type = "unknown"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects aspx payload samples"&lt;br&gt;       sha256_1 = "92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 4C 6F 61 64 28 22 53 79 73 74 65 6D 2E 57 65 62 }&lt;br&gt;       $s1 = { 43 6F 6E 66 69 67 75 72 61 74 69 6F 6E 2E 4D 61 63 68 69 6E 65 4B 65 79 53 65 63 74 69 6F 6E }&lt;br&gt;       $s2 = { 52 65 73 70 6F 6E 73 65 2E 57 72 69 74 65 }&lt;br&gt;       $s3 = { 63 67 2E 56 61 6C 69 64 61 74 69 6F 6E 4B 65 79 2B 22 7C 22 }&lt;br&gt;       $s4 = { 2B 63 67 2E 56 61 6C 69 64 61 74 69 6F 6E 2B }&lt;br&gt;       $s5 = { 2B 63 67 2E 44 65 63 72 79 70 74 69 6F 6E 4B 65 79 2B }&lt;br&gt;       $s6 = { 2B 63 67 2E 44 65 63 72 79 70 74 69 6F 6E 2B }&lt;br&gt;       $s7 = { 2B 63 67 2E 43 6F 6D 70 61 74 69 62 69 6C 69 74 79 4D 6F 64 65 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;No associated rule.&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a malicious ASPX file used to retrieve and output machine key information from the "MachineKeySection" of the System[.]Web[.]Configuration namespace (Figure 4). This file uses reflection to dynamically load the "System.Web" assembly and access the "MachineKeySection" class within "System.Web.Configuration". The file invokes "GetApplicationConfig" to retrieve the "MachineKeySection" object and writes its properties including, ValidationKey, Validation, DecryptionKey, Decryption, and CompatibilityMode to the HTTP response using the "Response.Write()" method.&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure4" height="346" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure4.jpeg?itok=hceeotRM" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 4 - &lt;/strong&gt;Screenshot of the contents of the ASPX file used to extract configuration information from the machine key section of a web application's Web.config file.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7&lt;/h4&gt;
&lt;h5&gt;Tags&lt;/h5&gt;
&lt;p&gt;dropper&lt;/p&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;info3.aspx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;5026 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;ASCII text, with very long lines, with no line terminators&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;1f5c8df6bd296ebf68acda951a004a5b&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;d80722b335806cb74ee27af385abc6c9b018e133&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;54a82a9d9747f872f21f20ac4acea25218ed38a61fd9c611fb858f3f0c2941d4bf7ed35bf93fc0432aa3ac5a891277754a4a9468ae03cf31ca11281a589bc224&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;96:orFTPkPoXHIBvUr7F13mw3UhoQgW0970Eq90WtPKLiOKMT:orVPkPRBvaJ13r3eA709JPKGOKMT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;5.515141&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_04 : dropper installs_other_components&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250724_721"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "installs-other-components"&lt;br&gt;       malware_type = "dropper"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects Base64 encoded PowerShell dropper samples"&lt;br&gt;       sha256_1 = "9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 63 6D 64 2E 65 78 65 5C 22 20 2F 63 20 70 6F 77 65 72 73 68 65 6C 6C 20 2D 43 6F 6D 6D 61 6E 64 }&lt;br&gt;       $s1 = { 46 72 6F 6D 42 61 73 65 36 34 53 74 72 69 6E 67 }&lt;br&gt;       $s2 = { 4F 75 74 2D 46 69 6C 65 20 2D 46 69 6C 65 50 61 74 68 }&lt;br&gt;       $s3 = { 69 6E 66 6F 33 2E 61 73 70 78 }&lt;br&gt;       $s4 = { 2D 45 6E 63 6F 64 69 6E 67 20 55 54 46 38 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;No associated rule.&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Relationships&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9340bf7378...&lt;/td&gt;
&lt;td&gt;Contains&lt;/td&gt;
&lt;td&gt;675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact contains command-line instruction used to execute a PowerShell command (Figure 5). The PowerShell command decodes a Base64 encoded string into a Unicode Transformation Format-8 (UTF-8) string. The decoded content is then written to a file named "info3.aspx" (675a10e87c24....) located at c:\progra~1\\common~1\micros~1\webser~1\l16\template\layouts\. The output file is encoded using UTF8.&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure5" height="229" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure5.jpeg?itok=ROxOHJLS" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 5 - &lt;/strong&gt;Screenshot of the contents of the file containing command-line instruction used to execute a PowerShell command.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc&lt;/h4&gt;
&lt;h5&gt;Tags&lt;/h5&gt;
&lt;p&gt;webshell&lt;/p&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;info3.aspx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;3582 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;HTML document, ASCII text&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;7e09e837805c55dc5643cc21a87ff2a8&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;27f154765054fbe0f5c234cd2c7829b847005d2a&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;83aa141fd090172fb9a22855c18f2aea8b37f663f0093edd675a7499186fe46b3f953edda9477ca8918cf2af82c8b723d07a6912a9d7aa62b26391d15a83c44d&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;48:H9zBW074shunsBjsm/ITETo1YWOW5uq+Z8QZ+ThJSCyiH12:HJBG2jsmI4lPeWiOo3SCyiV2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;4.789465&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_05 : webshell exfiltrates_data fingerprints_host&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250724_721"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "exfiltrates-data fingerprints-host"&lt;br&gt;       malware_type = "webshell"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects aspx webshell samples"&lt;br&gt;       sha256_1 = "675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 43 75 72 72 65 6E 74 2E 52 65 71 75 65 73 74 2E 46 6F 72 6D }&lt;br&gt;       $s1 = { 20 48 74 74 70 43 6F 6F 6B 69 65 20 6E 65 77 63 6F 6F 6B }&lt;br&gt;       $s2 = { 6E 65 77 63 6F 6F 6B 2E 45 78 70 69 72 65 73 20 }&lt;br&gt;       $s3 = { 52 65 73 70 6F 6E 73 65 2E 53 65 74 43 6F 6F 6B 69 65 28 6E 65 77 63 6F 6F 6B 29 }&lt;br&gt;       $s4 = { 43 6F 6D 70 75 74 65 48 61 73 68 }&lt;br&gt;       $s5 = { 44 26 46 72 69 32 6B 26 78 35 64 4D 49 53 54 6E 61 46 71 40 }&lt;br&gt;       $s6 = { 2A 68 75 5E 4D 23 6C 23 4C 72 6C 4E 6F 39 21 37 4B 4C 66 }&lt;br&gt;       $s7 = { 22 63 6D 22 20 2B 20 22 64 2E 65 22 20 2B 20 22 78 65 22 }&lt;br&gt;       $s8 = { 57 72 69 74 65 4C 69 6E 65 28 22 65 78 69 74 22 29 }&lt;br&gt;       $s9 = { 50 61 73 73 77 6F 72 64 }&lt;br&gt;       $s10 = { 43 6F 6D 6D 61 6E 64 }&lt;br&gt;       $s11 = { 55 70 6C 6F 61 64 }&lt;br&gt;       $s12 = { 74 79 70 65 3D 22 66 69 6C 65 22 }&lt;br&gt;       $s13 = { 74 79 70 65 3D 22 74 65 78 74 22 }&lt;br&gt;       &lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;No associated rule.&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Relationships&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;675a10e87c...&lt;/td&gt;
&lt;td&gt;Contained_Within&lt;/td&gt;
&lt;td&gt;9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a malicious ASP[.]NET web page (.aspx) that contains ASP[.]NET code embedded within an HTML structure. This file is a webshell installed by "info3.aspx" (9340bf73782....). The file handles various operations based on submitted form data or HTTP cookies. The file contains HTML code used to create forms. The forms allow the Threat Actor (TA) to enter a password and submit it using a "Login" button, enter a command into a text field, which can then be executed by clicking an "Execute" button, and upload files that includes two input fields: one for selecting a file (type="file") and another for text input (type="text") (Figure 7). &lt;br&gt;&lt;br&gt;The password form element is configured for POST method and the input field is named "nYOmkVTYH2". If the HTML form with a password is received from the TA via an HTTP POST request, the file checks if the submission form field parameter named "nYOmkVTYH2" is not null or empty. If the parameter is present and not empty, the file sets an HTTP Cookie named "wY1DC6wH4u" with a value from the form field "nYOmkVTYH2" and sets the HTTP Cookie expiration date to four days from the current time. This cookie is then added to the response. The file verifies if the HTTP cookie exists in the current HTTP request. If the cookie exists, its value is concatenated with a long hard-coded string "D&amp;amp;Fri2k&amp;amp;x5dMISTnaFq@ssyKk@rEM!98KzSKWpL4Nc8NvaA9AKdJVOtfdJ45FvbyYHxTql6kkc%qOZevc*hu^M#l#LrlNo9!7KLf". This combined string is then hashed using SHA512. The computed hash is converted to a Base64 string and compared against a predefined Base64 encoded string "9gYs0W/reXzR+KO6J/zP6naMU9AQwZCwhmXuPyGeY2VwMkxNGBZaJQAxGS6GvQZJLSAPk8LT0PgJVU1kQQJd2zW9w==" (Figure 6). This process determines whether a user or request is authorized. &lt;br&gt;&lt;br&gt;The command form element is configured for POST method and the input field is named "GTaRkhJ9wz". If the HTML form with a command is received from the TA via an HTTP POST request, the file checks if the submission form field parameter named "GTaRkhJ9wz" is not null or empty. If the parameter is present and not empty, the file creates a new process to execute a command-line utility "cmd.exe". The file redirects standard input, output, and error streams to capture the results of the executed command. The code writes the value of the "GTaRkhJ9wz" form parameter to the process's standard input, executing the value as a command, and then writes "exit" to terminate the process (Figure 6). &lt;br&gt;&lt;br&gt;The file upload form element is configured for POST method and "enctype"="multipart/form-data" to handle file uploads. It includes an input type="file" for selecting a file (input field named "0z3H8H8ato") and an input type="text" for providing a destination path or filename ( input field named "7KAjlfecWF"). If the HTML form for file upload is received from the TA, the file checks if the submission form field parameter named "7KAjlfecWF" (intended to be the file path or name) is not null or empty. The file retrieves the uploaded file through the "0z3H8H8atO" input using "HttpContext.Current[.]Request[.]Files["Oz3H8H8ato"]". If the file exists and has content (content length is greater than zero), the file saves the uploaded file using the path provided in the "7KAjlfecWF" field. Upon successful upload, the "InnerText" of an element named "Result" is set to "uploaded", indicating the file has been saved. If an error occurs during the process, the file captures the exception and displays its details in "Result.InnerText" (Figure 6). The file displays server-side generated output or messages to the TA.&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure6" height="572" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure6.jpeg?itok=pS0V4TVO" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 6 - &lt;/strong&gt;Screenshot of the code snippet designed for handling various web-related operations, including setting and retrieving HTTP cookies, calculating a SHA512 hash of a request form value, starting an external cmd process and capturing its output, handling uploaded files from a request.&lt;/p&gt;
&lt;/div&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure7" height="139" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure7.jpeg?itok=mAia-2SO" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 7 - &lt;/strong&gt;Screenshot of the form that allows the TA to enter a password and submit it using a "Login" button, to enter a command, which can then be executed by clicking an "Execute" button, and a field for uploading files, featuring a file input (type="file") and a text input, both submitted using an "Upload" button.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00&lt;/h4&gt;
&lt;h5&gt;Tags&lt;/h5&gt;
&lt;p&gt;webshell&lt;/p&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;spinstallb.aspx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;676 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;HTML document, ASCII text, with very long lines, with no line terminators&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;7d2f36f4cb82c75b83c210e655649b5d&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;37d1d1913d758f7d71020c08d4a7dae3efe83b68&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;c52ab55753ae7fcfca46e869b805f3aa2d19c45e7526a61f79b20b8cd38eccc09f1b7a06acbd8d77e936f68fea9ee3bba7b7c42d6f93cf0c27a22cf7555d70d3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;12:XrVcins8q/KF2C2DRbqtP6LoGM8AWLaWF1nM9OiDGiOVKeL84GYb:7Vds8q/KF2C2qPWHAW+WF9M9OiDm/b&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;5.466082&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_06 : webshell fingerprints_host installs_other_components exfiltrates_data&lt;br&gt;&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250725_712"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "fingerprints-host installs-other-components exfiltrates-data"&lt;br&gt;       malware_type = "webshell"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects ASPX Webshell samples"&lt;br&gt;       sha256_1 = "d9c4dd5a8317d1d83b5cc3482e95602f721d58e3ba624d131a9472f927d33b00"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 3D 52 65 71 75 65 73 74 2E 46 6F 72 6D 5B 22 70 22 5D }&lt;br&gt;       $s1 = { 46 72 6F 6D 42 61 73 65 36 34 53 74 72 69 6E 67 28 65 6E 63 29 }&lt;br&gt;       $s2 = { 46 69 6C 65 4E 61 6D 65 3D 22 70 6F 77 65 72 73 68 65 6C 6C 2E 65 78 65 }&lt;br&gt;       $s3 = { 2D 45 6E 63 6F 64 65 64 43 6F 6D 6D 61 6E 64 }&lt;br&gt;       $s4 = { 2C 55 73 65 53 68 65 6C 6C 45 78 65 63 75 74 65 3D 66 61 6C 73 65 }&lt;br&gt;       $s5 = { 76 61 72 20 70 6C 3D 6E 65 77 20 62 79 74 65 }&lt;br&gt;       $s7 = { 36 38 39 30 31 61 33 39 34 61 37 36 64 63 35 30 36 34 66 62 61 39 36 62 38 36 }&lt;br&gt;       $s8 = { 32 36 36 35 65 65 35 39 36 62 31 61 31 34 36 38 62 64 63 36 }&lt;br&gt;       $s9 = { 31 38 31 35 37 64 37 63 63 61 30 31 33 30 39 30 32 65 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;No associated rule.&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a malicious ASPX file with a "Page_Load" event handler that constructs and executes a command using PowerShell on the server (Figure 8). Upon execution, the file takes a Base64-encoded string from a form parameter named "p". The Base64 encoded string is decoded and Exclusively-OR (XOR) decrypted using a hard-coded XOR key "68901a394a76dc5064fba96b862665ee596b1a1468bdc618157d7cca0130902e". The output of the XOR decrypted bytes are converted to a Unicode Transformation Format-8 (UTF-8) string and then Base64 encoded. The Base64 encoded string is passed as an argument to the PowerShell process "powershell.exe" using the "-EncodedCommand flag". The file redirects the standard output of the PowerShell process and reads it into a variable "o", which is then written back to the HTTP response.&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure8" height="292" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure8.jpeg?itok=GQ6dG-S7" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 8 - &lt;/strong&gt;Screenshot of the contents of the ASPX file.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="cma-section"&gt;
&lt;h4&gt;d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170&lt;/h4&gt;
&lt;h5&gt;Tags&lt;/h5&gt;
&lt;p&gt;webshell&lt;/p&gt;
&lt;h5&gt;Details&lt;/h5&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Name&lt;/th&gt;
&lt;td&gt;spinstallp.aspx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Size&lt;/th&gt;
&lt;td&gt;706 bytes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;td&gt;HTML document, ASCII text, with very long lines, with no line terminators&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;MD5&lt;/th&gt;
&lt;td&gt;7768feda9d79ef6f87410c02e981f066&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA1&lt;/th&gt;
&lt;td&gt;1b8432fcda4c12b64cdf4918adf7880aecf054ec&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA256&lt;/th&gt;
&lt;td&gt;d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;SHA512&lt;/th&gt;
&lt;td&gt;c9ee5d32a59fad386570923df7950b562e1d4c000c7f4a20aebc214477f737815a401858a11d4e9139a80152afd5ddc8655ad804e71544e50f5a23cc9888eeba&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;ssdeep&lt;/th&gt;
&lt;td&gt;12:XrVTO6LjxB5QnnsJz3kH+XWLaWF1n5OiD5RKF2UIdiOVKeLxnHdYT:7VTOYZWsJz3+WW+WF95OiDbKF2xP6T&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Entropy&lt;/th&gt;
&lt;td&gt;5.432916&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h5&gt;Antivirus&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;YARA Rules&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;rule CISA_251132_07 : webshell fingerprints_host installs_other_components exfiltrates_data&lt;br&gt;{&lt;br&gt;   meta:&lt;br&gt;       author = "CISA Code &amp;amp; Media Analysis"&lt;br&gt;       incident = "251132"&lt;br&gt;       date = "2025-07-21"&lt;br&gt;       last_modified = "20250725_712"&lt;br&gt;       actor = "n/a"&lt;br&gt;       family = "n/a"&lt;br&gt;       capabilities = "fingerprints-host installs-other-components exfiltrates-data"&lt;br&gt;       malware_type = "webshell"&lt;br&gt;       tool_type = "unknown"&lt;br&gt;       description = "Detects ASPX Webshell samples"&lt;br&gt;       sha256_1 = "d0c4d6a4be0a65f8ca89e828a3bc810572fff3b3978ff0552a8868c69f83d170"&lt;br&gt;   strings:&lt;br&gt;       $s0 = { 61 38 35 39 66 30 32 30 38 37 37 37 34 36 32 38 39 39 64 66 36 37 62 33 64 38 31 61 37 62 38 62 }&lt;br&gt;       $s1 = { 70 6F 77 65 72 73 68 65 6C 6C 2E 65 78 65 }&lt;br&gt;       $s2 = { 41 72 67 75 6D 65 6E 74 73 3D 22 2D 65 6E 63 20 22 }&lt;br&gt;       $s3 = { 52 65 71 75 65 73 74 2E 46 6F 72 6D 5B 22 70 22 5D }&lt;br&gt;       $s4 = { 55 73 65 53 68 65 6C 6C 45 78 65 63 75 74 65 3D 66 61 6C 73 65 }&lt;br&gt;       $s5 = { 52 65 64 69 72 65 63 74 53 74 61 6E 64 61 72 64 4F 75 74 70 75 74 3D 74 72 75 65 }&lt;br&gt;       $s6 = { 53 74 61 6E 64 61 72 64 4F 75 74 70 75 74 }&lt;br&gt;       $s7 = { 52 65 73 70 6F 6E 73 65 2E 57 72 69 74 65 }&lt;br&gt;       $s8 = { 47 65 74 42 79 74 65 73 28 6F 29 }&lt;br&gt;   condition:&lt;br&gt;       all of them&lt;br&gt;}&lt;br&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;SIGMA Rule&lt;/h5&gt;
&lt;p&gt;No associated rule.&lt;/p&gt;
&lt;h5&gt;ssdeep Matches&lt;/h5&gt;
&lt;p&gt;No matches found.&lt;/p&gt;
&lt;h5&gt;Description&lt;/h5&gt;
&lt;p&gt;This artifact is a malicious ASPX file with a "Page_Load" event handler that constructs and executes a command using PowerShell on the server (Figure 9). Upon execution, the file constructs a PowerShell command that decodes a Base64 string from the request form parameter "p". The decoded string is decrypted using the XOR function with the hard-coded key "a859f0208777462899df67b3d81a7b8b". The decrypted bytes (command) is executed using a PowerShell command. The standard output of the executed PowerShell command is converted to a UTF-8 string, then encrypted using the XOR function with the same hard-coded key. The encrypted bytes data is Base64 encoded before written to the HTTP response using "Response.Write".&lt;/p&gt;
&lt;h5&gt;Screenshots&lt;/h5&gt;
  
  
  
  
&lt;figure class="c-figure c-figure--large c-figure--image"&gt;
  
  &lt;div class="c-figure__media"&gt;  &lt;img alt="MAR-251132.c1.v1.Figure9" height="301" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-08/MAR-251132.c1.v1.Figure9.jpeg?itok=Wf9OS05-" width="600"&gt;


&lt;/div&gt;
  &lt;/figure&gt;
&lt;div class="cma-screenshot-text"&gt;
&lt;p&gt;&lt;strong&gt;Figure 9 - &lt;/strong&gt;Screenshot of the contents of the ASPX file.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Relationship Summary&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;60a37499f9...&lt;/td&gt;
&lt;td&gt;Contains&lt;/td&gt;
&lt;td&gt;bee94b93c1796981a55d7bd27a32345a61304a88ed6cd70a5f7a402f1332df72&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;bee94b93c1...&lt;/td&gt;
&lt;td&gt;Contained_Within&lt;/td&gt;
&lt;td&gt;60a37499f9b02c203af24c2dfd7fdb3834cea707c4c56b410a7e68376938c4b7&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9340bf7378...&lt;/td&gt;
&lt;td&gt;Contains&lt;/td&gt;
&lt;td&gt;675a10e87c248d0f629da864ba8b7fd92b62323c406a69dec35a0e6e1552ecbc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;675a10e87c...&lt;/td&gt;
&lt;td&gt;Contained_Within&lt;/td&gt;
&lt;td&gt;9340bf7378234db5bca0dc5378bf764b6a24bb87a42b05fa21a996340608fbd7&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;p&gt;CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Maintain up-to-date antivirus signatures and engines.&lt;/li&gt;
&lt;li&gt;Keep operating system patches up-to-date.&lt;/li&gt;
&lt;li&gt;Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.&lt;/li&gt;
&lt;li&gt;Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.&lt;/li&gt;
&lt;li&gt;Enforce a strong password policy and implement regular password changes.&lt;/li&gt;
&lt;li&gt;Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.&lt;/li&gt;
&lt;li&gt;Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.&lt;/li&gt;
&lt;li&gt;Disable unnecessary services on agency workstations and servers.&lt;/li&gt;
&lt;li&gt;Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).&lt;/li&gt;
&lt;li&gt;Monitor users' web browsing habits; restrict access to sites with unfavorable content.&lt;/li&gt;
&lt;li&gt;Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).&lt;/li&gt;
&lt;li&gt;Scan all software downloaded from the Internet prior to executing.&lt;/li&gt;
&lt;li&gt;Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, &lt;strong&gt;"Guide to Malware Incident Prevention &amp;amp; Handling for Desktops and Laptops".&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Contact Information&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;ul&gt;
&lt;li&gt;1-888-282-0870&lt;/li&gt;
&lt;li&gt;&lt;a href="mailto:contact@mail.cisa.dhs.gov"&gt;CISA Service Desk&lt;/a&gt; (UNCLASS)&lt;/li&gt;
&lt;li&gt;&lt;a href="mailto:NCCIC@dhs.sgov.gov"&gt;CISA SIPR&lt;/a&gt; (SIPRNET)&lt;/li&gt;
&lt;li&gt;&lt;a href="mailto:NCCIC@dhs.ic.gov"&gt;CISA IC&lt;/a&gt; (JWICS)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: &lt;a href="https://www.cisa.gov/forms/feedback"&gt;https://www.cisa.gov/forms/feedback&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Document FAQ&lt;/h3&gt;
&lt;div class="cma-section"&gt;
&lt;p&gt;&lt;strong&gt;What is a MIFR?&lt;/strong&gt; A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is a MAR?&lt;/strong&gt; A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can I edit this document?&lt;/strong&gt; This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or &lt;a href="mailto:CISAservicedesk@cisa.dhs.gov"&gt;CISA Service Desk&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can I submit malware to CISA?&lt;/strong&gt; Malware samples can be submitted via the methods below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Web: &lt;a href="https://www.cisa.gov/resources-tools/services/malware-next-generation-analysis"&gt;https://www.cisa.gov/resources-tools/services/malware-next-generation-analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For larger files (over 100MB), please reach out to CISA for instructions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at &lt;a href="http://www.cisa.gov"&gt;www.cisa.gov&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/mar-251132-c1-v1-exploitation-of-sharepoint-vulnerabilities-8de2a906/</guid><pubDate>Wed, 06 Aug 2025 12:00:00 GMT</pubDate></item><item><title>Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments</title><link>https://yieldsfalsehood.com/aeolus/posts/microsoft-releases-guidance-on-high-severity-vulnerability-cve-2025-53786-in-hybrid-exchange-deployments-57e4610f/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note:&lt;/strong&gt; This Alert may be updated to reflect new guidance issued by CISA or other parties.&lt;/em&gt; &lt;/p&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;CISA is aware of the newly disclosed high-severity vulnerability, &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-53786" target="_blank" title="CVE-2025-53786"&gt;&lt;u&gt;CVE-2025-53786&lt;/u&gt;&lt;/a&gt;, that allows a cyber threat actor with administrative access to an on-premise Microsoft Exchange server to escalate privileges by exploiting vulnerable hybrid-joined configurations. This vulnerability, if not addressed, could impact the identity integrity of an organization’s Exchange Online service. &lt;/p&gt;
&lt;/div&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;While Microsoft has stated there is no observed exploitation as of the time of this alert’s publication, CISA strongly urges organizations to implement Microsoft’s &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786" target="_blank" title="Exchange Server Hybrid deployment Elevation of Privilege Vulnerability"&gt;&lt;u&gt;Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability&lt;/u&gt;&lt;/a&gt; guidance outlined below, or risk leaving the organization vulnerable to a hybrid cloud and on-premises total domain compromise.  &lt;/p&gt;
&lt;/div&gt;
&lt;div class="ListContainerWrapper SCXW130632333 BCX8"&gt;
&lt;ol&gt;
&lt;li&gt;If using Exchange hybrid, review Microsoft’s guidance &lt;a href="https://techcommunity.microsoft.com/blog/exchange/exchange-server-security-changes-for-hybrid-deployments/4396833" target="_blank" title="Exchange Server Security Changes for Hybrid Deployments"&gt;&lt;u&gt;Exchange Server Security Changes for Hybrid Deployments&lt;/u&gt;&lt;/a&gt; to determine if your Microsoft hybrid deployments are potentially affected and available for a Cumulative Update (CU). &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="ListContainerWrapper SCXW130632333 BCX8"&gt;
&lt;ol start="2"&gt;
&lt;li&gt;Install Microsoft’s &lt;a href="https://techcommunity.microsoft.com/blog/exchange/released-april-2025-exchange-server-hotfix-updates/4402471" target="_blank" title="April 2025 Exchange Server Hotfix Updates"&gt;&lt;u&gt;April 2025 Exchange Server Hotfix Updates&lt;/u&gt;&lt;/a&gt; on the on-premise Exchange server and follow Microsoft’s configuration instructions &lt;a href="https://learn.microsoft.com/en-us/Exchange/hybrid-deployment/deploy-dedicated-hybrid-app" target="_blank" title="Deploy dedicates Exchange hybrid app"&gt;&lt;u&gt;Deploy dedicated Exchange hybrid app&lt;/u&gt;&lt;/a&gt;.  &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="ListContainerWrapper SCXW130632333 BCX8"&gt;
&lt;ol start="3"&gt;
&lt;li&gt;For organizations using Exchange hybrid (or have previously configured Exchange hybrid but no longer use it), review Microsoft's &lt;a href="https://learn.microsoft.com/en-us/Exchange/hybrid-deployment/deploy-dedicated-hybrid-app#service-principal-clean-up-mode" target="_blank" title="Microsoft's Service Principal Clean-Up Mode"&gt;Service Principal Clean-Up Mode&lt;/a&gt; for guidance on resetting the service principal’s &lt;code&gt;keyCredentials&lt;/code&gt;.  &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="ListContainerWrapper SCXW130632333 BCX8"&gt;
&lt;ol start="4"&gt;
&lt;li&gt;Upon completion, run the &lt;a href="https://microsoft.github.io/CSS-Exchange/Diagnostics/HealthChecker/" target="_blank" title="Microsoft Exchange Health Checker"&gt;&lt;u&gt;Microsoft Exchange Health Checker&lt;/u&gt;&lt;/a&gt; to determine if further steps are required.  &lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;&lt;br&gt;CISA highly recommends entities disconnect public-facing versions of Exchange Server or SharePoint Server that have reached their end-of-life (EOL) or end-of-service from the internet. For example, SharePoint Server 2013 and earlier versions are EOL and should be discontinued if still in use.   &lt;/p&gt;
&lt;/div&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;Organizations should review Microsoft’s blog &lt;a href="https://techcommunity.microsoft.com/blog/exchange/dedicated-hybrid-app-temporary-enforcements-new-hcw-and-possible-hybrid-function/4440682" target="_blank" title="Dedicated Hybrid App: temporary enforcements, new HCW and possible hybrid functionality disruptions"&gt;&lt;u&gt;Dedicated Hybrid App: temporary enforcements, new HCW and possible hybrid functionality disruptions&lt;/u&gt;&lt;/a&gt; for additional guidance as it becomes available. &lt;/p&gt;
&lt;/div&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer:  &lt;/strong&gt; &lt;/p&gt;
&lt;/div&gt;
&lt;div class="OutlineElement Ltr SCXW130632333 BCX8"&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.  &lt;/p&gt;
&lt;/div&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/microsoft-releases-guidance-on-high-severity-vulnerability-cve-2025-53786-in-hybrid-exchange-deployments-57e4610f/</guid><pubDate>Wed, 06 Aug 2025 12:00:00 GMT</pubDate></item><item><title>CISA Adds Three Known Exploited Vulnerabilities to Catalog</title><link>https://yieldsfalsehood.com/aeolus/posts/cisa-adds-three-known-exploited-vulnerabilities-to-catalog-8a8524fe/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;CISA has added three new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" href="https://www.cve.org/CVERecord?id=CVE-2020-25078" rel="noreferrer noopener" target="_blank" title="CVE-2020-25078"&gt;CVE-2020-25078&lt;/a&gt; D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" href="https://www.cve.org/CVERecord?id=CVE-2020-25079" rel="noreferrer noopener" target="_blank" title="CVE-2020-25079"&gt;CVE-2020-25079&lt;/a&gt; D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability&lt;/li&gt;
&lt;li&gt;&lt;a class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" href="https://www.cve.org/CVERecord?id=CVE-2022-40799" rel="noreferrer noopener" target="_blank" title="CVE-2022-40799"&gt;CVE-2022-40799&lt;/a&gt; D-Link DNR-322L Download of Code Without Integrity Check Vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cisa.gov/binding-operational-directive-22-01" title="Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities"&gt;Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities&lt;/a&gt; established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the&lt;a&gt; &lt;/a&gt;&lt;a href="https://www.cisa.gov/sites/default/files/publications/Reducing_the_Significant_Risk_of_Known_Exploited_Vulnerabilities_211103.pdf" title="BOD 22-01 Fact Sheet"&gt;BOD 22-01 Fact Sheet&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Catalog vulnerabilities"&gt;KEV Catalog vulnerabilities&lt;/a&gt; as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities" title="specified criteria"&gt;specified criteria&lt;/a&gt;.&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/cisa-adds-three-known-exploited-vulnerabilities-to-catalog-8a8524fe/</guid><pubDate>Tue, 05 Aug 2025 12:00:00 GMT</pubDate></item><item><title>CISA Releases Two Industrial Control Systems Advisories</title><link>https://yieldsfalsehood.com/aeolus/posts/cisa-releases-two-industrial-control-systems-advisories-69102904/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;CISA released two Industrial Control Systems (ICS) advisories on August 5, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ICSA-25-217-01 &lt;a href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-217-01"&gt;Mitsubishi Electric Iconics Digital Solutions Multiple Products&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;ICSA-25-217-02 &lt;a href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-217-02"&gt;Tigo Energy Cloud Connect Advanced&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.&lt;/p&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/cisa-releases-two-industrial-control-systems-advisories-69102904/</guid><pubDate>Tue, 05 Aug 2025 12:00:00 GMT</pubDate></item><item><title>Mitsubishi Electric Iconics Digital Solutions Multiple Products</title><link>https://yieldsfalsehood.com/aeolus/posts/mitsubishi-electric-iconics-digital-solutions-multiple-products-89c467c9/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;&lt;a href="https://github.com/cisagov/CSAF" target="_blank"&gt;&lt;strong&gt;View CSAF&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="1-executive-summary"&gt;1. EXECUTIVE SUMMARY&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CVSS v4 4.1&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ATTENTION&lt;/strong&gt;: Low attack complexity&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vendor&lt;/strong&gt;: Mitsubishi Electric Iconics Digital Solutions, Mitsubishi Electric&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Equipment&lt;/strong&gt;: ICONICS Product Suite and Mitsubishi Electric MC Works64&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability&lt;/strong&gt;: Windows Shortcut Following (.LNK)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="2-risk-evaluation"&gt;2. RISK EVALUATION&lt;/h2&gt;
&lt;p&gt;Successful exploitation of this vulnerability could result in information tampering.&lt;/p&gt;
&lt;h2 id="3-technical-details"&gt;3. TECHNICAL DETAILS&lt;/h2&gt;
&lt;h3 id="31-affected-products"&gt;3.1 AFFECTED PRODUCTS&lt;/h3&gt;
&lt;p&gt;The following versions of ICONICS Product Suite and Mitsubishi Electric MC Works64 are affected:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GENESIS64: All versions&lt;/li&gt;
&lt;li&gt;GENESIS: Version 11.00&lt;/li&gt;
&lt;li&gt;Mitsubishi Electric MC Works64: All versions&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="32-vulnerability-overview"&gt;3.2 VULNERABILITY OVERVIEW&lt;/h3&gt;
&lt;h4 id="321-windows-shortcut-following-lnk-cwe-64"&gt;&lt;strong&gt;3.2.1 &lt;/strong&gt;&lt;a href="https://cwe.mitre.org/data/definitions/64.html" target="_blank"&gt;&lt;strong&gt;Windows Shortcut Following (.LNK) CWE-64&lt;/strong&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;An information tampering vulnerability due to Windows Shortcut Following exists in multiple processes in GENESIS64, MC Works64, and GENESIS. An attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. By creating a symbolic link, an attacker can cause the processes to make unauthorized writes to arbitrary files on the file system in any location that is accessible to the user under which the elevated processes are running, resulting in a denial-of-service (DoS) condition on the PC if the modified file is necessary for the operation of the PC.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7376" target="_blank"&gt;CVE-2025-7376&lt;/a&gt; has been assigned to this vulnerability. A CVSS v3.1 base score of 5.9 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N" target="_blank"&gt;AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;A CVSS v4 score has also been calculated for &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7376" target="_blank"&gt;CVE-2025-7376&lt;/a&gt;. A base score of 4.1 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/v4-0#CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" target="_blank"&gt;AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N&lt;/a&gt;).&lt;/p&gt;
&lt;h3 id="33-background"&gt;3.3 BACKGROUND&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CRITICAL INFRASTRUCTURE SECTORS:&lt;/strong&gt; Critical Manufacturing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;COUNTRIES/AREAS DEPLOYED:&lt;/strong&gt; Worldwide&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;COMPANY HEADQUARTERS LOCATION:&lt;/strong&gt; Japan&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="34-researcher"&gt;3.4 RESEARCHER&lt;/h3&gt;
&lt;p&gt;Mitsubishi Electric reported this vulnerability to CISA.&lt;/p&gt;
&lt;h2 id="4-mitigations"&gt;4. MITIGATIONS&lt;/h2&gt;
&lt;p&gt;Mitsubishi Iconics Digital Solutions recommends users upgrade to GENESIS Version 11.01, which contains a fix for this vulnerability. For the highest level of security, it is recommended that users upgrade their system to the latest version and keep it up-to-date with the latest releases. Consult Mitsubishi Electric Iconics Digital Solutions &lt;a href="https://iconics.com/en-us/Support" target="_blank"&gt;Support&lt;/a&gt; for upgrade assistance.&lt;/p&gt;
&lt;p&gt;Users who remain on affected versions should be aware of this information tampering vulnerability and take any necessary precautions to keep the system safe from potential attackers such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configure the PCs with the affected product installed so that only an administrator can log in.&lt;/li&gt;
&lt;li&gt;PCs with the affected product installed should be configured to block remote logins from untrusted networks and hosts, and from non-administrator users.&lt;/li&gt;
&lt;li&gt;Block unauthorized access by using a firewall or virtual private network (VPN), etc., and allow remote login only to administrators when connecting the PCs with the affected product installed to the Internet.&lt;/li&gt;
&lt;li&gt;Restrict physical access to the PC with the affected product installed and the network to which the PC is connected to prevent unauthorized physical access.&lt;/li&gt;
&lt;li&gt;Do not click on web links in emails from untrusted sources. Also, do not open attachments in untrusted emails.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric recommends updating the ICONICS Suite with the latest security patches as they become available. ICONICS Suite security patches may be found &lt;a href="https://partners.iconics.com/Home.aspx" target="_blank"&gt;here&lt;/a&gt; (login required).&lt;/p&gt;
&lt;p&gt;For more information, see Mitsubishi Electric's &lt;a href="https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-009_en.pdf" target="_blank"&gt;security advisory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.&lt;/p&gt;
&lt;p&gt;CISA also provides a section for &lt;a href="https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" target="_blank"&gt;control systems security recommended practices&lt;/a&gt; on the ICS webpage on &lt;a href="https://www.cisa.gov/topics/industrial-control-systems" target="_blank"&gt;cisa.gov/ics&lt;/a&gt;. Several CISA products detailing cyber defense best practices are available for reading and download, including &lt;a href="https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" target="_blank"&gt;Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CISA encourages organizations to implement recommended cybersecurity strategies for &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" target="_blank"&gt;proactive defense of ICS assets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at &lt;a href="https://www.cisa.gov/topics/industrial-control-systems" target="_blank"&gt;cisa.gov/ics&lt;/a&gt; in the technical information paper, &lt;a href="https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" target="_blank"&gt;ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.&lt;/p&gt;
&lt;p&gt;No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.&lt;/p&gt;
&lt;h2 id="5-update-history"&gt;5. UPDATE HISTORY&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;August 5, 2025: Initial Publication&lt;/li&gt;
&lt;/ul&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/mitsubishi-electric-iconics-digital-solutions-multiple-products-89c467c9/</guid><pubDate>Tue, 05 Aug 2025 12:00:00 GMT</pubDate></item><item><title>Tigo Energy Cloud Connect Advanced</title><link>https://yieldsfalsehood.com/aeolus/posts/tigo-energy-cloud-connect-advanced-2961ee37/</link><dc:creator>CISA</dc:creator><description>&lt;p&gt;&lt;a href="https://github.com/cisagov/CSAF" target="_blank"&gt;&lt;strong&gt;View CSAF&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="1-executive-summary"&gt;1. EXECUTIVE SUMMARY&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CVSS v4 9.3&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ATTENTION&lt;/strong&gt;: Exploitable remotely/low attack complexity&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vendor&lt;/strong&gt;: Tigo Energy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Equipment&lt;/strong&gt;: Cloud Connect Advanced&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerabilities&lt;/strong&gt;: Use of Hard-coded Credentials, Command Injection, Predictable Seed in Pseudo-Random Number Generator (PRNG).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="2-risk-evaluation"&gt;2. RISK EVALUATION&lt;/h2&gt;
&lt;p&gt;Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized administrative access using hard-coded credentials, escalate privileges to take full control of the device, modify system settings, disrupt solar energy production, interfere with safety mechanisms, execute arbitrary commands via command injection, cause service disruptions, expose sensitive data, and recreate valid session IDs to access sensitive device functions on connected solar inverter systems due to insecure session ID generation.&lt;/p&gt;
&lt;h2 id="3-technical-details"&gt;3. TECHNICAL DETAILS&lt;/h2&gt;
&lt;h3 id="31-affected-products"&gt;3.1 AFFECTED PRODUCTS&lt;/h3&gt;
&lt;p&gt;The following versions of Cloud Connect Advanced are affected:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cloud Connect Advanced: Versions 4.0.1 and prior&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="32-vulnerability-overview"&gt;3.2 VULNERABILITY OVERVIEW&lt;/h3&gt;
&lt;h4 id="321-use-of-hard-coded-credentials-cwe-798"&gt;&lt;strong&gt;3.2.1 &lt;/strong&gt;&lt;a href="https://cwe.mitre.org/data/definitions/798.html" target="_blank"&gt;&lt;strong&gt;Use of Hard-coded Credentials CWE-798&lt;/strong&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7768" target="_blank"&gt;CVE-2025-7768&lt;/a&gt; has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" target="_blank"&gt;AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;A CVSS v4 score has also been calculated for &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7768" target="_blank"&gt;CVE-2025-7768&lt;/a&gt;. A base score of 9.3 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank"&gt;AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;).&lt;/p&gt;
&lt;h4 id="322-improper-neutralization-of-special-elements-used-in-a-command-command-injection-cwe-77"&gt;&lt;strong&gt;3.2.2 &lt;/strong&gt;&lt;a href="https://cwe.mitre.org/data/definitions/77.html" target="_blank"&gt;&lt;strong&gt;Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-77&lt;/strong&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allowing remote code execution due to improper handling of user input. When used with default credentials, this enables attackers to execute arbitrary commands on the device that could cause potential unauthorized access, service disruption, and data exposure.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7769" target="_blank"&gt;CVE-2025-7769&lt;/a&gt; has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" target="_blank"&gt;AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;A CVSS v4 score has also been calculated for &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7769" target="_blank"&gt;CVE-2025-7769&lt;/a&gt;. A base score of 8.7 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank"&gt;AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;).&lt;/p&gt;
&lt;h4 id="323-predictable-seed-in-pseudo-random-number-generator-prng-cwe-337"&gt;&lt;strong&gt;3.2.3 &lt;/strong&gt;&lt;a href="https://cwe.mitre.org/data/definitions/337.html" target="_blank"&gt;&lt;strong&gt;Predictable Seed in Pseudo-Random Number Generator (PRNG) CWE-337&lt;/strong&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this enables unauthorized access to sensitive device functions on connected solar optimization systems.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7770" target="_blank"&gt;CVE-2025-7770&lt;/a&gt; has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" target="_blank"&gt;AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;A CVSS v4 score has also been calculated for &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-7770" target="_blank"&gt;CVE-2025-7770&lt;/a&gt;. A base score of 8.7 has been calculated; the CVSS vector string is (&lt;a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" target="_blank"&gt;AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N&lt;/a&gt;).&lt;/p&gt;
&lt;h3 id="33-background"&gt;3.3 BACKGROUND&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CRITICAL INFRASTRUCTURE SECTORS:&lt;/strong&gt; Energy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;COUNTRIES/AREAS DEPLOYED:&lt;/strong&gt; Worldwide&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;COMPANY HEADQUARTERS LOCATION:&lt;/strong&gt; United States&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="34-researcher"&gt;3.4 RESEARCHER&lt;/h3&gt;
&lt;p&gt;Anthony Rose and Jacob Krasnov of BC Security and Peter Kariuki of Ovanova reported these vulnerabilities to CISA.&lt;/p&gt;
&lt;h2 id="4-mitigations"&gt;4. MITIGATIONS&lt;/h2&gt;
&lt;p&gt;Tigo Energy is aware of these vulnerabilities and is actively working on a fix to address them.&lt;/p&gt;
&lt;p&gt;Visit Tigo Energy's &lt;a href="https://support.tigoenergy.com/hc/en-us" target="_blank"&gt;Help Center&lt;/a&gt; for more specific security recommendations.&lt;/p&gt;
&lt;p&gt;CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Minimize network exposure for all control system devices and/or systems, ensuring they are &lt;a href="https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" target="_blank"&gt;not accessible from the internet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Locate control system networks and remote devices behind firewalls and isolating them from business networks.&lt;/li&gt;
&lt;li&gt;When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.&lt;/li&gt;
&lt;li&gt;CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CISA also provides a section for &lt;a href="https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" target="_blank"&gt;control systems security recommended practices&lt;/a&gt; on the ICS webpage on &lt;a href="https://www.cisa.gov/topics/industrial-control-systems" target="_blank"&gt;cisa.gov/ics&lt;/a&gt;. Several CISA products detailing cyber defense best practices are available for reading and download, including &lt;a href="https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" target="_blank"&gt;Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CISA encourages organizations to implement recommended cybersecurity strategies for &lt;a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" target="_blank"&gt;proactive defense of ICS assets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at &lt;a href="https://www.cisa.gov/topics/industrial-control-systems" target="_blank"&gt;cisa.gov/ics&lt;/a&gt; in the technical information paper, &lt;a href="https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" target="_blank"&gt;ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.&lt;/p&gt;
&lt;p&gt;No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.&lt;/p&gt;
&lt;h2 id="5-update-history"&gt;5. UPDATE HISTORY&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;August 5, 2025: Initial Publication&lt;/li&gt;
&lt;/ul&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/tigo-energy-cloud-connect-advanced-2961ee37/</guid><pubDate>Tue, 05 Aug 2025 12:00:00 GMT</pubDate></item><item><title>DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses</title><link>https://yieldsfalsehood.com/aeolus/posts/dhs-launches-over-100-million-in-funding-to-strengthen-communities-cyber-defenses-b59fa61d/</link><dc:creator>CISA</dc:creator><description></description><guid>https://yieldsfalsehood.com/aeolus/posts/dhs-launches-over-100-million-in-funding-to-strengthen-communities-cyber-defenses-b59fa61d/</guid><pubDate>Fri, 01 Aug 2025 12:00:00 GMT</pubDate></item><item><title>CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization</title><link>https://yieldsfalsehood.com/aeolus/posts/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization-32e19546/</link><dc:creator>CISA</dc:creator><description>&lt;div class="WordSection1"&gt;
&lt;h2&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (&lt;strong&gt;Note:&lt;/strong&gt; Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).&lt;/p&gt;
&lt;p&gt;During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Insufficient logging;&lt;/li&gt;
&lt;li&gt;Insecurely stored credentials;&lt;/li&gt;
&lt;li&gt;Shared local administrator (admin) credentials across many workstations;&lt;/li&gt;
&lt;li&gt;Unrestricted remote access for local admin accounts;&lt;/li&gt;
&lt;li&gt;Insufficient network segmentation configuration between IT and operational technology (OT) assets; and&lt;/li&gt;
&lt;li&gt;Several device misconfigurations.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) &lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="Cross-Sector Cybersecurity Performance Goals (CPGs)"&gt;Cross-Sector Cybersecurity Performance Goals (CPGs)&lt;/a&gt;, and with mitigations provided in the USCG Cyber Command’s (CGCYBER) &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;amp;timestamp=1747657640065" target="_blank" title="2024 Cyber Trends and Insights in the Marine Environment Report"&gt;2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Do not store passwords or credentials in plaintext. &lt;/strong&gt;Instead, &lt;strong&gt;use secure password and credential management solutions &lt;/strong&gt;such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ensure that all credentials are encrypted &lt;/strong&gt;both at rest and in transit. Implement&lt;strong&gt; strict access controls and regular audits &lt;/strong&gt;to securely manage scripts or tools accessing credentials.&lt;/li&gt;
&lt;li&gt;Use code reviews and automated scanning tools to&lt;strong&gt; detect and eliminate any instances of plaintext credentials on hosts or workstations.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enforce the principle of least privilege&lt;/strong&gt;, only granting users and processes the access necessary to perform their functions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Avoid sharing local administrator account credentials. &lt;/strong&gt;Instead,&lt;strong&gt; provision unique, complex passwords for each account &lt;/strong&gt;using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.&lt;/li&gt;
&lt;li&gt;Enforce &lt;strong&gt;multifactor authentication (MFA) for all administrative access&lt;/strong&gt;, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.&lt;/li&gt;
&lt;li&gt;Implement and enforce strict policies to only &lt;strong&gt;use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks&lt;/strong&gt;, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement comprehensive (i.e., large coverage) and detailed logging across all systems&lt;/strong&gt;, including workstations, servers, network devices, and security appliances.
&lt;ul&gt;
&lt;li&gt;Ensure logs &lt;strong&gt;capture information such as authentication attempts, command-line executions with arguments, and network connections&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Retain logs for an appropriate period to enable thorough historical analysis&lt;/strong&gt; (adhering to organizational policies and compliance requirements) and &lt;strong&gt;aggregate logs in an out-of-band, centralized location&lt;/strong&gt;, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more detailed mitigations addressing the identified cybersecurity risks, see the &lt;strong&gt;Mitigations &lt;/strong&gt;section of this advisory.&lt;/p&gt;
&lt;p&gt;Download the PDF version of this report:&lt;/p&gt;





&lt;div class="c-file"&gt;
    &lt;div class="c-file__download"&gt;
    &lt;a class="c-file__link" href="https://www.cisa.gov/sites/default/files/2025-08/joint-advisory-cisa-identifies-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-508c.pdf" target="_blank"&gt;AA25-212A CISA and USCG Identify Areas for Cyber Hygiene Improvement&lt;/a&gt;
    &lt;span class="c-file__size"&gt;(PDF,       537.67 KB
  )&lt;/span&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;strong&gt;Technical Details&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This advisory uses the &lt;a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;amp;CK Matrix for Enterprise"&gt;MITRE ATT&amp;amp;CK&lt;sup&gt;®&lt;/sup&gt; Matrix for Enterprise&lt;/a&gt; framework, version 17. See &lt;strong&gt;Appendix: MITRE ATT&amp;amp;CK Tactics and Techniques&lt;/strong&gt; for a table of potential activity mapped to MITRE ATT&amp;amp;CK tactics and techniques.&lt;/p&gt;
&lt;h3&gt;Overview&lt;/h3&gt;
&lt;p&gt;Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.&lt;/p&gt;
&lt;p&gt;While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations&lt;strong&gt; &lt;/strong&gt;section below).&lt;/p&gt;
&lt;p&gt;Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;amp;timestamp=1747657640065" target="_blank" title="Cyber Trends and Insights in the Marine Environment (CTIME) Report"&gt;2024 Cyber Trends and Insights in the Marine Environment (CTIME)&lt;/a&gt; report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.&lt;/p&gt;
&lt;h3&gt;Key Findings&lt;/h3&gt;
&lt;h4&gt;&lt;strong&gt;Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Details: &lt;/strong&gt;CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Impact: &lt;/strong&gt;The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like &lt;code&gt;net user /add&lt;/code&gt;, identifying scripts containing usernames and passwords [&lt;a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/" target="_blank" title="T1552.001"&gt;T1552.001&lt;/a&gt;], and accessing these accounts to move laterally.&lt;/p&gt;
&lt;p&gt;For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1078/003/" target="_blank" title="T1078.003"&gt;T1078.003&lt;/a&gt;], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001"&gt;T1021.001&lt;/a&gt;]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.&lt;/p&gt;
&lt;p&gt;The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.&lt;/p&gt;
&lt;p&gt;With local admin access, malicious cyber actors can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Modify existing accounts or create new accounts [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1098/" target="_blank" title="T1098"&gt;T1098&lt;/a&gt;], potentially escalating privileges or maintaining persistent access.&lt;/li&gt;
&lt;li&gt;Install malicious browser extensions on compromised systems [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1112/" target="_blank" title="T1112"&gt;T1112&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;Communicate with compromised systems using standard application layer protocols [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071"&gt;T1071&lt;/a&gt;], which may bypass certain security monitoring tools.&lt;/li&gt;
&lt;li&gt;Modify local policies to escalate privileges or disable security features [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1484/" target="_blank" title="T1484"&gt;T1484&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;Alter system configurations or install software that executes at startup [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1547/" target="_blank" title="T1547"&gt;T1547&lt;/a&gt;], ensuring continued access and persistence.&lt;/li&gt;
&lt;li&gt;Hijack the execution flow of applications to inject malicious code [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1574/" target="_blank" title="T1574"&gt;T1574&lt;/a&gt;].&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This finding was associated with workstations only; servers and other devices were not affected.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt; While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.&lt;/p&gt;
&lt;p&gt;First, CISA determined it was possible to establish a connection via port &lt;code&gt;21&lt;/code&gt; from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [&lt;a href="https://attack.mitre.org/versions/v15/techniques/T1078/" target="_blank" title="T1078"&gt;T1078&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Impact: &lt;/strong&gt;Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078"&gt;T1078&lt;/a&gt;] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.&lt;/p&gt;
&lt;p&gt;Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001"&gt;T1021.001&lt;/a&gt;] [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004"&gt;T1021.004&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;Execute commands and scripts using scripting languages like PowerShell to attack OT systems [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059"&gt;T1059&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;Map network connections to identify paths to OT systems [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049"&gt;T1049&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;Gather information about network configurations to plan attacks on OT systems [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016"&gt;T1016&lt;/a&gt;].&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Insufficient Log Retention and Implementation&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt; CISA was unable to hunt for every MITRE ATT&amp;amp;CK&lt;sup&gt;®&lt;/sup&gt; procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID &lt;code&gt;4688&lt;/code&gt;), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Impact: &lt;/strong&gt;The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as &lt;a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques"&gt;living-off-the-land techniques,&lt;/a&gt; the use of valid accounts [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078"&gt;T1078&lt;/a&gt;], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.&lt;/p&gt;
&lt;p&gt;Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.&lt;/p&gt;
&lt;h3&gt;Additional Findings&lt;/h3&gt;
&lt;h4&gt;&lt;strong&gt;Misconfigured sslFlags on a Production Server&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Details:&lt;/strong&gt; CISA used PowerShell to examine the &lt;code&gt;ApplicationHost.config&lt;/code&gt; file&lt;sup&gt;[&lt;/sup&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref1" title="Footnote Reference 1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt;—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with &lt;code&gt;sslFlags==“0”&lt;/code&gt;, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding &lt;code&gt;&amp;lt;access sslFlags=“Ssl, SslRequireCert” /&amp;gt;&lt;/code&gt;, the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, &lt;code&gt;sslFlags&lt;/code&gt; does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)&lt;sup&gt;[&lt;/sup&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref2" title="Footnote Reference 2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt; has been explicitly hardened.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Impact: &lt;/strong&gt;The misconfigured &lt;code&gt;sslFlags&lt;/code&gt; could enable threat actors to attempt an adversary-in-the-middle attack [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1557/" target="_blank" title="T1557"&gt;T1557&lt;/a&gt;] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1562/010/" target="_blank" title="T1562.010"&gt;T1562.010&lt;/a&gt;]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Misconfigured Structured Query Language Connections on a Production Server&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Details: &lt;/strong&gt;CISA reviewed &lt;code&gt;machine.config&lt;/code&gt; file on a production server and identified that it was configured with a centralized database connection string, &lt;code&gt;LocalSqlServer&lt;/code&gt;, for both profile and role providers. This configuration implies that, unless overridden in each application’s &lt;code&gt;web.config&lt;/code&gt; files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or &lt;code&gt;aspnetdb&lt;/code&gt; database and shares the same credentials context.&lt;/p&gt;
&lt;p&gt;Additionally, CISA identified that the &lt;code&gt;machine.config&lt;/code&gt; file set the &lt;code&gt;minRequiredPasswordLength&lt;/code&gt; to be less than 15 characters, which is &lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CISA’s recommended password length"&gt;CISA’s recommended password length&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Impact: Using a centralized database approach &lt;/strong&gt;increases risk, as a single breach or misconfiguration in this central SQL database server can compromise &lt;strong&gt;all &lt;/strong&gt;applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.&lt;/p&gt;
&lt;p&gt;Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001"&gt;T1110.001&lt;/a&gt;], cracking [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002"&gt;T1110.002&lt;/a&gt;], spraying [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003"&gt;T1110.003&lt;/a&gt;], and credential stuffing [&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/004/" target="_blank" title="T1110.004"&gt;T1110.004&lt;/a&gt;]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Mitigations&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.&lt;/p&gt;
&lt;p&gt;These mitigations align with the &lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="Cross-Sector Cybersecurity Performance Goals"&gt;Cross-Sector Cybersecurity Performance Goals&lt;/a&gt; jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s &lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="CPGs webpage"&gt;CPGs webpage&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Many of these mitigations also align with recommendations made by CGCYBER in their &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report"&gt;2024 CTIME report&lt;/a&gt;. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report"&gt;2024 CTIME report&lt;/a&gt; for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.&lt;/p&gt;
&lt;h3&gt;Implement Unique Credentials and Access Control Measures for Administrator Accounts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Provision unique and complex credentials for local administrator accounts &lt;/strong&gt;[&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#UniqueCredentials2C" title="CPG 2.C"&gt;CPG 2.C&lt;/a&gt;] on all systems. Do not use shared or identical administrative credentials across systems.&lt;strong&gt; &lt;/strong&gt;Ensure service accounts/machine accounts have passwords unique from all member user accounts.
&lt;ul&gt;
&lt;li&gt;For example, organizations can &lt;strong&gt;deploy Microsoft LAPS (see Microsoft Learn’s &lt;/strong&gt;&lt;a href="https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview" target="_blank" title="Windows LAPS Overview"&gt;Windows LAPS Overview&lt;/a&gt; for more information) &lt;strong&gt;to&lt;/strong&gt; ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Require &lt;/strong&gt;&lt;a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="phishing-resistant multifactor authentication (MFA)"&gt;&lt;strong&gt;phishing-resistant multifactor authentication (MFA)&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; [&lt;/strong&gt;&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H"&gt;&lt;strong&gt;CPG 2.H&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, &lt;/strong&gt;RDP sessions, and VPN connections.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use privileged access workstations (PAWs) dedicated solely for administrative tasks &lt;/strong&gt;and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
&lt;ul&gt;
&lt;li&gt;Harden PAWs by applying &lt;a href="https://www.cisecurity.org/cis-benchmarks" target="_blank" title="CIS Benchmarks"&gt;CIS Benchmarks&lt;/a&gt;: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.&lt;/li&gt;
&lt;li&gt;Enforce strict access controls to restrict PAW access to authorized administrators only.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Conduct continuous auditing of privileged accounts &lt;/strong&gt;by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T"&gt;CPG 2.T&lt;/a&gt;].
&lt;ul&gt;
&lt;li&gt;Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.&lt;/li&gt;
&lt;li&gt;Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with &lt;a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5"&gt;NIST SP 800-53 Rev. 5&lt;/a&gt; Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Apply the principle of least privilege &lt;/strong&gt;by limiting administrative privileges to the minimum required for users to perform their roles [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="CPG 2.E"&gt;CPG 2.E&lt;/a&gt;].
&lt;ul&gt;
&lt;li&gt;Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.&lt;/li&gt;
&lt;li&gt;Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.&lt;/li&gt;
&lt;li&gt;Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with &lt;a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5"&gt;NIST SP 800-53 Rev. 5&lt;/a&gt; Control AC-5 (Separation of Duties).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identify and remove unauthorized or unnecessary local administrator accounts&lt;/strong&gt;, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Securely Store and Manage Credentials&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Purge credentials from the System Center Configuration Manager (SCCM)&lt;/strong&gt;. Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Do not store plaintext credentials in scripts&lt;/strong&gt;. Instead, store&lt;strong&gt; credentials in a secure manner, &lt;/strong&gt;such as with a credential/password manager or vault, or other privileged account management solution [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureSensitiveData2L" title="CPG 2.L"&gt;CPG 2.L&lt;/a&gt;].
&lt;ul&gt;
&lt;li&gt;Leverage SCCM’s built-in capabilities to run tasks with administrative privileges without exposing credentials (for further guidance, refer to &lt;a href="https://learn.microsoft.com/en-us/mem/configmgr/security/" target="_blank" title="Microsoft’s best practices for secure SCCM configuration"&gt;Microsoft’s best practices for secure SCCM configuration&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use encrypted communication&lt;/strong&gt;. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use unique local administrator passwords&lt;/strong&gt;,&lt;strong&gt; &lt;/strong&gt;such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (&lt;code&gt;ms-MCS-AdmPwd&lt;/code&gt; and &lt;code&gt;ms-MCS-AdmPwdExpirationTime&lt;/code&gt;) per Microsoft’s security recommendations.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Establish Network Segmentation Between IT and OT Environments&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Assess the existing network architecture to ensure effective segmentation between the IT and OT networks&lt;/strong&gt; [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F"&gt;CPG 2.F&lt;/a&gt;]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
&lt;ul&gt;
&lt;li&gt;Use &lt;a href="https://doi.org/10.6028/NIST.SP.800-82r3" target="_blank" title="NIST SP 800-82 Rev. 3"&gt;NIST SP 800-82 Rev. 3&lt;/a&gt; (Guide to OT Security) and &lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" target="_blank" title="International Electrotechnical Commission (IEC) 62443"&gt;International Electrotechnical Commission (IEC) 62443&lt;/a&gt; standards as guides for network segmentation best practices.&lt;/li&gt;
&lt;li&gt;Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
&lt;ul&gt;
&lt;li&gt;Implement VLAN segmentation with inter-VLAN access controls.&lt;/li&gt;
&lt;li&gt;Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.&lt;/li&gt;
&lt;li&gt;Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.&lt;/li&gt;
&lt;li&gt;Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement a demilitarized zone (DMZ)&lt;/strong&gt; &lt;strong&gt;between IT and OT environments&lt;/strong&gt; to provide an additional security layer.
&lt;ul&gt;
&lt;li&gt;Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.&lt;/li&gt;
&lt;li&gt;Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.&lt;/li&gt;
&lt;li&gt;Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.&lt;sup&gt;[&lt;/sup&gt;&lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref3" title="Footnote Reference 3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement unidirectional gateways (data diodes) &lt;/strong&gt;where appropriate to prevent bidirectional communication.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Keep network diagrams, configuration files, and asset inventories up to date.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Regularly test segmentation controls&lt;/strong&gt; to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
&lt;ul&gt;
&lt;li&gt;Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.&lt;/li&gt;
&lt;li&gt;Ensure compliance with &lt;a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5"&gt;NIST SP 800-53 Rev. 5&lt;/a&gt; Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Prevent Unauthorized Access via Port 21&lt;/strong&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. &lt;/strong&gt;Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Block inbound and outbound FTP traffic on port &lt;/strong&gt;&lt;code&gt;&lt;strong&gt;21&lt;/strong&gt;&lt;/code&gt;&lt;strong&gt; using firewalls and ACLs.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.&lt;/li&gt;
&lt;li&gt;As outlined in &lt;a href="https://cas.docs.cisecurity.org/en/latest/source/Controls9/" target="_blank" title="CIS Control 9.2"&gt;CIS Control 9.2&lt;/a&gt; (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN&lt;/strong&gt;, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enhance authentication and encryption mechanisms. &lt;/strong&gt;Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Perform network traffic filtering and deep packet inspection.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.&lt;/li&gt;
&lt;li&gt;Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Establish Secure Bastion Hosts for OT Network Access&lt;/strong&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ensure bastion hosts are dedicated secure access points &lt;/strong&gt;exclusively used to access the OT network and deployed as&lt;strong&gt; exclusive management gateways for all devices within a network&lt;/strong&gt;.
&lt;ul&gt;
&lt;li&gt;Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Do not allow staff to use bastion hosts as regular workstations&lt;/strong&gt;.
&lt;ul&gt;
&lt;li&gt;Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.&lt;/li&gt;
&lt;li&gt;Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Regularly audit and monitor bastion hosts &lt;/strong&gt;to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure comprehensive logging of all activities on bastion hosts, &lt;/strong&gt;including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Isolate bastion hosts from the IT network&lt;/strong&gt;; bastion hosts should reside in a separate security zone with restricted communication pathways&lt;strong&gt; &lt;/strong&gt;(see CISA’s infographic on &lt;a href="https://www.cisa.gov/sites/default/files/2023-01/layering-network-security-segmentation_infographic_508_0.pdf" title="Layering Network Security Through Segmentation"&gt;Layering Network Security Through Segmentation&lt;/a&gt;).
&lt;ul&gt;
&lt;li&gt;Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.&lt;/li&gt;
&lt;li&gt;Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ensure secure configuration and hardening of bastion hosts: &lt;/strong&gt;Comply with &lt;a href="https://csrc.nist.gov/publications/detail/sp/800-123/final" target="_blank" title="NIST SP 800-123"&gt;NIST SP 800-123&lt;/a&gt; and &lt;a href="https://www.cisecurity.org/cis-benchmarks" target="_blank" title="CIS Benchmarks"&gt;CIS Benchmarks&lt;/a&gt; and &lt;a href="https://nsarchive.gwu.edu/document/22385-document-08-committee-national-security" target="_blank" title="CNSSI 4009-2015"&gt;CNSSI 4009-2015&lt;/a&gt;, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement access control policies:&lt;/strong&gt; remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
&lt;ul&gt;
&lt;li&gt;Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Equip each bastion host with robust authentication mechanisms, &lt;/strong&gt;including&lt;strong&gt; &lt;/strong&gt;phishing resistant MFA [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H"&gt;CPG 2.H&lt;/a&gt;], to verify the identity of users accessing the network.
&lt;ul&gt;
&lt;li&gt;Align with AAL3 as defined in &lt;a href="https://pages.nist.gov/800-63-3/sp800-63b.html" target="_blank" title="NIST SP 800-63B"&gt;NIST SP 800-63B&lt;/a&gt;. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement stringent access controls that restrict access to authorized personnel only using RBAC principles&lt;/strong&gt;, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Securely configure remote access tools, &lt;/strong&gt;including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
&lt;ul&gt;
&lt;li&gt;Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.&lt;/li&gt;
&lt;li&gt;Log all remote access sessions and monitor for unauthorized or anomalous activities.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Implement Comprehensive Logging, Log Retention, and Analysis&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Implement comprehensive and verbose (i.e., detailed) logging across all systems, &lt;/strong&gt;including workstations, servers, network devices, and security appliances [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T"&gt;CPG 2.T&lt;/a&gt;].
&lt;ul&gt;
&lt;li&gt;Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID &lt;code&gt;4688&lt;/code&gt;), and network connections.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Aggregate logs in an out-of-band, centralized location&lt;/strong&gt; [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="CPG 2.U"&gt;CPG 2.U&lt;/a&gt;] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T"&gt;CPG 2.T&lt;/a&gt;, &lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="2.U"&gt;2.U&lt;/a&gt;]. For more information on behavior- and anomaly-based detection techniques, see joint guidance &lt;a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living off the Land"&gt;Identifying and Mitigating Living off the Land&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ensure comprehensive logging on bastion hosts for all activities&lt;/strong&gt;. Capture detailed records of login attempts [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectionofUnsuccessfulAutomatedLoginAttempts2G" title="CPG 2.G"&gt;CPG 2.G&lt;/a&gt;], commands executed (with command arguments enabled), configurations changed, and files transferred.
&lt;ul&gt;
&lt;li&gt;Integrate bastion hosts with a centralized SIEM (&lt;a href="https://doi.org/10.6028/NIST.SP.800-137" target="_blank" title="NIST SP 800-137"&gt;NIST SP 800-137&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Continuously monitor logs&lt;/strong&gt; for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Securely store log backups and use tamper resistant storage &lt;/strong&gt;[&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="CPG 2.U"&gt;CPG 2.U&lt;/a&gt;] to prevent a threat actor from altering or purging logs to conceal malicious activity.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For additional guidance on logging, see joint guidance &lt;a href="https://www.cyber.gov.au/sites/default/files/2024-08/best-practices-for-event-logging-and-threat-detection.pdf" target="_blank" title="Best Practices for Event Logging and Threat Detection"&gt;Best Practices for Event Logging and Threat Detection&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Securely Configure HTTPS Bindings and LocalSqlServer Connection String&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enforce both client certificate verification and secure renegotiation in IIS by configuring the &lt;code&gt;sslFlags&lt;/code&gt; setting to &lt;code&gt;“3”&lt;/code&gt; in the &lt;code&gt;ApplicationHost.config&lt;/code&gt; file. Setting &lt;code&gt;sslFlags=“3”&lt;/code&gt; requires clients to present valid &lt;code&gt;X.509&lt;/code&gt; certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
&lt;ul&gt;
&lt;li&gt;Locate the &lt;code&gt;&amp;lt;binding&amp;gt;&lt;/code&gt; element for the HTTPS site within &lt;code&gt;ApplicationHost.config&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Set the &lt;code&gt;sslFlags&lt;/code&gt; attribute to &lt;code&gt;“3”&lt;/code&gt;: &lt;code&gt;&amp;lt;binding protocol=“https” bindingInformation=“*:443:” sslFlags=“3” /&amp;gt;&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Restart IIS to apply the changes: &lt;code&gt;iisreset&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Override the global settings in &lt;/strong&gt;&lt;code&gt;&lt;strong&gt;machine.config&lt;/strong&gt;&lt;/code&gt; by modifying each application’s &lt;code&gt;web.config&lt;/code&gt; file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations &lt;/strong&gt;(e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
&lt;ul&gt;
&lt;li&gt;Do not assign roles like &lt;code&gt;db_owner&lt;/code&gt; or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use &lt;/strong&gt;&lt;code&gt;&lt;strong&gt;machine.config&lt;/strong&gt;&lt;/code&gt;&lt;strong&gt; only for configurations that must be applied globally&lt;/strong&gt; across all applications on the server.
&lt;ul&gt;
&lt;li&gt;Audit the &lt;code&gt;machine.config&lt;/code&gt; file to ensure no application-specific settings are present.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Enforce Strong Password Policies&lt;/strong&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Implement a system-enforced policy that requires a minimum password length of 15 or more characters&lt;/strong&gt; for all password-protected IT assets and all OT assets, when technically feasible [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CPG 2.B"&gt;CPG 2.B&lt;/a&gt;].
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Consider leveraging passphrases and password managers&lt;/strong&gt; to make it easier for users to maintain sufficiently long passwords.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;In instances where minimum password lengths are not technically feasible, &lt;strong&gt;apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation&lt;/strong&gt;. Prioritize these systems for upgrade or replacement.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implement MFA&lt;/strong&gt; [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H"&gt;CPG 2.H&lt;/a&gt;] in addition to strong passwords (i.e., passwords 15 characters or longer).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Additional Mitigation Recommendations to Strengthen Cybersecurity&lt;/h3&gt;
&lt;p&gt;CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network&lt;/strong&gt;. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec)&lt;/strong&gt; [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#StrongandAgileEncryption2K" title="CPG 2.K"&gt;CPG 2.K&lt;/a&gt;] to safeguard data integrity and confidentiality; use MFA [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H"&gt;CPG 2.H&lt;/a&gt;] at all VPN access points to ensure only authorized personnel can gain access.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network&lt;/strong&gt;, ensuring comprehensive validation of all communications through pre-defined security policies.
&lt;ul&gt;
&lt;li&gt;VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Align the VPN traffic monitoring with the DMZ’s capabilities to &lt;strong&gt;regulate and inspect the data flow between IT and OT environments&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;As part of the broader network architecture review, &lt;strong&gt;ensure the VPN infrastructure is correctly segmented from other network resources&lt;/strong&gt; [&lt;a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F"&gt;CPG 2.F&lt;/a&gt;] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts&lt;/strong&gt;. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;If wireless technology is employed within the OT environment, &lt;strong&gt;implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS&lt;/strong&gt; to ensure data confidentiality and integrity.
&lt;ul&gt;
&lt;li&gt;Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.&lt;/li&gt;
&lt;li&gt;Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Validate Security Controls&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&amp;amp;CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&amp;amp;CK techniques described in this advisory.&lt;/p&gt;
&lt;p&gt;To get started:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Select an ATT&amp;amp;CK technique described in this advisory (see &lt;strong&gt;Table 1&lt;/strong&gt; to &lt;strong&gt;Table 9&lt;/strong&gt;).&lt;/li&gt;
&lt;li&gt;Align your security technologies against the technique.&lt;/li&gt;
&lt;li&gt;Test your technologies against the technique.&lt;/li&gt;
&lt;li&gt;Analyze your detection and prevention technologies’ performance.&lt;/li&gt;
&lt;li&gt;Repeat the process for all security technologies to obtain a set of comprehensive performance data.&lt;/li&gt;
&lt;li&gt;Tune your security program—including people, processes, and technologies—based on the data generated by this process.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;amp;CK techniques identified in this advisory.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Contact Information&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CISA via CISA’s 24/7 Operations Center (&lt;a href="mailto:SOC@mail.cisa.dhs.gov" title="SOC@mail.cisa.dhs.gov"&gt;SOC@mail.cisa.dhs.gov&lt;/a&gt; or 888-282-0870) or your local &lt;a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="FBI field office"&gt;FBI field office&lt;/a&gt;. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.&lt;/li&gt;
&lt;li&gt;Coast Guard, for Maritime Transportation System Subsector organizations. Report malicious activities to the Coast Guard’s National Response Center (1-800-424-8802) per &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/BOS_SA_Cyber%20Reporting%20NVIC.pdf" target="_blank" title="Navigation and Vessel Inspection Circular (NVIC) 02-24"&gt;Navigation and Vessel Inspection Circular (NVIC) 02-24&lt;/a&gt; when facilities observe any unusual activity or interruptions to their network. For additional Coast Guard resources, please visit the &lt;a href="https://www.uscg.mil/MaritimeCyber/" target="_blank" title="Coast Guard Maritime Industry Cybersecurity Resource Center website"&gt;Coast Guard Maritime Industry Cybersecurity Resource Center website&lt;/a&gt;. CGCYBER can also be contacted at &lt;a href="mailto:maritimecyber@uscg.mil" target="_blank" title="maritimecyber@uscg.mil"&gt;maritimecyber@uscg.mil&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Additional Resources&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CGCYBER &lt;a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report"&gt;2024 CTIME Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Joint Guidance &lt;a href="https://www.cisa.gov/resources-tools/resources/best-practices-event-logging-and-threat-detection" title="Best Practices for Event Logging and Threat Detection"&gt;Best Practices for Event Logging and Threat Detection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Joint Guidance &lt;a href="https://www.cisa.gov/resources-tools/resources/principles-operational-technology-cyber-security" title="Principles of Operational Technology Cyber Security"&gt;Principles of Operational Technology Cyber Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Version History&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;July 31, 2025:&lt;/strong&gt; Initial version.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Appendix: MITRE ATT&amp;amp;CK Tactics and Techniques&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;See &lt;strong&gt;Table 1&lt;/strong&gt; to &lt;strong&gt;Table 9&lt;/strong&gt; for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;amp;CK framework, see CISA and MITRE ATT&amp;amp;CK’s &lt;a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;amp;CK Mapping"&gt;Best Practices for MITRE ATT&amp;amp;CK Mapping&lt;/a&gt; and CISA’s &lt;a href="https://github.com/cisagov/Decider/" title="Decider Tool"&gt;Decider Tool&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 1: Initial Access&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Valid Accounts&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078"&gt;T1078&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use access to valid accounts for access to IT and OT networks.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Valid Accounts: Local Accounts&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1078/003/" target="_blank" title="T1078.003"&gt;T1078.003&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Account Manipulation&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1098/" target="_blank" title="T1098"&gt;T1098&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 2: Execution&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Command and Scripting Interpreter &lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059"&gt;T1059&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use script interpreters like PowerShell to execute commands and scripts. &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 3: Persistence&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Boot or Autostart Execution&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1547/" target="_blank" title="T1547"&gt;T1547&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could configure autostart execution paths to ensure persistence.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hijack Execution Flow&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1574/" target="_blank" title="T1574"&gt;T1574&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could hijack the execution flow of applications and inject malicious code.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 4: Privilege Escalation&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Domain or Tenant Policy Modification&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1484/" target="_blank" title="T1484"&gt;T1484&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could modify domain policies to escalate privileges or evade defenses.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 5: Defense Evasion&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Modify Registry&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1112/" target="_blank" title="T1112"&gt;T1112&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could install malicious browser extensions on compromised systems.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Impair Defenses: Downgrade Attack&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1562/010/" target="_blank" title="T1562.010"&gt;T1562.010&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 6: Credential Access&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Unsecured Credentials: Credentials in Files&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1552/001/" target="_blank" title="T1552.001"&gt;T1552.001&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could search for and exploit credentials stored in unsecured files. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OS Credential Dumping&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1003/" target="_blank" title="T1003"&gt;T1003&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could extract credentials from memory or storage from unsecured workstations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Adversary-in-the-Middle&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1557/" target="_blank" title="T1557"&gt;T1557&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could position themselves between networked devices to intercept credentials and other data. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brute Force: Password Guessing&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001"&gt;T1110.001&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could systematically guess possible passwords.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brute Force: Password Cracking&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002"&gt;T1110.002&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brute Force: Password Spraying&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003"&gt;T1110.003&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could attempt to use a common password against different accounts to try to obtain account access. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brute Force: Credential Stuffing&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1110/004/" target="_blank" title="T1110.004"&gt;T1110.004&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 7: Discovery&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;System Network Connections Discovery&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049"&gt;T1049&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System Network Configuration Discovery&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016"&gt;T1016&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use an unsecured workstation to discover network configurations.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 8: Lateral Movement&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Remote Services: Remote Desktop Protocol&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001"&gt;T1021.001&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use valid credentials to establish an RDP connection to access a workstation. &lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Services: SSH&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004"&gt;T1021.004&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use valid accounts to establish an SSH connection to a workstation.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table class="tablesaw tablesaw-stack"&gt;
&lt;caption&gt;&lt;em&gt;Table 9: Command and Control&lt;/em&gt;&lt;/caption&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Technique Title&lt;/th&gt;
&lt;th&gt;ID&lt;/th&gt;
&lt;th&gt;Use&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Application Layer Protocol&lt;/td&gt;
&lt;td&gt;&lt;a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071"&gt;T1071&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;hr&gt;
&lt;div&gt;
&lt;p&gt;&lt;sup&gt;[&lt;/sup&gt;&lt;a class="ck-anchor" id="_ftnref1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt; While CISA used PowerShell to review these configuration settings, they can also be identified by running a search in any text editor.&lt;br&gt;&lt;sup&gt;[&lt;/sup&gt;&lt;a class="ck-anchor" id="_ftnref2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt; For more information, see &lt;a href="https://learn.microsoft.com/en-us/windows/win32/com/schannel" target="_blank" title="Schannel – Microsoft Learn"&gt;Schannel – Microsoft Learn&lt;/a&gt;.&lt;br&gt;&lt;sup&gt;[&lt;/sup&gt;&lt;a class="ck-anchor" id="_ftnref3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt;]&lt;/sup&gt; Reference the Purdue Model for ICS Security as a guide for layered security zones and assess compliance with &lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" target="_blank" title="IEC 62443"&gt;IEC 62443&lt;/a&gt; network and system security standards; organizations may use this version of the model developed by Department of Energy (DOE) as a guide: &lt;a href="https://www.energy.gov/sites/default/files/2022-10/Infra_Topic_Paper_4-14_FINAL.pdf" target="_blank" title="Purdue Model Framework for Industrial Control Systems &amp;amp; Cybersecurity Segmentation"&gt;Purdue Model Framework for Industrial Control Systems &amp;amp; Cybersecurity Segmentation&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;</description><guid>https://yieldsfalsehood.com/aeolus/posts/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization-32e19546/</guid><pubDate>Thu, 31 Jul 2025 12:00:00 GMT</pubDate></item></channel></rss>