Home ยป China-Aligned Abuse msbuild, DCSync After Legacy CVE Break-ins

China-Aligned Abuse msbuild, DCSync After Legacy CVE Break-ins

Legacy CVEs and misconfigured IIS enable stealth access via msbuild and DCSync China-linked operators chain Log4j and IIS misconfig with msbuild, csc, and scheduled tasks to persist

Attackers with ties to China pursue long-term access rather than smash-and-grab. They scan old but still exposed flaws Log4Shell, Apache Struts RCE, Confluence OGNL, and GoAhead until one host gives way. Then they live off the land. They schedule tasks, launch msbuild.exe to run hidden payloads, inject into csc.exe, and beacon with low-noise tradecraft. Because they favor persistence over spectacle, they quietly map domain controllers and stage credential theft while teams chase unrelated alerts.

๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ถ๐—ป๐—ณ๐—ถ๐—น๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ณ๐—น๐—ผ๐˜„

Operators scanned a public-facing server in early April and probed multiple legacy vectors: CVE-2021-44228 (Log4j), CVE-2022-26134 (Confluence), CVE-2017-9805 (Struts), and CVE-2017-17562 (GoAhead). After days of quiet, they returned, tested outbound reach with curl, and shifted to discovery with netstat. Next, they planted a scheduled task that launched msbuild.exe on a timer. Because msbuild is trusted, EDR often ranks it low-risk unless analysts follow the process tree.

๐—Ÿ๐—œ๐—ก๐—˜๐—”๐—š๐—˜: ๐—บ๐˜€๐—ฏ๐˜‚๐—ถ๐—น๐—ฑ โ†’ ๐—ถ๐—ป๐—ท๐—ฒ๐—ฐ๐˜ ๐—ถ๐—ป๐˜๐—ผ ๐—ฐ๐˜€๐—ฐ.๐—ฒ๐˜…๐—ฒ โ†’ ๐— ๐—˜๐—  ๐—Ÿ๐—ข๐—”๐——

The task chain executed msbuild.exe to run an opaque project. That project injected code into csc.exe, which then opened command-and-control over a single IP. The loader unpacked a memory-resident payload likely a RAT with minimal disk dust. Because the path uses signed binaries and short bursts of activity, basic signature-based detections rarely fire. Therefore, defenders should track process ancestry and child process behavior, not just filenames.

๐—ฆ๐—ถ๐—ฑ๐—ฒ๐—น๐—ผ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด ๐—บ๐—ผ๐˜ƒ๐—ฒ๐˜€

On selected hosts, the crew executed vetysafe.exe (a legitimate VIPRE component) to sideload a malicious sbamres.dll. Similar DLL names surfaced in operations attributed to Salt Typhoon / Earth Estries, Earth Longzhi (an APT41 sub-cluster), and Space Pirates. The overlap signals shared tooling rather than a single actor. Even so, the tradecraft stays consistent: exploit an older edge, translate that foothold into scheduled execution, and then persist with signed-binary abuse.

๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„ ๐˜๐—ผ ๐——๐—–: ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐˜๐—ต๐—ฒ๐—ณ๐˜ ๐—ฎ๐—ป๐—ฑ ๐——๐—–๐—ฆ๐˜†๐—ป๐—ฐ

During the dwell period, the operators probed paths toward domain controllers. Their tooling set included DCSync-style replication abuse and an Imjpuexc utility seen in prior campaigns. As a result, once they hold the right group privileges, they can replicate secrets and expand laterally without dropping noisy password-dump tools. Because DCSync traffic looks legitimate, you must alert when non-DC endpoints request replication data.

๐—Ÿ๐—ฒ๐—ด๐—ฎ๐—ฐ๐˜† ๐—ฏ๐˜‚๐—ด๐˜€, ๐—ป๐—ฒ๐˜„ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ป๐—ฒ๐—น๐˜€: ๐—™๐—ฟ๐—ผ๐—บ ๐—Ÿ๐—ผ๐—ด๐Ÿฐ๐—ท ๐˜๐—ผ ๐—บ๐—ถ๐˜€๐—ฐ๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ๐—ฑ ๐—œ๐—œ๐—ฆ

Beyond classic CVEs, a Chinese-speaking cluster REF3927 now harvests publicly exposed ASP.NET machine keys to compromise misconfigured IIS servers. The crew deploys an SEO-cloaking backdoor โ€œTOLLBOOTHโ€ with web shell features. They can hide content from crawlers, run commands, and drop Godzilla shells or GotoHTTP remote access. Because this route requires no new 0-days just leaked machine keys and poor hygiene the campaign scales fast across hosting providers.

๐—ช๐—ต๐˜† ๐˜๐—ต๐—ถ๐˜€ ๐˜„๐—ผ๐—ฟ๐—ธ๐˜€ ๐—ฎ๐—ด๐—ฎ๐—ถ๐—ป๐˜€๐˜ ๐—ฒ๐—ป๐˜๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ฒ๐˜€

Legacy CVEs linger on perimeter systems. Admins leave msbuild.exe and other LOLBAS unrestricted. Certificate trust and scheduled tasks look harmless in isolation. Meanwhile, SEO cloaking on IIS muddies external signals and buys time. Consequently, the attackers chain quiet steps into durable access while teams rotate through patch cycles that never reach the oldest boxes.

๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ต๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด (๐—ฝ๐—ฟ๐—ผ๐˜€๐—ฒ, ๐—ป๐—ผ ๐—ฏ๐˜‚๐—น๐—ธ๐˜† ๐—น๐—ถ๐˜€๐˜๐˜€)

Track msbuild.exe launched by Task Scheduler and watch for csc.exe as a surprise child with network handles. Hunt for scheduled tasks that run hourly under SYSTEM. Correlate process lineage from network-facing services to the build chain. On the domain side, alert when non-DC hosts request replication privileges or call Directory Replication Service APIs. On the web tier, test IIS for reused machine keys and look for SEO-cloaking modules that alter content for crawlers. To validate an incident, replay the timeline from exploit โ†’ task creation โ†’ build invocation โ†’ code injection โ†’ beacon.

๐— ๐—ถ๐˜๐—ถ๐—ด๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ต๐—ฎ๐—ฟ๐—ฑ๐—ฒ๐—ป๐—ถ๐—ป๐—ด

Patch the edge first: Log4j, Struts, Confluence, and GoAhead instances exposed to the internet. Rotate any ASP.NET machine keys that may have leaked; regenerate and store them securely. Enforce application control so msbuild.exe cannot run arbitrary projects on servers. Lock down scheduled task creation to admins with logging and approval. On AD, restrict replication rights; alert on DCSync events from non-DCs. Finally, hunt for VIPRE sideloading artifacts and Godzilla/GotoHTTP traces on any IIS host that shows content cloaking.

๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ถ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ป๐—ฒ๐˜…๐˜ ๐˜€๐˜๐—ฒ๐—ฝ๐˜€

Inventory any server that recently exposed the listed CVEs. Review build tools on servers; msbuild.exe rarely belongs on front-end web nodes. Pull a 60-day task history and diff new or modified jobs. Rebind machine keys where IIS hosts share them across tenants. After eviction, run a credential hygiene sprint to rotate high-value secrets and close the post-exploitation path back to DCs.

This campaign reuses old doors and hides in normal tools. Because the flow looks routine scheduled tasks, msbuild, compiler processes teams miss the pivot. Close the legacy CVEs, restrict build tools on servers, watch for DCSync from non-DCs, and test IIS for machine-key misuse. If you reduce trust in โ€œitโ€™s signed, itโ€™s safe,โ€ you cut this operationโ€™s oxygen.

FAQs

Q: Why do attackers still win with Log4j and Struts today?
A: Many internet-facing systems never received complete fixes. Attackers combine wide scanning with selective follow-up, then trade noise for stealth once inside.

Q: How does IIS machine-key abuse lead to backdoors?
A: If an attacker learns or guesses an appโ€™s machineKey, they can authenticate as the server and load modules like TOLLBOOTH without tripping standard checks.

Q: Whatโ€™s the fastest control to block this chain?
A: Remove msbuild.exe from servers and deny its execution via application control. In parallel, rotate machine keys and enforce strict task-creation policies.

Q: How do we confirm DCSync misuse?
A: Alert when non-DC hosts initiate replication. Then review logs for DRS API calls tied to accounts with replication privileges and correlate with task or service creation.

Q: What should we monitor on IIS after cleanup?
A: Watch for SEO-cloaking behavior, unexpected module loads, Godzilla shell traces, and outbound connections from w3wp.exe to unfamiliar hosts.

Leave a Reply

Your email address will not be published. Required fields are marked *