当前位置:网站首页>Ice Scorpion V4.0 attack, security dog products can be fully detected
Ice Scorpion V4.0 attack, security dog products can be fully detected
2022-08-05 03:22:00 【Safe Dog News】
Disclaimer
Solemnly declare: The technology, ideas and tools involved in this account are only for learning and communication for the purpose of safety. No one may use them for illegal purposes, otherwise the consequences will be borne by themselves!
During the past two years of large-scale offensive and defensive drills, the "Ice Scorpion" caught many defensive units by surprise and miserable.But then, in response to the characteristics of Ice Scorpion, security manufacturers have also taken measures to update their own security products.When the horn of this year's actual offensive and defensive battles was officially launched, Ice Scorpion unexpectedly attacked with the "new look of 4.0", which once again made many defensive units unable to cope with it.
Faced with this threat, the Security Dog team has updated the rule base of "Webshell killing engine" on the afternoon of July 25, 2022.At the same time, SafeDog's products also have the function of "Injecting Memory Horse" for Ice Scorpion 4.0, and the "Memory Horse Killing Engine" supports detection by default.
This article will introduce the features and defense suggestions of Ice Scorpion V4.0, hoping to help defensive units during actual combat.
One
Ice Scorpion V4.0
1.The origin of the ice scorpion
The traditional webshell management tool "Chopper" has obvious attack traffic characteristics and is easy to be intercepted by detection equipment. Attackers urgently need a webshell with encrypted communication function.Due to traffic encryption, traditional WAF and IDS devices are difficult to detect.Therefore, a dynamic binary encrypted website management client "Ice Scorpion" came into being. The threats such as web page backdoor attacks and fileless attacks brought by Bing Scorpion have brought great trouble to traditional security products.
2Ice Scorpion V4.0
"Ice Scorpion" is one of the most popular WebShell management tools. The first-generation WebShell management tool "Chopper" has obvious traffic characteristics and can be easily detected.The traffic of Ice Scorpion is encrypted, which can effectively avoid the detection of traffic devices; the "Ice Scorpion" client is developed in Java, the latest version is v4.0, the management side is cross-platform, and supports ASP/ASPX/JSP/PHP and other environments.
Figure 1
In the latest V4.0, support Java Agent fileless land injection into memory horse.
Figure 2
It can be said that the revision of the Ice Scorpion made some of the measures and methods that the defenders made against the Ice Scorpion last year go to waste.
Second
Defense Suggestions for Ice Scorpion V4.0
1, Defendable points
(1) Focus on defending against file upload, file writing, and file inclusion vulnerabilities; (2) Built-in for Ice Scorpion V4.0Analyze the traffic side of all types of webshells, and detect each type of webshells in a targeted manner; (3) Enable monitoring of abnormal system behaviors to detect dangerous behaviors such as rebound shells and execution of high-risk system commands; (4) Do a good job of checking the security baseline, revise the security baseline in time, and record and warn of suspicious behaviors of suspicious files to facilitate auditing. |
2, Security Dog Cloud Eye can detect Ice Scorpion V4.0
The new-generation cloud host intrusion monitoring and security management platform "Cloud Eye" has functions such as "Webshell killing" and "Memory horse detection" that support the application of Ice Scorpion 4.0Attack detection. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" can also be detected.
Host Webshell killing
Figure 3
Host memory check
Figure 4
3Security Dog Cloud Armor can detect Ice Scorpion V4.0
The adaptive container security management system "Yunjia" supports functions such as "Image Webshell Scanning", "Container Webshell Scanning", and "Container Memory Horse Detection"Detect the attack of Ice Scorpion 4.0. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" and "behavior model" can also be detected.
Mirror Webshell killing
Figure 5
Container Webshell Killing
Figure 6
Container memory detection
Figure 7
References
https://github.com/rebeyond/Behinder
边栏推荐
- The linear table lookup
- On governance and innovation, the 2022 OpenAtom Global Open Source Summit OpenAnolis sub-forum came to a successful conclusion
- How to transfer a single node of Youxuan database to a cluster
- public static
List asList(T... a) What is the prototype? - 金仓数据库如何验证安装文件平台正确性
- The second council meeting of the Dragon Lizard Community was successfully held!Director general election, 4 special consultants joined
- STM32 uses stm32cubemx LL library series tutorial
- YYGH-13-Customer Service Center
- You may use special comments to disable some warnings. Three ways to report errors
- 2022高处安装、维护、拆除考试题模拟考试题库及在线模拟考试
猜你喜欢
On governance and innovation, the 2022 OpenAtom Global Open Source Summit OpenAnolis sub-forum came to a successful conclusion
Why is the pca component not associated
腾讯云【Hiflow】新时代自动化工具
Study Notes-----Left-biased Tree
Never put off till tomorrow what you can put - house lease management system based on the SSM
IJCAI2022 | DictBert: Pre-trained Language Models with Contrastive Learning for Dictionary Description Knowledge Augmentation
How to sort multiple fields and multiple values in sql statement
ASP.NET应用程序--Hello World
dmp (dump) dump file
Web3.0 Dapps——通往未来金融世界的道路
随机推荐
ffmpeg pixel format basics
Leading the highland of digital medicine, Zhongshan Hospital explores to create a "new paradigm" for future hospitals
How Jin Cang database correctness verification platform installation file
优炫数据库的单节点如何转集群
In 2022, you still can't "low code"?Data science can also play with Low-Code!
【软件测试】自动化测试之unittest框架
用CH341A烧录外挂Flash (W25Q16JV)
为什么pca分量没有关联
Queue Topic: Recent Requests
【已解决】Unity Coroutinue 协程未有效执行的问题
[Storage] Dawning Storage DS800-G35 ISCSI maps each LUN to the server
Summary of domestic environments supported by SuperMap
MRTK3 develops Hololens application - gesture drag, rotate, zoom object implementation
J9 Digital Currency: What is the creator economy of web3?
Intersection of Boolean Operations in SuperMap iDesktop.Net - Repairing Complex Models with Topological Errors
沃谈小知识 |“远程透传”那点事儿
public static <T> List<T> asList(T... a) 原型是怎么回事?
Review 51 MCU
2022高处安装、维护、拆除考试题模拟考试题库及在线模拟考试
通过模拟Vite一起深入其工作原理