当前位置:网站首页>Ice Scorpion V4.0 attack, security dog products can be fully detected
Ice Scorpion V4.0 attack, security dog products can be fully detected
2022-08-05 03:22:00 【Safe Dog News】
Disclaimer
Solemnly declare: The technology, ideas and tools involved in this account are only for learning and communication for the purpose of safety. No one may use them for illegal purposes, otherwise the consequences will be borne by themselves!
During the past two years of large-scale offensive and defensive drills, the "Ice Scorpion" caught many defensive units by surprise and miserable.But then, in response to the characteristics of Ice Scorpion, security manufacturers have also taken measures to update their own security products.When the horn of this year's actual offensive and defensive battles was officially launched, Ice Scorpion unexpectedly attacked with the "new look of 4.0", which once again made many defensive units unable to cope with it.
Faced with this threat, the Security Dog team has updated the rule base of "Webshell killing engine" on the afternoon of July 25, 2022.At the same time, SafeDog's products also have the function of "Injecting Memory Horse" for Ice Scorpion 4.0, and the "Memory Horse Killing Engine" supports detection by default.
This article will introduce the features and defense suggestions of Ice Scorpion V4.0, hoping to help defensive units during actual combat.
One
Ice Scorpion V4.0
1.The origin of the ice scorpion
The traditional webshell management tool "Chopper" has obvious attack traffic characteristics and is easy to be intercepted by detection equipment. Attackers urgently need a webshell with encrypted communication function.Due to traffic encryption, traditional WAF and IDS devices are difficult to detect.Therefore, a dynamic binary encrypted website management client "Ice Scorpion" came into being. The threats such as web page backdoor attacks and fileless attacks brought by Bing Scorpion have brought great trouble to traditional security products.
2Ice Scorpion V4.0
"Ice Scorpion" is one of the most popular WebShell management tools. The first-generation WebShell management tool "Chopper" has obvious traffic characteristics and can be easily detected.The traffic of Ice Scorpion is encrypted, which can effectively avoid the detection of traffic devices; the "Ice Scorpion" client is developed in Java, the latest version is v4.0, the management side is cross-platform, and supports ASP/ASPX/JSP/PHP and other environments.

Figure 1
In the latest V4.0, support Java Agent fileless land injection into memory horse.

Figure 2
It can be said that the revision of the Ice Scorpion made some of the measures and methods that the defenders made against the Ice Scorpion last year go to waste.
Second
Defense Suggestions for Ice Scorpion V4.0
1, Defendable points
(1) Focus on defending against file upload, file writing, and file inclusion vulnerabilities; (2) Built-in for Ice Scorpion V4.0Analyze the traffic side of all types of webshells, and detect each type of webshells in a targeted manner; (3) Enable monitoring of abnormal system behaviors to detect dangerous behaviors such as rebound shells and execution of high-risk system commands; (4) Do a good job of checking the security baseline, revise the security baseline in time, and record and warn of suspicious behaviors of suspicious files to facilitate auditing. |
2, Security Dog Cloud Eye can detect Ice Scorpion V4.0
The new-generation cloud host intrusion monitoring and security management platform "Cloud Eye" has functions such as "Webshell killing" and "Memory horse detection" that support the application of Ice Scorpion 4.0Attack detection. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" can also be detected.
Host Webshell killing

Figure 3
Host memory check

Figure 4
3Security Dog Cloud Armor can detect Ice Scorpion V4.0
The adaptive container security management system "Yunjia" supports functions such as "Image Webshell Scanning", "Container Webshell Scanning", and "Container Memory Horse Detection"Detect the attack of Ice Scorpion 4.0. |
In addition, when an attacker uses the Ice Scorpion tool to connect to a virtual terminal and execute commands, functions such as "process monitoring" and "behavior model" can also be detected.
Mirror Webshell killing

Figure 5
Container Webshell Killing

Figure 6
Container memory detection

Figure 7
References
https://github.com/rebeyond/Behinder
边栏推荐
- 用CH341A烧录外挂Flash (W25Q16JV)
- Dameng 8 database export and import
- Everyone in China said data, you need to focus on core characteristic is what?
- Multithreading (2)
- 引领数字医学高地,中山医院探索打造未来医院“新范式”
- After the large pixel panorama is completed, what are the promotion methods?
- 今年七夕,「情蔬」比礼物更有爱
- MRTK3 develops Hololens application - gesture drag, rotate, zoom object implementation
- How to sort multiple fields and multiple values in sql statement
- 1484. Sell Products by Date
猜你喜欢

MRTK3开发Hololens应用-手势拖拽、旋转 、缩放物体实现

mysql can't Execute, please solve it

人人都在说的数据中台,你需要关注的核心特点是什么?

【 genius_platform software platform development 】 : seventy-six vs the preprocessor definitions written cow force!!!!!!!!!!(in the other groups conding personnel told so cow force configuration to can
![Tencent Cloud [Hiflow] New Era Automation Tool](/img/ac/5c61424f22cd9fed74dcd529fdb6a4.png)
Tencent Cloud [Hiflow] New Era Automation Tool

In 2022, you still can't "low code"?Data science can also play with Low-Code!

Is your data safe in this hyperconnected world?

Simple description of linked list and simple implementation of code

tree table lookup

结构体初解
随机推荐
The second council meeting of the Dragon Lizard Community was successfully held!Director general election, 4 special consultants joined
【已解决】Unity Coroutinue 协程未有效执行的问题
21 Days Learning Challenge (2) Use of Graphical Device Trees
思考(八十八):使用 protobuf 自定义选项,做数据多版本管理
One hundred - day plan -- -- DAY2 brush
调用阿里云oss和sms服务
Syntax basics (variables, input and output, expressions and sequential statement completion)
AI+PROTAC | dx/tx completes $5 million seed round
[Qixi Festival] Romantic Tanabata, code teaser.Turn love into a gorgeous three-dimensional scene and surprise her (him)!(send code)
毕设-基于SSM房屋租赁管理系统
How to simulate the background API call scene, very detailed!
2022高处安装、维护、拆除考试题模拟考试题库及在线模拟考试
How to transfer a single node of Youxuan database to a cluster
Web3.0 Dapps——通往未来金融世界的道路
大像素全景制作完成后,推广方式有哪些?
1484. Sell Products by Date
ffmpeg pixel format basics
A small tool to transfer files using QR code - QFileTrans 1.2.0.1
Linux下常见的开源数据库,你知道几个?
public static
List asList(T... a) What is the prototype?