Sophisticated Post-Exploitation Campaign Uncovered by TAMUS
Cyber Security News by CyberSum.net
In September 2025, TAMUS Cybersecurity and Elastic Security Labs discovered a global campaign by a threat actor using a malicious IIS module named TOLLBOOTH. The attackers exploited misconfigured IIS web servers, leveraging publicly published ASP.NET machine keys. The campaign, designated REF3927, impacted hundreds of servers across multiple industries. The initial compromise involved deserialization attacks against the ASP.NET ViewState mechanism. Post-compromise activities included the deployment of a Godzilla-forked webshell framework, GotoHTTP RMM tool, and a kernel-mode rootkit. Remediation requires restoring affected servers and generating new, secure ASP.NET machine keys.