Threat actors are using publicly exposed cryptographic keys - ASP.NET machine keys - to manipulate authentication tokens, ...