ID | Name |
---|---|
T1505.001 | SQL Stored Procedures |
T1505.002 | Transport Agent |
T1505.003 | Web Shell |
T1505.004 | IIS Components |
T1505.005 | Terminal Services DLL |
Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to access the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server.[1]
In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (e.g. China Chopper Web shell client).[2]
ID | Name | Description |
---|---|---|
C0034 | 2022 Ukraine Electric Power Attack |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the Neo-REGEORG webshell on an internet-facing server.[3] |
G0007 | APT28 |
APT28 has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server.[4] |
G0016 | APT29 |
APT29 has installed web shells on exploited Microsoft Exchange servers.[5][6] |
G0050 | APT32 |
APT32 has used Web shells to maintain access to victim websites.[7] |
G0082 | APT38 |
APT38 has used web shells for persistence or to ensure redundant access.[8] |
G0087 | APT39 | |
G1023 | APT5 |
APT5 has installed multiple web shells on compromised servers including on Pulse Secure VPN appliances.[10][11] |
S0073 | ASPXSpy |
ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS).[12] |
G0135 | BackdoorDiplomacy |
BackdoorDiplomacy has used web shells to establish an initial foothold and for lateral movement within a victim's system.[13] |
S1118 | BUSHWALK |
BUSHWALK is a web shell that has the ability to execute arbitrary commands or write files.[14] |
C0017 | C0017 |
During C0017, APT41 deployed JScript web shells through the creation of malicious ViewState objects.[15] |
C0032 | C0032 |
During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.[16] |
S0020 | China Chopper |
China Chopper's server component is a Web Shell payload.[2] |
C0029 | Cutting Edge |
During Cutting Edge, threat actors used multiple web shells to maintain presence on compromised Connect Secure appliances such as WIREFIRE, GLASSTOKEN, BUSHWALK, LIGHTWIRE, and FRAMESTING.[17][18] |
G0009 | Deep Panda |
Deep Panda uses Web shells on publicly accessible Web servers to access victim networks.[19] |
G0035 | Dragonfly |
Dragonfly has commonly created Web shells on victims' publicly accessible email and web servers, which they used to maintain access to a victim network and download additional malicious files.[20] |
G1016 | FIN13 |
FIN13 has utilized obfuscated and open-source web shells such as JspSpy, reGeorg, MiniWebCmdShell, and Vonloesch Jsp File Browser 1.2 to enable remote code execution and to execute commands on compromised web server.[21] |
G0117 | Fox Kitten |
Fox Kitten has installed web shells on compromised hosts to maintain access.[22][23] |
S1120 | FRAMESTING |
FRAMESTING is a web shell capable of enabling arbitrary command execution on compromised Ivanti Connect Secure VPNs.[14] |
G0093 | GALLIUM |
GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration.[24][25] |
S1117 | GLASSTOKEN |
GLASSTOKEN is a web shell capable of tunneling C2 connections and code execution on compromised Ivanti Secure Connect VPNs.[18] |
G0125 | HAFNIUM |
HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP, SPORTSBALL, China Chopper, and ASPXSpy.[26][27][28][29][30] |
G0094 | Kimsuky |
Kimsuky has used modified versions of open source PHP web shells to maintain access, often adding "Dinosaur" references within the code.[31] |
G0065 | Leviathan |
Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems.[32][33] |
S1119 | LIGHTWIRE |
LIGHTWIRE is a web shell capable of command execution and establishing persistence on compromised Ivanti Secure Connect VPNs.[14] |
G0059 | Magic Hound |
Magic Hound has used multiple web shells to gain execution.[34][35] |
G1009 | Moses Staff |
Moses Staff has dropped a web shell onto a compromised system.[36] |
G0049 | OilRig |
OilRig has used web shells, often to maintain access to a victim network.[37][38][39] |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors generated a web shell within a vulnerable Enterprise Resource Planning Web Application Server as a persistence mechanism.[40] |
C0014 | Operation Wocao |
During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement.[41] |
S0072 | OwaAuth |
OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell.[12] |
S0598 | P.A.S. Webshell |
P.A.S. Webshell can gain remote access and execution on target web servers.[42] |
S1108 | PULSECHECK |
PULSECHECK is a web shell that can enable command execution on compromised servers.[10] |
S1113 | RAPIDPULSE |
RAPIDPULSE is a web shell that is capable of arbitrary file read on targeted web servers to exfiltrate items of interest on the victim device.[11] |
G0034 | Sandworm Team |
Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks.[42] |
S0185 | SEASHARPEE |
SEASHARPEE is a Web shell.[38] |
S1110 | SLIGHTPULSE |
SLIGHTPULSE is a web shell that can read, write, and execute files on compromised servers.[10] |
S1112 | STEADYPULSE |
STEADYPULSE is a web shell that can enable the execution of arbitrary commands on compromised web servers.[10] |
S0578 | SUPERNOVA | |
G0027 | Threat Group-3390 |
Threat Group-3390 has used a variety of Web shells.[46] |
G0131 | Tonto Team |
Tonto Team has used a first stage web shell after compromising a vulnerable Exchange server.[47] |
G0081 | Tropic Trooper |
Tropic Trooper has started a web service in the target host and wait for the adversary to connect, acting as a web shell.[48] |
G0123 | Volatile Cedar |
Volatile Cedar can inject web shell code into a server.[49][50] |
G1017 | Volt Typhoon |
Volt Typhoon has used webshells, including ones named AuditReport.jspx and iisstart.aspx, in compromised environments.[51] |
S1115 | WIREFIRE |
WIREFIRE is a web shell that can download files to and execute arbitrary commands from compromised Ivanti Connect Secure VPNs.[17] |
ID | Mitigation | Description |
---|---|---|
M1042 | Disable or Remove Feature or Program |
Consider disabling functions from web technologies such as PHP’s |
M1018 | User Account Management |
Enforce the principle of least privilege by limiting privileges of user accounts so only authorized accounts can modify the web directory.[53] |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0015 | Application Log | Application Log Content |
Monitor for third-party application logging, messaging, and/or other artifacts that may backdoor web servers with web shells to establish persistent access to systems. Log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network. [54] |
DS0022 | File | File Creation |
File monitoring may be used to detect changes to files in the Web directory of a Web server that do not match with updates to the Web server's content and may indicate implantation of a Web shell script.[55] |
File Modification |
Monitor for changes made to files that may backdoor web servers with web shells to establish persistent access to systems. |
||
DS0029 | Network Traffic | Network Traffic Content |
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
Network Traffic Flow |
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. |
||
DS0009 | Process | Process Creation |
Web shells can be difficult to detect. Unlike other forms of persistent remote access, they do not initiate connections. The portion of the Web shell that is on the server may be small and innocuous looking. The PHP version of the China Chopper Web shell, for example, is very similar to the following short payload: [2]
Nevertheless, detection mechanisms exist. Process monitoring may be used to detect Web servers that perform suspicious actions such as spawning cmd.exe or accessing files that are not in the Web directory.[55] A web shell is a web script placed on an openly accessible web server to allow an adversary to use the server as a gatway in a network. As the shell operates, commands will be issued from within the web application into the broader server operating system. This analytic looks for host enumeration executables initiated by any web service that would not normally be executed within that environment. Analytic 1 - Webshell-Indicative Process Tree
|