Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Intelligence Agencies Share Web Shell Detection Techniques

The United Sates National Security Agency (NSA) and the Australian Signals Directorate (ASD) have issued a joint Cybersecurity Information Sheet (CSI) that provides details on vulnerabilities exploited by threat actors to install web shell malware on web servers. 

The United Sates National Security Agency (NSA) and the Australian Signals Directorate (ASD) have issued a joint Cybersecurity Information Sheet (CSI) that provides details on vulnerabilities exploited by threat actors to install web shell malware on web servers. 

Software usually deployed on a victim’s web server, web shells can be used for command execution, providing attackers with persistent access to a compromised environment. Communication channels can be blended with legitimate traffic in order to evade detection. 

To install web shells, adversaries typically target vulnerabilities in web applications or upload code to existing compromised systems. Once installed, these web shells can serve either as backdoors or as relay nodes to route commands to other systems. 

Although Internet-facing servers are usually expected to be targeted for web shell installation, internal systems that are not Internet-facing are often targeted as well, as they are more vulnerable due to lagging patch management or permissive security requirements, the joint CSI from the US and Australian foreign spy agency explains (PDF).

“Malicious cyber actors are increasingly leveraging this type of malware to get consistent access to compromised networks while using communications that blend in well with legitimate traffic. This means attackers might send system commands over HTTPS or route commands to other systems, including to your internal networks, which may appear as normal network traffic,” the CSI reads. 

The CSI includes information on how organizations can detect web shells, prevent them from impacting their networks, and recover after attacks. In addition to detection techniques, it includes links to signatures and lists maintained on GitHub. 

The advisory also provides security teams with scripts they can use to compare a website with a known-good image, Splunk queries for identifying anomalous URIs in web traffic, an Internet Information Services (IIS) log analysis tool, signatures for the network traffic of common web shells, details on how to identify unexpected network flows and abnormal process invocations, a list of commonly exploited web application vulnerabilities, and HIPS rules for blocking changes to web-accessible directories. 

Commonly targeted web app security flaws impact Microsoft SharePoint (CVE-2019-0604) and Exchange Server (CVE-2020-0688), Citrix products (CVE-2019-19781), Atlassian Confluence (CVE-2019-3396 and CVE-2019-3398) and Crowd (CVE-2019-11580), WordPress “Social Warfare” Plugin (CVE-2019-9978), Progress Telerik UI (CVE-2019-18935, CVE-2017-11317 and CVE-2017-11357), Zoho ManageEngine (CVE-2020-10189 and CVE-2019-8394), and Adobe ColdFusion (CVE-2018-15961), the NSA and ASD note. 

Advertisement. Scroll to continue reading.

Related: NSA Shares Guidance on Mitigating Cloud Vulnerabilities

Related: NSA Issues Advisory on Mitigation of Risks Associated With TLSI

Related: ‘Five Eyes’ Agencies Release Joint Report on Hacking Tools

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.