Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    ANTI_VIRUS    |    Anti-Virus Discussion & News    |    523 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 279 of 523    |
|    Ben Ritchey to All    |
|    US-CERT Warning    |
|    11 Nov 15 09:35:38    |
      NCCIC / US-CERT              National Cyber Awareness System:              TA15-314A: Web Shells – Threat Awareness and Guidance       11/10/2015 08:12 PM EST                     Original release date: November 10, 2015              Systems Affected       Web servers that allow web shells              Overview       This alert describes the frequent use of web shells as an exploitation vector.       Web shells can be used to obtain unauthorized access and can lead to wider       network compromise. This alert outlines the threat and provides prevention,       detection, and mitigation strategies.              Consistent use of web shells by Advanced Persistent Threat (APT) and criminal       groups has led to significant cyber incidents.              This product was developed in collaboration with US-CERT partners in the       United Kingdom, Australia, Canada, and New Zealand based on activity seen       targeting organizations across these countries. The detection and mitigation       measures outlined in this document represent the shared judgement of all       participating agencies.              Description       Web Shell Description       A web shell is a script that can be uploaded to a web server to enable remote       administration of the machine. Infected web servers can be either       Internet-facing or internal to the network, where the web shell is used to       pivot further to internal hosts.              A web shell can be written in any language that the target web server       supports. The most commonly observed web shells are written in languages that       are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell       scripts are also used.              Using network reconnaissance tools, an adversary can identify vulnerabilities       that can be exploited and result in the installation of a web shell. For       example, these vulnerabilities can exist in content management systems (CMS)       or web server software.              Once successfully uploaded, an adversary can use the web shell to leverage       other exploitation techniques to escalate privileges and to issue commands       remotely. These commands are directly linked to the privilege and       functionality available to the web server and may include the ability to add,       delete, and execute files as well as the ability to run shell commands,       further executables, or scripts.              How and why are they used by malicious adversaries?       Web shells are frequently used in compromises due to the combination of remote       access and functionality. Even simple web shells can have a considerable       impact and often maintain minimal presence.              Web shells are utilized for the following purposes:              To harvest and exfiltrate sensitive data and credentials;       To upload additional malware for the potential of creating, for example, a       watering hole for infection and scanning of further victims;       To use as a relay point to issue commands to hosts inside the network without       direct Internet access;       To use as command-and-control infrastructure, potentially in the form of a bot       in a botnet or in support of compromises to additional external networks. This       could occur if the adversary intends to maintain long-term persistence.       While a web shell itself would not normally be used for denial of service       (DoS) attacks, it can act as a platform for uploading further tools, including       DoS capability.              Examples       Web shells such as China Chopper, WSO, C99 and B374K are frequently chosen by       adversaries; however these are just a small number of known used web shells.       (Further information linking to IOCs and SNORT rules can be found in the       Additional Resources section).              China Chopper – A small web shell packed with features. Has several command       and control features including a password brute force capability.       WSO – Stands for “web shell by orb” and has the ability to masquerade as an       error page containing a hidden login form.       C99 – A version of the WSO shell with additional functionality. Can display       the server’s security measures and contains a self-delete function.       B374K – PHP based web shell with common functionality such as viewing       processes and executing commands.       Delivery Tactics       Web shells can be delivered through a number of web application exploits or       configuration weaknesses including:              Cross-Site Scripting;       SQL Injection;       Vulnerabilities in applications/services (e.g., WordPress or other CMS       applications);       File processing vulnerabilities (e.g., upload filtering or assigned       permissions);       Remote File Include (RFI) and Local File Include (LFI) vulnerabilities;       Exposed Admin Interfaces (possible areas to find vulnerabilities mentioned       above).       The above tactics can be and are combined regularly. For example, an exposed       admin interface also requires a file upload option, or another exploit method       mentioned above, to deliver successfully.              Impact       A successfully uploaded shell script may allow a remote attacker to bypass       security restrictions and gain unauthorized system access.              Solution       Prevention and Mitigation       Installation of a web shell is commonly accomplished through web application       vulnerabilities or configuration weaknesses. Therefore, identification and       closure of these vulnerabilities is crucial to avoiding potential compromise.       The following suggestions specify good security and web shell specific       practices:              Employ regular updates to applications and the host operating system to ensure       protection against known vulnerabilities.       Implement a least-privileges policy on the web server to:       Reduce adversaries’ ability to escalate privileges or pivot laterally to other       hosts.       Control creation and execution of files in particular directories.       If not already present, consider deploying a demilitarized zone (DMZ) between       your webfacing systems and the corporate network. Limiting the interaction and       logging traffic between the two provides a method to identify possible       malicious activity.       Ensure a secure configuration of web servers. All unnecessary services and       ports should be disabled or blocked. All necessary services and ports should       be restricted where feasible. This can include whitelisting or blocking       external access to administration panels and not using default login       credentials.       Utilize a reverse proxy or alternative service, such as mod_security, to       restrict accessible URL paths to known legitimate ones.       Establish, and backup offline, a “known good” version of the relevant server       and a regular change-management policy to enable monitoring for changes to       servable content with a file integrity system.       Employ user input validation to restrict local and remote file inclusion       vulnerabilities.       Conduct regular system and application vulnerability scans to establish areas       of risk. While this method does not protect against zero day attacks it will       highlight possible areas of concern.       Deploy a web application firewall and conduct regular virus signature checks,       application fuzzing, code reviews and server network analysis.       Detection       Due to the potential simplicity and ease of modification of web shells, they       can be difficult to detect. For example, anti-virus products sometimes produce       poor results in detecting web shells.              The following may be indicators that your system has been infected by a web       shell. Note a number of these indicators are common to legitimate files. Any       suspected malicious files should be considered in the context of other       indicators and triaged to determine whether further inspection or validation       is required.              Abnormal periods of high site usage (due to potential uploading and       downloading activity);       Files with an unusual timestamp (e.g., more recent than the last update of the       web applications installed);       Suspicious files in Internet-accessible locations (web root);       Files containing references to suspicious keywords such as cmd.exe or eval;       Unexpected connections in logs. For example:       A file type generating unexpected or anomalous network traffic (e.g., a JPG       file making requests with POST parameters);       Suspicious logins originating from internal subnets to DMZ servers and vice       versa.       Any evidence of suspicious shell commands, such as directory traversal, by the       web server process.       For investigating many types of shells, a search engine can be very helpful.       Often, web shells will be used to spread malware onto a server and the search       engines are able to see it. But many web shells check the User-Agent and will       display differently for a search engine spider (a program that crawls through       links on the Internet, grabbing content from sites and adding it to search       engine indexes) than for a regular user. To find a shell, you may need to       change your User-Agent to one of the search engine bots. Some browsers have       plugins that allow you to easily switch a User-Agent. Once the shell is       detected, simply delete the file from the server.              Client characteristics can also indicate possible web shell activity. For       example, the malicious actor will often visit only the URI where the web shell       script was created, but a standard user usually loads the webpage from a       linked page/referrer or loads additional content/resources. Thus, performing       frequency analysis on the web access logs could indicate the location of a web       shell. Most legitimate URI visits will contain varying user-agents, whereas a       web shell is generally only visited by the creator, resulting in limited       user-agent variants.              References       Australian Cyber Security Centre – Securing Content Management Systems (CMS)       FireEye China Chopper – The Little Malware That Could. Detecting and Defeating       the China Chopper Web Shell       MANDIANT – Old Web Shells New Tricks       FireEye – Breaking Down the China Chopper Web Shell Part I       FireEye – Breaking Down the China Chopper Web Shell Part II       WSO Information       Exploit-db – China Chopper       C99       INFOSEC Institute – Web Shell Detection       Revision History       November 10, 2015: Initial Release              ----------------------------------------------------------------       -------------- -              This product is provided subject to this Notification and this Privacy & Use       policy.                     ----------------------------------------------------------------       -------------- -       A copy of this publication is available at www.us-cert.gov. If you need help       or have questions, please send an email to info@us-cert.gov. Do not reply to       this message since this email was sent from a notification-only address that       is not monitored. To ensure you receive future US-CERT products, please add       US-CERT@ncas.us-cert.gov to your address book.       OTHER RESOURCES:       Contact Us | Security Publications | Alerts and Tips | Related Resources       STAY CONNECTED:       Sign up for email updates              SUBSCRIBER SERVICES:       Manage Preferences | Unsubscribe | Help                     ----------------------------------------------------------------       -------------- -       This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf       of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray       Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery              === Cut ===              --       Guardien Fide :^)               Ben aka cMech Web: http://cmech.dynip.com        Email: fido4cmech(at)lusfiber.net        Home page: http://cmech.dynip.com/homepage/        WildCat! Board 24/7 +1-337-984-4794 any BAUD 8,N,1              --- GoldED+/W32-MSVC        * Origin: FIDONet - The Positronium Repository (1:393/68)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca