home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 279 of 523   
   Ben Ritchey to All   
   US-CERT Warning   
   11 Nov 15 09:35:38   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   TA15-314A: Web Shells – Threat Awareness and Guidance   
   11/10/2015 08:12 PM EST   
      
      
   Original release date: November 10, 2015   
      
   Systems Affected   
   Web servers that allow web shells   
      
   Overview   
   This alert describes the frequent use of web shells as an exploitation vector.   
   Web shells can be used to obtain unauthorized access and can lead to wider   
   network compromise. This alert outlines the threat and provides prevention,   
   detection, and mitigation strategies.   
      
   Consistent use of web shells by Advanced Persistent Threat (APT) and criminal   
   groups has led to significant cyber incidents.   
      
   This product was developed in collaboration with US-CERT partners in the   
   United Kingdom, Australia, Canada, and New Zealand based on activity seen   
   targeting organizations across these countries. The detection and mitigation   
   measures outlined in this document represent the shared judgement of all   
   participating agencies.   
      
   Description   
   Web Shell Description   
   A web shell is a script that can be uploaded to a web server to enable remote   
   administration of the machine. Infected web servers can be either   
   Internet-facing or internal to the network, where the web shell is used to   
   pivot further to internal hosts.   
      
   A web shell can be written in any language that the target web server   
   supports. The most commonly observed web shells are written in languages that   
   are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell   
   scripts are also used.   
      
   Using network reconnaissance tools, an adversary can identify vulnerabilities   
   that can be exploited and result in the installation of a web shell. For   
   example, these vulnerabilities can exist in content management systems (CMS)   
   or web server software.   
      
   Once successfully uploaded, an adversary can use the web shell to leverage   
   other exploitation techniques to escalate privileges and to issue commands   
   remotely. These commands are directly linked to the privilege and   
   functionality available to the web server and may include the ability to add,   
   delete, and execute files as well as the ability to run shell commands,   
   further executables, or scripts.   
      
   How and why are they used by malicious adversaries?   
   Web shells are frequently used in compromises due to the combination of remote   
   access and functionality. Even simple web shells can have a considerable   
   impact and often maintain minimal presence.   
      
   Web shells are utilized for the following purposes:   
      
   To harvest and exfiltrate sensitive data and credentials;   
   To upload additional malware for the potential of creating, for example, a   
   watering hole for infection and scanning of further victims;   
   To use as a relay point to issue commands to hosts inside the network without   
   direct Internet access;   
   To use as command-and-control infrastructure, potentially in the form of a bot   
   in a botnet or in support of compromises to additional external networks. This   
   could occur if the adversary intends to maintain long-term persistence.   
   While a web shell itself would not normally be used for denial of service   
   (DoS) attacks, it can act as a platform for uploading further tools, including   
   DoS capability.   
      
   Examples   
   Web shells such as China Chopper, WSO, C99 and B374K are frequently chosen by   
   adversaries; however these are just a small number of known used web shells.   
   (Further information linking to IOCs and SNORT rules can be found in the   
   Additional Resources section).   
      
   China Chopper – A small web shell packed with features. Has several command   
   and control features including a password brute force capability.   
   WSO – Stands for “web shell by orb” and has the ability to masquerade as an   
   error page containing a hidden login form.   
   C99 – A version of the WSO shell with additional functionality. Can display   
   the server’s security measures and contains a self-delete function.   
   B374K – PHP based web shell with common functionality such as viewing   
   processes and executing commands.   
   Delivery Tactics   
   Web shells can be delivered through a number of web application exploits or   
   configuration weaknesses including:   
      
   Cross-Site Scripting;   
   SQL Injection;   
   Vulnerabilities in applications/services  (e.g., WordPress or other CMS   
   applications);   
   File processing vulnerabilities (e.g., upload filtering or assigned   
   permissions);   
   Remote File Include (RFI) and Local File Include (LFI) vulnerabilities;   
   Exposed Admin Interfaces (possible areas to find vulnerabilities mentioned   
   above).   
   The above tactics can be and are combined regularly. For example, an exposed   
   admin interface also requires a file upload option, or another exploit method   
   mentioned above, to deliver successfully.   
      
   Impact   
   A successfully uploaded shell script may allow a remote attacker to bypass   
   security restrictions and gain unauthorized system access.   
      
   Solution   
   Prevention and Mitigation   
   Installation of a web shell is commonly accomplished through web application   
   vulnerabilities or configuration weaknesses. Therefore, identification and   
   closure of these vulnerabilities is crucial to avoiding potential compromise.   
   The following suggestions specify good security and web shell specific   
   practices:   
      
   Employ regular updates to applications and the host operating system to ensure   
   protection against known vulnerabilities.   
   Implement a least-privileges policy on the web server to:   
   Reduce adversaries’ ability to escalate privileges or pivot laterally to other   
   hosts.   
   Control creation and execution of files in particular directories.   
   If not already present, consider deploying a demilitarized zone (DMZ) between   
   your webfacing systems and the corporate network. Limiting the interaction and   
   logging traffic between the two provides a method to identify possible   
   malicious activity.   
   Ensure a secure configuration of web servers. All unnecessary services and   
   ports should be disabled or blocked. All necessary services and ports should   
   be restricted where feasible. This can include whitelisting or blocking   
   external access to administration panels and not using default login   
   credentials.   
   Utilize a reverse proxy or alternative service, such as mod_security, to   
   restrict accessible URL paths to known legitimate ones.   
   Establish, and backup offline, a “known good” version of the relevant server   
   and a regular change-management  policy to enable monitoring for changes to   
   servable content with a file integrity system.   
   Employ user input validation to restrict local and remote file inclusion   
   vulnerabilities.   
   Conduct regular system and application vulnerability scans to establish areas   
   of risk. While this method does not protect against zero day attacks it will   
   highlight possible areas of concern.   
   Deploy a web application firewall and conduct regular virus signature checks,   
   application fuzzing, code reviews and server network analysis.   
   Detection   
   Due to the potential simplicity and ease of modification of web shells, they   
   can be difficult to detect. For example, anti-virus products sometimes produce   
   poor results in detecting web shells.   
      
   The following may be indicators that your system has been infected by a web   
   shell. Note a number of these indicators are common to legitimate files. Any   
   suspected malicious files should be considered in the context of other   
   indicators and triaged to determine whether further inspection or validation   
   is required.   
      
   Abnormal periods of high site usage (due to potential uploading and   
   downloading activity);   
   Files with an unusual timestamp (e.g., more recent than the last update of the   
   web applications installed);   
   Suspicious files in Internet-accessible locations (web root);   
   Files containing references to suspicious keywords such as cmd.exe or eval;   
   Unexpected connections in logs. For example:   
   A file type generating unexpected or anomalous network traffic (e.g., a JPG   
   file making requests with POST parameters);   
   Suspicious logins originating from internal subnets to DMZ servers and vice   
   versa.   
   Any evidence of suspicious shell commands, such as directory traversal, by the   
   web server process.   
   For investigating many types of shells, a search engine can be very helpful.   
   Often, web shells will be used to spread malware onto a server and the search   
   engines are able to see it. But many web shells check the User-Agent and will   
   display differently for a search engine spider (a program that crawls through   
   links on the Internet, grabbing content from sites and adding it to search   
   engine indexes) than for a regular user. To find a shell, you may need to   
   change your User-Agent to one of the search engine bots. Some browsers have   
   plugins that allow you to easily switch a User-Agent. Once the shell is   
   detected, simply delete the file from the server.   
      
   Client characteristics can also indicate possible web shell activity. For   
   example, the malicious actor will often visit only the URI where the web shell   
   script was created, but a standard user usually loads the webpage from a   
   linked page/referrer or loads additional content/resources. Thus, performing   
   frequency analysis on the web access logs could indicate the location of a web   
   shell. Most legitimate URI visits will contain varying user-agents, whereas a   
   web shell is generally only visited by the creator, resulting in limited   
   user-agent variants.   
      
   References   
   Australian Cyber Security Centre – Securing Content Management Systems (CMS)   
   FireEye China Chopper – The Little Malware That Could. Detecting and Defeating   
   the China Chopper Web Shell   
   MANDIANT – Old Web Shells New Tricks   
   FireEye – Breaking Down the China Chopper Web Shell Part I   
   FireEye – Breaking Down the China Chopper Web Shell Part II   
   WSO Information   
   Exploit-db – China Chopper   
   C99   
   INFOSEC Institute – Web Shell Detection   
   Revision History   
   November 10, 2015: Initial Release   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or have questions, please send an email to info@us-cert.gov. Do not reply to   
   this message since this email was sent from a notification-only address that   
   is not monitored. To ensure you receive future US-CERT products, please add   
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
   === Cut ===   
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca