There’s nothing inherently malicious about a webshell, which is a script that can be uploaded to a web server to enable remote administration of the machine. In the hands of an attacker, however, they are a serious cyberthreat. Advanced persistent threat (APT) groups often use webshells to breach organizations.

Webshell Attacks Surging

Earlier this year, we reported on two notable upticks in webshell attacks: C99 Shell and b374k. This activity intrigued our analysts, warranting further investigation.

Our subsequent analysis of IBM Managed Security Services (MSS) data showed an increase in webshell attacks this year, most notably in Q2 and the beginning of Q3. We expect to see that trend continue in 2017.

PHP Is Prevalent and Persistent

Almost all the attacks — approximately 95 percent — were written in PHP, a widely used open-source scripting language. Although not readily apparent, the number of command injection attacks resulting from malicious PHP webshells is relatively significant. No other single command injection attack type was observed to be as prevalent, or as persistent, for as long.

Analysis of IBM MSS data from 2016 also revealed over 120 unique types of PHP webshell scripts. The great majority were observed in attempts to plant webshell scripts in remote servers via command injection to ultimately breach the servers and gain unauthorized access to the data they host. C99 was the most common variety, accounting for nearly 9 percent of the attacks recorded in 2016.

Malicious webshell exploitation is one of the easiest ways attackers can gain unauthorized access to an organization’s network.

Interested in the evolving threat landscape? Read the latest IBM X-Force Research

More from Advanced Threats

Hive0051 goes all in with a triple threat

13 min read - As of April 2024, IBM X-Force is tracking new waves of Russian state-sponsored Hive0051 (aka UAC-0010, Gamaredon) activity featuring new iterations of Gamma malware first observed in November 2023. These discoveries follow late October 2023 findings, detailing Hive0051's use of a novel multi-channel method of rapidly rotating C2 infrastructure (DNS Fluxing) to deliver new Gamma malware variants, facilitating more than a thousand infections in a single day. An examination of a sample of the lures associated with the ongoing activity reveals…

GootBot – Gootloader’s new approach to post-exploitation

8 min read - IBM X-Force discovered a new variant of Gootloader — the "GootBot" implant — which facilitates stealthy lateral movement and makes detection and blocking of Gootloader campaigns more difficult within enterprise environments. X-Force observed these campaigns leveraging SEO poisoning, wagering on unsuspecting victims' search activity, which we analyze further in the blog. The Gootloader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2…

Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

4 min read - You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity in any environment. Before you can embark on a threat hunting exercise, however, it’s important to understand how to build, implement and mature a repeatable, internal threat hunting program. What are the components…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today