There’s nothing inherently malicious about a webshell, which is a script that can be uploaded to a web server to enable remote administration of the machine. In the hands of an attacker, however, they are a serious cyberthreat. Advanced persistent threat (APT) groups often use webshells to breach organizations.
Webshell Attacks Surging
Our subsequent analysis of IBM Managed Security Services (MSS) data showed an increase in webshell attacks this year, most notably in Q2 and the beginning of Q3. We expect to see that trend continue in 2017.
PHP Is Prevalent and Persistent
Almost all the attacks — approximately 95 percent — were written in PHP, a widely used open-source scripting language. Although not readily apparent, the number of command injection attacks resulting from malicious PHP webshells is relatively significant. No other single command injection attack type was observed to be as prevalent, or as persistent, for as long.
Analysis of IBM MSS data from 2016 also revealed over 120 unique types of PHP webshell scripts. The great majority were observed in attempts to plant webshell scripts in remote servers via command injection to ultimately breach the servers and gain unauthorized access to the data they host. C99 was the most common variety, accounting for nearly 9 percent of the attacks recorded in 2016.
Malicious webshell exploitation is one of the easiest ways attackers can gain unauthorized access to an organization’s network.