Tuesday, July 7, 00:06
Home security Microsoft says it detects 77.000 active web shells daily

Microsoft says it detects 77.000 active web shells daily

web shellsH Microsoft said the team security of detects approximately 77.000 active web shells daily, scattered on 46.000 infected servers.

This number is much larger than all its previous reports company.

For example, earlier this month, h Sucuri by GoDaddy said it "cleaned" about 3.600 web shells from hacked sites during 2019. This figure is much lower than reported by Microsoft.

What are they? world wide web shells;

The huge number that Microsoft has pointed out highlights their preference hackers in particular tools. Web shells are a must-have tool for any attacker, from small hacktivist groups to state-based hacking teams specializing in espionage.

Web shells are essential malware or scripts installed in hacked servers.

They provide a visual interface, which hackers can use to interact with the hacked server and its file system. Most web shells allow you to rename, copy, move and even edit or upload files to the server. They still can steal data from the server.

Attackers usually install web shells, exploiting them vulnerabilities in servers and web applications (such as CMS, CMS plugins, CMS themes, CRMs, intranets, etc.).

Web shells can be written to any programming language. This allows hackers to hide them in the source code of any site. Therefore, it is difficult to detect them by an expert without the help of a web firewall or a web malware scanner.

There is usually one with the web shell backdoor script. Attackers attack a server, install the web shell to interact with the filesystem, and then install a backdoor, which allows hackers to re-infect the system if the webshell is detected and removed.

The most popular web shell nowadays is China Chopper. It was first observed in 2012 and was created by Chinese hackers. It was released in a Chinese hacking forum and adopted by cybercriminals around the world.

Microsoft warned system administrators not to ignore this threat. Hackers often use these malicious scripts to download others hacking tools in systems of the victims. These tools are, in turn, used to carry out attacks.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement


Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...