now browsing by tag
Microsoft has warned that inadequate security on web applications and internet-facing servers is allowing hackers to use web shells in their tens of thousands each month to launch attacks.
Web shells are pieces of malicious code typically implanted onto web servers to execute commands, steal data and help hackers launch additional raids on the victim organization, such as watering hole attacks.
Microsoft claimed in a new blog this week that thanks to poor IT security hygiene, the use of these tools is rocketing: the tech giant detects around 77,000 each month on an average of 46,000 machines.
“Aside from exploiting vulnerabilities in web applications or web servers, attackers take advantage of other weaknesses in internet-facing servers. These include the lack of the latest security updates, anti-virus tools, network protection, proper security configuration and informed security monitoring,” it continued.
“Interestingly, we observed that attacks usually occur on weekends or during off-hours, when attacks are likely not immediately spotted and responded to.”
Multi-layered protection is needed to mitigate the threat of web shells, beginning with gaining visibility into internet-facing servers by monitoring web application directories for web script file writes, the firm advised.
Regular audits of web server logs, prompt patching, intrusion prevention to stop C&C communications, limiting privileged accounts and closing non-standard ports can also help, said Microsoft.
Ilia Kolochenko, founder & CEO of web security company ImmuniWeb, explained that web shells have existed for over a decade and are often automated by hackers, but finding them should not be difficult.
“Usually, once a web shell is uploaded, it is fairly simple to root the server by exploiting unpatched vulnerabilities or its insecure configuration,” he added.
“Detection of web shells is a fairly routine operation, moreover, such attacks are usually attributable to junior hackers unskilled or careless enough to upload a web shell without obfuscation and proper removal after backdooring the server.”
#infosec #itsecurity #hacking #hacker #computerhacker #blackhat #ceh #ransomeware #maleware #ncs #nationalcybersecurityuniversity #defcon #ceh #cissp #computers #cybercrime #cybercrimes #technology #jobs #itjobs #gregorydevans #ncs #ncsv #certifiedcybercrimeconsultant #privateinvestigators #hackerspace #nationalcybersecurityawarenessmonth #hak5 #nsa #computersecurity #deepweb #nsa #cia #internationalcybersecurity #internationalcybersecurityconference #iossecurity #androidsecurity #macsecurity #windowssecurity
The post #infosec | Microsoft Detects 77,000 Web Shells Each Month appeared first on National Cyber Security.
View full post on National Cyber Security
A security company has released a free tool to users who suspect they may be a victim of Hacking Team’s exploit cache. Hacking Team is a secretive Milan-based firm which specializes in the sale of surveillance tools, malware and exploits to governments, law enforcement and private firms worldwide. The firm hit the spotlight in recent times after becoming the victim of a cyberattack, in which a hacker walked away with over 400 gigabytes in stolen corporate data. The investigation is yet to reveal who is responsible for the data breach — although suspicions have turned toward the possibility of an insider job. Among leaked financial reports, customer lists and service presentations, emails detailing zero-day exploits and proof-of-concept examples are being analyzed as researchers dig through the firm’s stolen data. Software vendors are racing to patch previously unknown vulnerabilities in their systems. Adobe andMicrosoft, among others, have issued security patches to make Hacking Team’s exploits and tools obsolete. In the meantime, users are left to wonder if they have been infected with Hacking Team malware, of which some tools are so virulent they stay on a system even after hard disk wipes and removals. Researchers at Rook Security have decided to […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
View full post on National Cyber Security