Wednesday, March 26, 2025
Homecyber securityChinese 'Web Shell Whisperer' Leverages Shells and Tunnels to Establish Stealthy Persistence

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

Published on

SIEM as a Service

Follow Us on Google News

A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm.

This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain persistent access and facilitate espionage.

The operation highlights the evolving tactics of state-sponsored groups in evading detection and achieving long-term network presence.

Stealthy Persistence Mechanisms

Weaver Ant primarily employed two types of web shells: an encrypted version of the China Chopper web shell and a novel ‘INMemory’ web shell.

The encrypted China Chopper variant uses AES encryption to bypass Web Application Firewall (WAF) detection, often deployed on externally facing servers to serve as entry points for network infiltration.

Web Shell Whisperer
Web shell deployment chain.

According to Sygnia Report, this web shell supports file management, command execution, and data exfiltration, making it a versatile tool for malicious activities.

The INMemory web shell, on the other hand, executes payloads entirely in memory, evading detection by traditional security measures.

It decodes a hardcoded GZipped Base64 string into a Portable Executable (PE) named ‘eval.dll’ and executes it dynamically using the JScript library.

The threat actor also employed a recursive HTTP tunnel tool to facilitate lateral movement and access internal resources.

This tool operates by forwarding requests to other web servers, supporting both ASPX and PHP versions for cross-platform compatibility.

It dynamically constructs and executes cURL commands based on decoded parameters, allowing seamless navigation across different web environments.

This adaptive tunneling mechanism enabled Weaver Ant to maintain operational flexibility and evade detection.

Web Shell Whisperer
Web Shell Tunneling flow.

Defense Strategies

To counter such sophisticated threats, organizations must adopt a holistic defense approach.

This includes continuous monitoring, proactive response mechanisms, and systematic threat hunts.

Implementing stringent traffic controls and system hardening practices for both legacy and public-facing devices is crucial.

Additionally, stealth monitoring techniques, such as port mirroring and automated decryption of tunneled traffic, can help uncover hidden operations without alerting the threat actors.

By embracing these strategies, organizations can enhance their ability to detect and counteract persistent threats posed by state-sponsored groups like Weaver Ant.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free

In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding...

Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users

A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks

In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful...

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement...

B1ack’s Stash Marketplace Actors Set to Release 4 Million Stolen Credit Card Records for Free

In a significant escalation of illicit activities, B1ack’s Stash, a notorious dark web carding...