Monday, April 21, 2025
Homecyber securityChinese 'Web Shell Whisperer' Leverages Shells and Tunnels to Establish Stealthy Persistence

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

Published on

SIEM as a Service

Follow Us on Google News

A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm.

This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain persistent access and facilitate espionage.

The operation highlights the evolving tactics of state-sponsored groups in evading detection and achieving long-term network presence.

- Advertisement - Google News

Stealthy Persistence Mechanisms

Weaver Ant primarily employed two types of web shells: an encrypted version of the China Chopper web shell and a novel ‘INMemory’ web shell.

The encrypted China Chopper variant uses AES encryption to bypass Web Application Firewall (WAF) detection, often deployed on externally facing servers to serve as entry points for network infiltration.

Web Shell Whisperer
Web shell deployment chain.

According to Sygnia Report, this web shell supports file management, command execution, and data exfiltration, making it a versatile tool for malicious activities.

The INMemory web shell, on the other hand, executes payloads entirely in memory, evading detection by traditional security measures.

It decodes a hardcoded GZipped Base64 string into a Portable Executable (PE) named ‘eval.dll’ and executes it dynamically using the JScript library.

The threat actor also employed a recursive HTTP tunnel tool to facilitate lateral movement and access internal resources.

This tool operates by forwarding requests to other web servers, supporting both ASPX and PHP versions for cross-platform compatibility.

It dynamically constructs and executes cURL commands based on decoded parameters, allowing seamless navigation across different web environments.

This adaptive tunneling mechanism enabled Weaver Ant to maintain operational flexibility and evade detection.

Web Shell Whisperer
Web Shell Tunneling flow.

Defense Strategies

To counter such sophisticated threats, organizations must adopt a holistic defense approach.

This includes continuous monitoring, proactive response mechanisms, and systematic threat hunts.

Implementing stringent traffic controls and system hardening practices for both legacy and public-facing devices is crucial.

Additionally, stealth monitoring techniques, such as port mirroring and automated decryption of tunneled traffic, can help uncover hidden operations without alerting the threat actors.

By embracing these strategies, organizations can enhance their ability to detect and counteract persistent threats posed by state-sponsored groups like Weaver Ant.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...