Cyber Security News

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm.

This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain persistent access and facilitate espionage.

The operation highlights the evolving tactics of state-sponsored groups in evading detection and achieving long-term network presence.

Stealthy Persistence Mechanisms

Weaver Ant primarily employed two types of web shells: an encrypted version of the China Chopper web shell and a novel ‘INMemory’ web shell.

The encrypted China Chopper variant uses AES encryption to bypass Web Application Firewall (WAF) detection, often deployed on externally facing servers to serve as entry points for network infiltration.

Web Shell WhispererWeb Shell Whisperer
Web shell deployment chain.

According to Sygnia Report, this web shell supports file management, command execution, and data exfiltration, making it a versatile tool for malicious activities.

The INMemory web shell, on the other hand, executes payloads entirely in memory, evading detection by traditional security measures.

It decodes a hardcoded GZipped Base64 string into a Portable Executable (PE) named ‘eval.dll’ and executes it dynamically using the JScript library.

The threat actor also employed a recursive HTTP tunnel tool to facilitate lateral movement and access internal resources.

This tool operates by forwarding requests to other web servers, supporting both ASPX and PHP versions for cross-platform compatibility.

It dynamically constructs and executes cURL commands based on decoded parameters, allowing seamless navigation across different web environments.

This adaptive tunneling mechanism enabled Weaver Ant to maintain operational flexibility and evade detection.

Web Shell Tunneling flow.

Defense Strategies

To counter such sophisticated threats, organizations must adopt a holistic defense approach.

This includes continuous monitoring, proactive response mechanisms, and systematic threat hunts.

Implementing stringent traffic controls and system hardening practices for both legacy and public-facing devices is crucial.

Additionally, stealth monitoring techniques, such as port mirroring and automated decryption of tunneled traffic, can help uncover hidden operations without alerting the threat actors.

By embracing these strategies, organizations can enhance their ability to detect and counteract persistent threats posed by state-sponsored groups like Weaver Ant.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats…

12 hours ago

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages DNS…

16 hours ago

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due…

16 hours ago

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a…

16 hours ago

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched…

19 hours ago

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications…

19 hours ago