Monday, March 17, 2025
HomeBrowserHackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an unexpected addition, Filebroser, a rebranded version of the open-source File Browser file management tool.

This discovery sheds light on how attackers continue to leverage web shells for persistent access and post-compromise operations while blending into legitimate infrastructure.

JSPSpy With Webshell Infrastructure

JSPSpy, developed in Java and first observed in 2013, has been utilized by various threat actors, including the Lazarus Group, which reportedly targeted a research organization.

The web shell provides a graphical interface for remote access and file management, making it accessible even to inexperienced operators.

Recent analysis revealed four servers hosting JSPSpy across multiple providers in China and the United States.

JSPSpy login page hosted at learning.gensci-china[.]com.

These include CHINANET Jilin Province Network, Huawei Public Cloud Service Technologies, China Mobile Communications Corporation, and Multacom Corporation.

Most servers operate on port 80 to blend with legitimate HTTP traffic, though one instance in China uses port 8888.

Notably, one server (124.235.147[.]90) hosts a TLS certificate issued by DigiCert for dgtmeta[.]com, first observed in September 2024 and still active as of March 2025.

Certificate data for *dgtmeta[.]com in Hunt

Further investigation uncovered a web-facing login panel labeled “filebroser” on two servers (124.235.147[.]90 and 74.48.175[.]44).

This panel operates on port 8001 and closely resembles the legitimate File Browser project, raising questions about its purpose and potential modifications.

Renamed File Browser login page.

The filebroser panel appears to be a slightly altered version of the open-source File Browser tool, with its name changed and the same favicon retained from the original project.

Internet scans for the login page titled “登录 – filebroser” (translated as “Login – filebroser”) yielded fewer than ten results, indicating limited deployment likely specific to a single operator.

Although it remains unclear whether filebroser functions identically to its open-source counterpart or has been modified for malicious purposes, its presence alongside JSPSpy suggests it may serve as an operational tool for threat actors.

Both tools share overlapping HTTP headers, such as the “Ohc-Cache-Hit” field containing random five-character strings, which can aid defenders in refining detection queries.

Legitimate File Browser login page.

Detection Strategies for Defenders

Identifying JSPSpy servers can be achieved through their consistent login page title (“JspSpy Codz By-Ninty”) or HTTP response headers like “Server: JSP3/2.0.14” and “Ohc-Cache-Hit.”

For large-scale searches, regex patterns (\b[a-zA-Z]{5}\b) can be applied to detect these headers effectively.

The overlap between JSPSpy and filebroser provides additional indicators for tracking malicious activity.

Combining weak signals such as page titles, HTTP headers, and response behaviors enables defenders to strengthen visibility into attacker infrastructure.

Web shells like JSPSpy remain a favored tool for cybercriminals due to their low footprint and ability to blend into legitimate environments.

Proactively monitoring these deployments is crucial for understanding attacker behavior and mitigating threats.

Indicators of Compromise (IOCs)

IP AddressASNDomain(s)LocationNotes
124.235.147[.]90CHINANET Jilin province networklearning.gensci-china[.]comChinaJSPSpy: Port 80; Filebroser: 8001
113.45.180[.]224Huawei Cloud Service data centerN/AChinaJSPSpy: Port 80
74.48.175[.]44Multacom CorporationN/AUnited StatesJSPSpy: Port 80; Filebroser: 8001
22.176.159[.]209Henan Mobile Communications Co., LtdN/AChinaJSPSpy: Port 8888

This development underscores the importance of layered detection strategies to counter evolving cyber threats effectively.

Are you from SOC/DFIR Teams?: Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...