Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Posted on July 29, 2025July 29, 2025 By CWS

Cybersecurity researchers have uncovered a complicated net shell assault concentrating on Microsoft Web Data Providers (IIS) servers, permitting menace actors to realize full distant management over compromised programs.

The malicious script, recognized as “UpdateChecker.aspx,” represents a big escalation in net shell complexity, using superior obfuscation methods to evade detection whereas sustaining persistent entry to important infrastructure.

The assault emerged from a broader investigation into cyber intrusions concentrating on important nationwide infrastructure within the Center East, the place menace actors efficiently deployed a number of net shell servers throughout compromised programs.

In contrast to conventional net shells that depend on easy PHP or ASP scripts, this variant leverages closely obfuscated C# code embedded inside an ASPX webpage file, making evaluation significantly tougher for safety groups.

View of the content material of the ASPX file with obfuscated C# code (Supply – Fortinet)

Fortinet researchers Xiaopeng Zhang and John Simmons recognized the malware throughout their follow-up evaluation of the Center East infrastructure breach, noting its refined design and doubtlessly devastating impression on affected organizations.

The net shell’s skill to function seamlessly inside Home windows IIS environments whereas sustaining stealth by superior obfuscation methods makes it significantly harmful for enterprise environments.

The malware operates with excessive severity implications, granting attackers complete management over compromised Home windows programs.

Debugger view of a parsed command knowledge within the net shell (Supply – Fortinet)

Its deployment particularly targets IIS servers, that are generally utilized in enterprise environments for internet hosting net functions and companies, making it a useful asset for menace actors searching for to determine long-term persistence inside organizational networks.

Technical Structure and Obfuscation Mechanisms

The UpdateChecker.aspx net shell demonstrates outstanding technical sophistication by its multi-layered obfuscation method.

The malware’s C# codebase employs Unicode encoding for all readable parts, together with technique names, variable names, and sophistication names, that are randomly generated to forestall signature-based detection. Moreover, all fixed values, strings, and numerical knowledge endure encryption or encoding processes earlier than compilation.

The net shell’s communication protocol requires HTTP POST requests with particular content-type headers set to “software/octet-stream.”

The HTTP POST visitors between the attacker and the net shell (Supply – Fortinet)

Command knowledge transmission follows a structured JSON format that features necessary keys equivalent to ProtocolVersion, ModuleName, and RequestName, together with non-compulsory parameters relying on the requested operation.

ModuleNameRequestNameParametersBaseGetBasicServerInfoBaseGetBasicServerApplicationInfoCommandShellExecuteCommandWorkingDirectory, CommandFileManagerGetDrivesFileManagerGetDriveInformationDriveNameFileManagerGetWebRootFileManagerGetFileSystemsListPathFileManagerCreateDirectoryPath, DirectoryNameFileManagerCopyDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerMoveDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerDeleteDirectoryPathFileManagerGetDirectoryInformationPathFileManagerSetDirectoryTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetDirectoryAttributesPath, AttributesFileManagerCreateFilePath, FileNameFileManagerCopyFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerMoveFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerDeleteFilePathFileManagerGetFileContentPathFileManagerSetFileContentPath, FileContent, FileNameFileManagerGetFileInformationPathFileManagerSetFileTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetFileAttributesPath, AttributesFileManagerSearchByNamePath, Key phrase, MatchCase, MatchWordFileManagerSearchByContentPath, FileTypes, Key phrase, MatchCaseFileManagerReplaceFileContentPath, FileTypes, FindWhat, ReplaceWith, MatchCase, UseRegularExpressionFileManagerGetPathSeparator

The malware implements a dual-encryption scheme the place the primary 16 bytes comprise an encrypted key utilizing hardcoded values, adopted by command knowledge encrypted with a derived 15-byte key.

Functionally, the net shell organizes its capabilities into three distinct modules: Base for system reconnaissance, CommandShell for executing Home windows instructions with IIS privileges, and FileManager for complete file system operations.

This modular structure allows attackers to carry out numerous malicious actions, from preliminary system enumeration to superior file manipulation and command execution, all whereas sustaining the looks of respectable IIS server exercise.

Expertise quicker, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Attacking, Complete, Control, Gain, Hackers, IIS, Remotely, Script, Servers, Shell, Web

Post navigation

Previous Post: GitHub Outage Disrupts Core Services Globally for Users
Next Post: macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC

Related Posts

Building a Scalable Cybersecurity Training Program Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Vibe Coding Platform Hacked
  • BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Vibe Coding Platform Hacked
  • BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News