Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Posted on July 29, 2025July 29, 2025 By CWS

Cybersecurity researchers have uncovered a complicated net shell assault concentrating on Microsoft Web Data Providers (IIS) servers, permitting menace actors to realize full distant management over compromised programs.

The malicious script, recognized as “UpdateChecker.aspx,” represents a big escalation in net shell complexity, using superior obfuscation methods to evade detection whereas sustaining persistent entry to important infrastructure.

The assault emerged from a broader investigation into cyber intrusions concentrating on important nationwide infrastructure within the Center East, the place menace actors efficiently deployed a number of net shell servers throughout compromised programs.

In contrast to conventional net shells that depend on easy PHP or ASP scripts, this variant leverages closely obfuscated C# code embedded inside an ASPX webpage file, making evaluation significantly tougher for safety groups.

View of the content material of the ASPX file with obfuscated C# code (Supply – Fortinet)

Fortinet researchers Xiaopeng Zhang and John Simmons recognized the malware throughout their follow-up evaluation of the Center East infrastructure breach, noting its refined design and doubtlessly devastating impression on affected organizations.

The net shell’s skill to function seamlessly inside Home windows IIS environments whereas sustaining stealth by superior obfuscation methods makes it significantly harmful for enterprise environments.

The malware operates with excessive severity implications, granting attackers complete management over compromised Home windows programs.

Debugger view of a parsed command knowledge within the net shell (Supply – Fortinet)

Its deployment particularly targets IIS servers, that are generally utilized in enterprise environments for internet hosting net functions and companies, making it a useful asset for menace actors searching for to determine long-term persistence inside organizational networks.

Technical Structure and Obfuscation Mechanisms

The UpdateChecker.aspx net shell demonstrates outstanding technical sophistication by its multi-layered obfuscation method.

The malware’s C# codebase employs Unicode encoding for all readable parts, together with technique names, variable names, and sophistication names, that are randomly generated to forestall signature-based detection. Moreover, all fixed values, strings, and numerical knowledge endure encryption or encoding processes earlier than compilation.

The net shell’s communication protocol requires HTTP POST requests with particular content-type headers set to “software/octet-stream.”

The HTTP POST visitors between the attacker and the net shell (Supply – Fortinet)

Command knowledge transmission follows a structured JSON format that features necessary keys equivalent to ProtocolVersion, ModuleName, and RequestName, together with non-compulsory parameters relying on the requested operation.

ModuleNameRequestNameParametersBaseGetBasicServerInfoBaseGetBasicServerApplicationInfoCommandShellExecuteCommandWorkingDirectory, CommandFileManagerGetDrivesFileManagerGetDriveInformationDriveNameFileManagerGetWebRootFileManagerGetFileSystemsListPathFileManagerCreateDirectoryPath, DirectoryNameFileManagerCopyDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerMoveDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerDeleteDirectoryPathFileManagerGetDirectoryInformationPathFileManagerSetDirectoryTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetDirectoryAttributesPath, AttributesFileManagerCreateFilePath, FileNameFileManagerCopyFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerMoveFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerDeleteFilePathFileManagerGetFileContentPathFileManagerSetFileContentPath, FileContent, FileNameFileManagerGetFileInformationPathFileManagerSetFileTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetFileAttributesPath, AttributesFileManagerSearchByNamePath, Key phrase, MatchCase, MatchWordFileManagerSearchByContentPath, FileTypes, Key phrase, MatchCaseFileManagerReplaceFileContentPath, FileTypes, FindWhat, ReplaceWith, MatchCase, UseRegularExpressionFileManagerGetPathSeparator

The malware implements a dual-encryption scheme the place the primary 16 bytes comprise an encrypted key utilizing hardcoded values, adopted by command knowledge encrypted with a derived 15-byte key.

Functionally, the net shell organizes its capabilities into three distinct modules: Base for system reconnaissance, CommandShell for executing Home windows instructions with IIS privileges, and FileManager for complete file system operations.

This modular structure allows attackers to carry out numerous malicious actions, from preliminary system enumeration to superior file manipulation and command execution, all whereas sustaining the looks of respectable IIS server exercise.

Expertise quicker, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Attacking, Complete, Control, Gain, Hackers, IIS, Remotely, Script, Servers, Shell, Web

Post navigation

Previous Post: GitHub Outage Disrupts Core Services Globally for Users
Next Post: macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC

Related Posts

Famous Chollima APT Hackers Attacking Job Seekers and Organization to Deploy JavaScript Based Malware Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News