Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remotely Control

Posted on July 29, 2025July 29, 2025 By CWS

Cybersecurity researchers have uncovered a complicated net shell assault concentrating on Microsoft Web Data Providers (IIS) servers, permitting menace actors to realize full distant management over compromised programs.

The malicious script, recognized as “UpdateChecker.aspx,” represents a big escalation in net shell complexity, using superior obfuscation methods to evade detection whereas sustaining persistent entry to important infrastructure.

The assault emerged from a broader investigation into cyber intrusions concentrating on important nationwide infrastructure within the Center East, the place menace actors efficiently deployed a number of net shell servers throughout compromised programs.

In contrast to conventional net shells that depend on easy PHP or ASP scripts, this variant leverages closely obfuscated C# code embedded inside an ASPX webpage file, making evaluation significantly tougher for safety groups.

View of the content material of the ASPX file with obfuscated C# code (Supply – Fortinet)

Fortinet researchers Xiaopeng Zhang and John Simmons recognized the malware throughout their follow-up evaluation of the Center East infrastructure breach, noting its refined design and doubtlessly devastating impression on affected organizations.

The net shell’s skill to function seamlessly inside Home windows IIS environments whereas sustaining stealth by superior obfuscation methods makes it significantly harmful for enterprise environments.

The malware operates with excessive severity implications, granting attackers complete management over compromised Home windows programs.

Debugger view of a parsed command knowledge within the net shell (Supply – Fortinet)

Its deployment particularly targets IIS servers, that are generally utilized in enterprise environments for internet hosting net functions and companies, making it a useful asset for menace actors searching for to determine long-term persistence inside organizational networks.

Technical Structure and Obfuscation Mechanisms

The UpdateChecker.aspx net shell demonstrates outstanding technical sophistication by its multi-layered obfuscation method.

The malware’s C# codebase employs Unicode encoding for all readable parts, together with technique names, variable names, and sophistication names, that are randomly generated to forestall signature-based detection. Moreover, all fixed values, strings, and numerical knowledge endure encryption or encoding processes earlier than compilation.

The net shell’s communication protocol requires HTTP POST requests with particular content-type headers set to “software/octet-stream.”

The HTTP POST visitors between the attacker and the net shell (Supply – Fortinet)

Command knowledge transmission follows a structured JSON format that features necessary keys equivalent to ProtocolVersion, ModuleName, and RequestName, together with non-compulsory parameters relying on the requested operation.

ModuleNameRequestNameParametersBaseGetBasicServerInfoBaseGetBasicServerApplicationInfoCommandShellExecuteCommandWorkingDirectory, CommandFileManagerGetDrivesFileManagerGetDriveInformationDriveNameFileManagerGetWebRootFileManagerGetFileSystemsListPathFileManagerCreateDirectoryPath, DirectoryNameFileManagerCopyDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerMoveDirectorySourcePath, DestinationPath, DirectoryName, OverwriteAllowFileManagerDeleteDirectoryPathFileManagerGetDirectoryInformationPathFileManagerSetDirectoryTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetDirectoryAttributesPath, AttributesFileManagerCreateFilePath, FileNameFileManagerCopyFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerMoveFileSourcePath, DestinationPath, OverwriteAllow, FileNameFileManagerDeleteFilePathFileManagerGetFileContentPathFileManagerSetFileContentPath, FileContent, FileNameFileManagerGetFileInformationPathFileManagerSetFileTimePath, CreationTimeUtc, LastModifiedTimeUtc, LastAccessTimeUtcFileManagerSetFileAttributesPath, AttributesFileManagerSearchByNamePath, Key phrase, MatchCase, MatchWordFileManagerSearchByContentPath, FileTypes, Key phrase, MatchCaseFileManagerReplaceFileContentPath, FileTypes, FindWhat, ReplaceWith, MatchCase, UseRegularExpressionFileManagerGetPathSeparator

The malware implements a dual-encryption scheme the place the primary 16 bytes comprise an encrypted key utilizing hardcoded values, adopted by command knowledge encrypted with a derived 15-byte key.

Functionally, the net shell organizes its capabilities into three distinct modules: Base for system reconnaissance, CommandShell for executing Home windows instructions with IIS privileges, and FileManager for complete file system operations.

This modular structure allows attackers to carry out numerous malicious actions, from preliminary system enumeration to superior file manipulation and command execution, all whereas sustaining the looks of respectable IIS server exercise.

Expertise quicker, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Attacking, Complete, Control, Gain, Hackers, IIS, Remotely, Script, Servers, Shell, Web

Post navigation

Previous Post: GitHub Outage Disrupts Core Services Globally for Users
Next Post: macOS ‘Sploitlight’ Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC

Related Posts

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
10 Best VPN Alternatives in 2025 Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News
Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information Cyber Security News
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
  • Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
  • Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked
  • PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain
  • Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
  • Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
  • Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked
  • PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain
  • Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News