Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vshell: Emerging C2 Tool Gains Popularity Among Cybercriminals

Vshell: Emerging C2 Tool Gains Popularity Among Cybercriminals

Posted on February 27, 2026 By CWS

A Go-based command-and-control (C2) framework known as Vshell has recently gained significant attention among cybercriminals. Initially popular within Chinese-speaking security communities, Vshell is becoming a sought-after alternative to costly commercial tools.

Vshell’s Evolution and Appeal

Vshell emerged in 2021 as a lightweight C2 platform, initially integrated with the AntSword web shell framework. Designed to manage compromised Windows and Linux systems, it supports network pivoting and lateral movement. The tool’s evolution is marked by its appeal to users of Cobalt Strike, offering a less expensive and more user-friendly option.

Censys analysts have identified numerous internet-facing Vshell deployments, discovering web directories with Vshell panels connected to hundreds of client agents. One particular panel revealed 286 active clients, highlighting Vshell’s capacity for traffic tunneling and lateral network movement.

Adoption by Cybercriminal Groups

Vshell’s reach extends beyond opportunistic attackers, having been utilized in several documented threat campaigns in 2025. Notable operations include DRAGONCLONE and SNOWLIGHT, as well as a phishing campaign where Vshell played a central role. This widespread adoption signifies Vshell’s transition from a niche tool to a mainstream capability in the cyber threat landscape.

With the release of version 4, Vshell introduced licensing controls, a redesigned interface, and nginx impersonation techniques. These enhancements suggest ongoing investment in its longevity and evasion capabilities. Censys has identified over 850 active Vshell listeners, underscoring its extensive deployment.

Advanced Features and Security Implications

Vshell’s advanced architecture includes a flexible listener system, allowing operators to maintain control over compromised hosts via various protocols. The “Listener Management” interface enables the configuration of inbound connection handlers across TCP, KCP/UDP, WebSocket, DNS, and DNS-over-TLS/HTTPS, among others. These features make Vshell difficult to detect and block.

Vshell’s design mirrors that of Cobalt Strike, with a central team server managing implants and offering full session control. Recent upgrades include digest authentication, reducing detectable artifacts and complicating identification efforts.

For defenders, monitoring web servers and firewalls for Vshell deployment is crucial. Network teams should scrutinize DNS-over-HTTPS and DNS-over-TLS traffic for anomalies, as these are common C2 channels. Security teams are advised to conduct regular threat-hunting queries and establish alerts for communications matching Vshell patterns.

Cyber Security News Tags:C2 framework, Cobalt Strike, cyber defense, Cybersecurity, DNS-over-HTTPS, network security, remote access tools, Threat Actors, threat hunting, VSHell

Post navigation

Previous Post: Zyxel Router Flaws: Remote Command Injection Risk
Next Post: Over 900 FreePBX Systems Infected in Web Shell Attacks

Related Posts

AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload Cyber Security News
BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch Cyber Security News
New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News