Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Recently, the Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange … Continue reading Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Recently, the Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange … Continue reading Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

[SANS ISC] Webshell looking for interesting files

I published the following diary on isc.sans.org: “Webshell looking for interesting files“: Yesterday, I found on Pastebin a bunch of samples of a webshell that integrates an interesting feature: It provides a console mode that you can use to execute commands on the victim host. The look and feel of the

[The post [SANS ISC] Webshell looking for interesting files has been first published on /dev/random]

Continue reading [SANS ISC] Webshell looking for interesting files

[SANS ISC] Another webshell, another backdoor!

I published the following diary on isc.sans.org: “Another webshell, another backdoor!“. I’m still busy to follow how webshells are evolving… I recently found another backdoor in another webshell called “cor0.id”. The best place to find webshells remind pastebin.com[1]. When I’m testing a webshell, I copy it in a VM located

[The post [SANS ISC] Another webshell, another backdoor! has been first published on /dev/random]

Continue reading [SANS ISC] Another webshell, another backdoor!

[SANS ISC Diary] Analysis of a Simple PHP Backdoor

I published the following diary on isc.sans.org: “Analysis of a Simple PHP Backdoor“. With the huge surface attack provided by CMS like Drupal or WordPress, webshells remain a classic attack scenario. A few months ago, I wrote a diary about the power of webshells. A few days ago, a friend

[The post [SANS ISC Diary] Analysis of a Simple PHP Backdoor has been first published on /dev/random]

Continue reading [SANS ISC Diary] Analysis of a Simple PHP Backdoor