CISA Adds Two Web Shells to Exchange Server Guidance

Officials update mitigation steps to include two new Malware Analysis Reports identifying Web shells seen in Exchange Server attacks.

Dark Reading Staff, Dark Reading

March 26, 2021

1 Min Read
Dark Reading logo in a gray background | Dark Reading

The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) today updated its guidance for ongoing Microsoft Exchange Server exploits to include two new Malware Analysis Reports (MARs). 

Each of these reports, now included in CISA's full "Mitigate Microsoft Exchange Server Vulnerabilities" alert, identifies a Web shell seen in post-compromised Microsoft Exchange servers. CISA has also updated seven existing MARs to include YARA rules developed by CISA to help organizations detect the malware seen so far in these attacks. 

All of the MARs shared so far focus on China Chopper, a Web shell commonly seen in the attacks. After exploiting an Exchange Server vulnerability to gain initial access, an attacker can use China Chopper to remotely execute operating system commands and conduct activities such as uploading and executing tools, pivoting to other systems, and exfiltrating data. 

Prior to today, CISA had already updated its guidance to detail seven China Chopper Web shells; today's addition brings it to nine in total. Officials note this is not an all-inclusive list of the Web shells attackers are using. 

Read more details here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights