CISA Adds Two Web Shells to Exchange Server Guidance
Officials update mitigation steps to include two new Malware Analysis Reports identifying Web shells seen in Exchange Server attacks.
The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) today updated its guidance for ongoing Microsoft Exchange Server exploits to include two new Malware Analysis Reports (MARs).
Each of these reports, now included in CISA's full "Mitigate Microsoft Exchange Server Vulnerabilities" alert, identifies a Web shell seen in post-compromised Microsoft Exchange servers. CISA has also updated seven existing MARs to include YARA rules developed by CISA to help organizations detect the malware seen so far in these attacks.
All of the MARs shared so far focus on China Chopper, a Web shell commonly seen in the attacks. After exploiting an Exchange Server vulnerability to gain initial access, an attacker can use China Chopper to remotely execute operating system commands and conduct activities such as uploading and executing tools, pivoting to other systems, and exfiltrating data.
Prior to today, CISA had already updated its guidance to detail seven China Chopper Web shells; today's addition brings it to nine in total. Officials note this is not an all-inclusive list of the Web shells attackers are using.
Read more details here.
About the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024