{"id":15194,"date":"2013-12-04T10:52:22","date_gmt":"2013-12-04T17:52:22","guid":{"rendered":"https://www.webroot.com/blog/?p=15194"},"modified":"2024-04-03T12:33:31","modified_gmt":"2024-04-03T18:33:31","slug":"commercial-windows-based-compromised-web-shells-management-application-spotted-wild","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/12\/04\/commercial-windows-based-compromised-web-shells-management-application-spotted-wild\/","title":{"rendered":"Commercial Windows-based compromised Web shells management application spotted in the wild"},"content":{"rendered":"<p>For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on <a href=\"https://www.webroot.com/blog/2013\/08\/02\/new-hacked-shells-as-a-service-empowers-cybercriminals-with-access-to-high-page-rank-ed-web-sites\/\"><strong>compromised Web shells<\/strong><\/a>, continues to enjoy the high page ranks of the affected Web sites for <a href=\"http:\/\/ddanchev.blogspot.com\/2013\/04\/whats-roi-on-going-to-virtual-blackhat.html\"><strong>blackhat SEO<\/strong><\/a> (<a href=\"https://www.webroot.com/blog/2013\/04\/29\/how-fraudulent-blackhat-seo-monetizers-apply-quality-assurance-qa-to-their-diy-doorway-generators\/\"><strong>search engine optimization<\/strong><\/a>) purposes. How are cybercriminals managing these campaigns? What type of tools and tactics do they use? In a cybercrime ecosystem that has logically migrated to <a href=\"https://www.webroot.com/blog/2013\/10\/01\/peek-inside-blackhat-seo-friendly-doorways-management-platform\/\"><strong>Web-based platforms<\/strong><\/a> for a variety of reasons over the last couple of years, there are still those who&#8217;re keeping it old school, by releasing host-based DIY cybercrime-friendly applications. In this post, I&#8217;ll discuss a commercially available Windows-based compromised\/hacked Web shells management application.<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshots of the application in action:<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management.png\"><img decoding=\"async\" loading=\"lazy\" width=\"548\" height=\"347\" class=\"size-full wp-image-15197 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management.png 548w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management-300x189.png 300w\" sizes=\"(max-width: 548px) 100vw, 548px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_01.png\"><img decoding=\"async\" loading=\"lazy\" width=\"552\" height=\"348\" class=\"size-full wp-image-15198 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_01.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_01\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_01.png 552w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_01-300x189.png 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_02.png\"><img decoding=\"async\" loading=\"lazy\" width=\"904\" height=\"143\" class=\"size-full wp-image-15199 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_02.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_02\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_02.png 904w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_02-300x47.png 300w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_03.png\"><img decoding=\"async\" loading=\"lazy\" width=\"555\" height=\"350\" class=\"size-full wp-image-15200 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_03.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_03\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_03.png 555w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_03-300x189.png 300w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_04.png\"><img decoding=\"async\" loading=\"lazy\" width=\"609\" height=\"364\" class=\"size-full wp-image-15201 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_04.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_04\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_04.png 609w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_04-300x179.png 300w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_05.png\"><img decoding=\"async\" loading=\"lazy\" width=\"553\" height=\"349\" class=\"size-full wp-image-15202 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_05.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_05\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_05.png 553w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_05-300x189.png 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_06.png\"><img decoding=\"async\" loading=\"lazy\" width=\"612\" height=\"366\" class=\"size-full wp-image-15203 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_06.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_06\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_06.png 612w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_06-300x179.png 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_07.png\"><img decoding=\"async\" loading=\"lazy\" width=\"553\" height=\"347\" class=\"size-full wp-image-15204 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_07.png\" alt=\"Commercial_Windows_Compromised_Hacked_Web_Shell_Management_07\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_07.png 553w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2013\/12\/Commercial_Windows_Compromised_Hacked_Web_Shell_Management_07-300x188.png 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>Among the tool&#8217;s unique features, is the ability to check the validity of the supplied compromised\/hacked shells, various modification options like changing passwords and updating the redirectors, as well as the ability to change .htaccess. Compared to <a href=\"https://www.webroot.com/blog/2013\/07\/11\/new-commercially-available-mass-ftp-based-proxy-supporting-doorwaymalicious-script-uploading-application-spotted-in-the-wild\/\"><strong>a similar application<\/strong><\/a>, which we profiled in July, 2013, we believe that in its current form, the tool profiled in this post doesn&#8217;t have the capacity to be utilized for widespread, hard-to-detected mass abuse of compromised\/hacked shells.<\/p>\n<p>In 2013, insecurely configured Web applications susceptible to remote exploitation for fraudulent and malicious purposes &#8212; think Remote File Inclusion &#8212; \u00a0the active data mining of a botnet&#8217;s infected population, as well as good old fashioned brute-forcing attempts, continue supplying the market segment for compromised\/hacked Web shells, with new accounting data, most commonly abused in a typical blackhat SEO style, with the actual campaigns monetized through an affiliate network. We expect that this trend will continue, in combination with what we believe is a resurrection of a proven process for monetizing compromised access to a legitimate Web site, namely, cybercrime-friendly traffic exchanges.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, whenever I needed a fresh sample of pharmaceutical scams, I always sampled the Web sites of major educational institutions, where a thriving ecosystem relying on compromised Web shells, continues to enjoy the high page ranks of the affected Web sites for blackhat SEO (search engine optimization) purposes. How are cybercriminals managing these campaigns? [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[14735,4209,14379,11203,11559,10621,16783,15509,16777,16769,10777,10273,3875,14381,15515,4167,4313,16775,6089],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15194"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15194"}],"version-history":[{"count":8,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15194\/revisions"}],"predecessor-version":[{"id":32855,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15194\/revisions\/32855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15194"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15194"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}