Abandoned Backdoors: How Malicious Infrastructure Lives On

Share:

What happens to malicious infrastructure created by attackers, after they stop maintaining it?

See Also: Live Webinar | 10 Strategies to Tackle Alert Fatigue with Smarter SOC

To paraphrase the old Army ballad, such infrastructure never dies, it just fades away.

Many systems infected by malicious code will keep trying to “phone home” but not receive a response unless someone else takes control of the domain to which they’re reaching out. Many of these server infections are traced to malicious web shells. Such software gets installed on infected servers to give attackers remote access, via HTTP, allowing them to run commands, upload and execute files, exfiltrate data and more.

Enter researchers from attack surface management vendor watchTowr who decided to study how many systems infected by web shells they could find that reached out to “expired and abandoned infrastructure.”

Now add this wrinkle: To trace the infections, they looked for communications tied to hardcoded but obfuscated backdoors in popular web shells, hidden by their developers so they could hijack any infections made with their tool.

“We went on a mission: Collect as many web shells as possible – regardless of language, target or age – de-obfuscate any code that happened to be protected by the power of base64 and extract any unregistered domains likely used in some sort of callback function,” watchTowr researchers said.

They funneled the results of their unregistered domain searches to the AWS Route53 API, enabling them to automatically register more than 40 domains for $20 each. The domains included alturks.comh4cks.inhackru.info and w2img.com. Researchers then redirected all traffic to those domains to their own logging server, set to only receive and log all incoming requests, and to not respond to any of them.

“Put simply: We have been hijacking backdoors that were reliant on now-abandoned infrastructure and/or expired domains that themselves existed inside backdoors, and have since been watching the results flood in,” they said. “This hijacking allowed us to track compromised hosts as they ‘reported in,’ and theoretically gave us the power to commandeer and control these compromised hosts.”

While any user with malicious intentions might very well pursue such activities, the researchers said they drew a clear line at either commandeering or compromising the hosts, and instead only amassed incoming data.

They’ve been analyzing their logs, and so far have counted 4,000 breached systems phoning home, including government systems in Bangladesh, China and Nigeria, as well as educational systems in China, South Korea and Thailand.

Numerous requests traced to a variant of a backdoor tied to 2020 attacks attributed to North Korea’s Lazarus Group, which other attackers may have since repurposed, that is designed to load a .gif file from the w2img.com server. “We saw over 3,900 unique compromised domains from this backdoor alone – clearly, this is a prolific tool,” they said.

Rather than let the domain registrations tied to the malicious activity ultimately expire again and be available for someone else to potentially commandeer, researchers said they handed it off to The Shadowserver Foundation, which is a nonprofit security organization that often sinkholes domains connected to malicious domains.

Backdoors in Backdoors

The research is a reminder that malicious web shell options remain numerous and often freely available for aspiring attackers. Most web shells are written in PHP, which remains the most widely used server-side language, boasting a market share of 75% or more.

Long-popular web shell options include c99 shell and r57 shell, researchers say. Other examples include China Chopper, which has been tied to numerous attacks attributed to Beijing-backed government hackers, including the group tracked as APT41.

One quirk of web shells, as capitalized on by the watchTowr researchers, is that their creators often add backdoors allowing them to steal infected sites from their tool’s users.

Long a rumor on hacking forums, research backs up this nefarious strategy as fact. As detailed in a 2016 “No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells” research paper, about 30% of the 1,449 web shells studied by those researchers included a hidden mechanism for phoning home to their creator, so that “the shells, upon execution, surreptitiously communicate to various third parties with the intent of revealing the location of new shell installations.”

Knowing the location of these new shell installations enables the tool’s developer to seize control of the web shells after someone else has gone to the time, effort and expense of finding and infecting them.

Shocker: there’s really no honor among thieves.

Web shells are not the only type of hacking tool that gets regularly backdoored by their creators. The research paper also cites examples that include phishing toolkits designed to share stolen credentials not only with users but the creator of the toolkit, as well as a distributed denial-of-service tool designed to backdoor any system on which it got installed.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
9:51 am, Jan 15, 2025
weather icon 9°C
L: 9° | H: 10°
overcast clouds
Humidity: 92 %
Pressure: 1035 mb
Wind: 1 mph W
Wind Gust: 2 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:59 am
Sunset: 4:20 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
9° | 10°°C 0 mm 0% 3 mph 98 % 1034 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
5° | 9°°C 0 mm 0% 5 mph 96 % 1035 mb 0 mm/h
Fri Jan 17 9:00 pm
weather icon
3° | 7°°C 0 mm 0% 4 mph 93 % 1036 mb 0 mm/h
Sat Jan 18 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 3 mph 89 % 1033 mb 0 mm/h
Sun Jan 19 9:00 pm
weather icon
2° | 6°°C 0 mm 0% 4 mph 89 % 1024 mb 0 mm/h
Today 12:00 pm
weather icon
9° | 9°°C 0 mm 0% 2 mph 90 % 1034 mb 0 mm/h
Today 3:00 pm
weather icon
9° | 9°°C 0 mm 0% 3 mph 90 % 1033 mb 0 mm/h
Today 6:00 pm
weather icon
7° | 7°°C 0 mm 0% 3 mph 97 % 1034 mb 0 mm/h
Today 9:00 pm
weather icon
6° | 6°°C 0 mm 0% 3 mph 98 % 1034 mb 0 mm/h
Tomorrow 12:00 am
weather icon
6° | 6°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Tomorrow 3:00 am
weather icon
5° | 5°°C 0 mm 0% 3 mph 95 % 1033 mb 0 mm/h
Tomorrow 6:00 am
weather icon
5° | 5°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Tomorrow 9:00 am
weather icon
5° | 5°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,998.03
-0.40%
Ethereum(ETH)
€3,112.64
-1.44%
XRP(XRP)
€2.75
9.27%
Tether(USDT)
€0.97
-0.01%
Solana(SOL)
€181.88
-1.45%
Dogecoin(DOGE)
€0.345202
0.34%
USDC(USDC)
€0.97
0.01%
Shiba Inu(SHIB)
€0.000020
-1.68%
Pepe(PEPE)
€0.000016
-2.32%
Peanut the Squirrel(PNUT)
€0.54
-10.17%
Scroll to Top