logo.png
GET GDPR READY

Foregenix Blog

Benjamin Hosack

Alert: New PHP Webshell Identified

web security, Magento

,03/03/17 11:50

A new piece of malware has been identified by the Foregenix DFIR team.  The malware is a PHP webshell - a script, which when installed on a compromised system, presents a sophisticated administration platform allowing the attacker to browse the filesystem of the compromised server, upload, create, edit, download or delete files or stop running processes.

The Malware

It even has functionality to add a further backdoor onto the system which would allow the attacker to connect back to the server as desired. The malware, named ‘BArNEr’ within the code, appears to be present on a number of systems in the wild and may be connected to an Indonesian cyber crime collective called the ‘Indonesia HackRs’. 

New PHP Malware.png

The code that creates the web shell is generally found “hidden” at the end of a JPEG image.

Known as a ‘dropper’, this file would first be placed on a compromised system and then activated by the attacker requesting it from the website. During analysis it was found that the code for the web shell did not work on PHP 7 (due to its use of a depreciated function) but would function as intended if the affected website was running PHP5.

Foregenix urges website owners to examine their systems for presence of this malware. 

How do I detect this malware on my website?

Guided Website Threat ReviewDetection is simple with the right tools.  Apply for a Guided Threat Review of your website and our team will scan the internal file system of your website using FGX-Web for this malware and many others.

Alternatively, the following grep commands should reveal these files if they are present:

Ajax Harvester  Initialiser

grep -slr‘\\x6F\\x6E\\x65\\x70\\x61\\x67\\x65\\x7C\\x63\\x68\\

x65\\x63\\x6B\\x6F\\x75\\x74\\x7C\\x6F\\x6E\\x65\\x73\\x74\\x65\\

x70\\x7C\\x66\\x69\\x72\\x65\\x63\\x68\\x65\\x63\\x6B\\x6F\\x75\\x74’ .

 

Ajax Harvester – Harvester

grep –slr‘\\x73\\x65\\x6C\\x65\\x63\\x74\\x5B\\x69\\x64\\x3D\\x22\\x73\\

x74\\x72\\x69\\x70\\x65\\x43\\x61\\x72\\x64\\x45\\x78\\x70\\x69\\x72\\

x79\\x59\\x65\\x61\\x72\\x22\\x5D’ .

 

Webshell Dropper

grep -slrR 'file_exists\|BADUBAMM' .

 

BArNEr’ Webshell

grep -slr '7P15f9s4kjgO/737+ex7YDSejj12rNOH4o6nqfs+rTOdn4ciKYoSJcqk7t' .

TRENDING POSTS

Kirsty Trainer
"Key" to Secure Data - P2PE - Derived Unique Key Per Transaction (DUKPT)

Written by Andrew McKenna, PCI QSA, PCIP at Foregenix The encryption key infrastructure usually ...

Read More
Duncan Slater
Alert: Major UK Payment Service Provider iFrame Man-In-The-Middle Breach

The Foregenix Digital Forensics and Incident Response Team recently reported a man-in-the-middle ...

Read More

Cyber Security Insights

Jake Dennys
24/11/17 15:17

Black Friday Sees Website Traffic Increase by 200%

Black Friday is upon us and as I’m sure you know, it comes hand in hand with lucrative tech discounts from across the industry. For businesses ...

Read More

Richard Jones
17/11/17 09:39

Successfully implementing GDPR: Compliance and Awareness

The General Data Protection Requirement (GDPR) is essentially about privacy. It relies on cyber security controls to ensure that legitimately used ...

Read More

Richard Jones
02/11/17 10:33

GDPR – Keeping things simple.

  Type GDPR into Google and you will get just shy of 6 million results. Factor in the complexity of each and every article and it’s easy to see why ...

Read More

Richard Jones
31/10/17 10:27

Data Discovery: The only place to start with GDPR

To those new to GDPR, it may appear like a complex task for which there are so many actions it’s almost impossible to know where to start. I would ...

Read More

Kirsty Trainer
26/10/17 15:02

Improving Cybersecurity in the Contact Center: How to Reduce the Risk of a Breach  [Webinar]

  The negative impact of a data breach has wide reaching consequences, it’s not something that can be solved with a “Sorry” and a slap on the wrist. ...

Read More