Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Hackers Deploy Web Shells Using Apache AXIS

September 24, 2024
Reading Time: 2 mins read
in Alerts
Hackers Deploy Web Shells Using Apache AXIS

Hackers have recently targeted the Apache AXIS server to deploy malicious web shells, as reported by cybersecurity researchers at Binary Defense. This web service engine, known for its capability to facilitate web service interfaces in applications, was exploited by a China-linked threat actor who gained access to three unmanaged AIX servers in August 2024. The attackers leveraged weak administrative passwords to breach these servers, enabling them to upload an AxisInvoker web shell and establish persistent communication with the targeted network through a Fast Reverse Proxy (FRP).

Between March and August, the threat actors conducted reconnaissance operations utilizing various techniques, including LDAP queries, SMB shares, and local configuration files. This preparatory phase allowed them to gather critical information about the network environment. Following their reconnaissance, the attackers transitioned to a Windows operating system, where they attempted to deploy Cobalt Strike beacons and JavaScript-based web shells, further enhancing their foothold in the compromised network. Additionally, they executed NTLM relay attacks to perform Active Directory reconnaissance and impersonate user accounts, highlighting the sophisticated nature of their tactics.

The incident underscores the significant risks associated with shadow IT, where systems are implemented without adequate oversight from security teams. The attack illustrates the need for advanced threat detection capabilities across all networked devices, including outdated and seemingly low-priority systems. Binary Defense’s findings emphasize the vulnerabilities of unmanaged AIX servers, revealing how attackers utilized the AXISInvoker web shell and FRP for initial access, followed by attempts to navigate laterally within the network.

Fortunately, the attackers faced challenges in establishing a Command and Control (C2) channel due to the incompatibility of Linux commands like ‘wget’ and ‘curl’ with AIX solutions. This incident serves as a stark reminder of the necessity for comprehensive security monitoring, regular audits, and effective credential management. Organizations must ensure that all systems, regardless of their perceived importance, are subject to rigorous oversight to strengthen defenses and prevent similar complex attacks in the future.

Reference:
  • Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT
Tags: ApacheChinaCobalt StrikeCyber AlertsCyber Alerts 2024Cyber threatsHackersMalwareSeptember 2024
ADVERTISEMENT

Related Posts

BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025
Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

October 10, 2025
Hackers Abuse WordPress for Phishing

Android Spyware ClayRat Imitates Apps

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial