Campaign Identifier: Webshells-To-Cloud-Modular-Intrusion

Last Updated: October 20, 2025


BLUF (Bottom Line Up Front)

Executive Summary

Business Impact Summary

The “From Webshells to the Cloud” campaign represents a sophisticated, multi-phase intrusion chain that compromises web servers and pivots to cloud infrastructure abuse. This modular attack demonstrates advanced persistence capabilities and strong attribution fingerprints, indicating an organized threat operation with systematic exploitation methodologies.

Key Risk Factors

Risk Factor Score Business Impact
Web Server Compromise 9/10 Complete server control with data exfiltration and lateral movement capabilities
Cloud Infrastructure Abuse 8/10 Legitimate cloud services abused for C2, exfiltration, and attack infrastructure
Persistence Mechanisms 8/10 Multiple backdoors with RSA encryption ensuring exclusive attacker access
Attribution Fingerprints 7/10 Strong attribution evidence but may indicate shared tools across threat groups

Priority 1: Immediate Response (First 60 Minutes)

  1. ISOLATE all web servers with potential PHP backdoor infections from production networks
  2. BLOCK known malicious infrastructure at network perimeter (45.118.144.151:8081, 152.32.191.156:8081)
  3. SCAN all web servers for PHP backdoors and suspicious files using provided IOCs
  4. AUDIT cloud service access logs for unauthorized API usage and data exfiltration
  5. COLLECT forensic evidence including web server logs, memory dumps, and network captures
  6. RESET all credentials for potentially compromised systems and cloud accounts

Priority 2: Investigation & Analysis

  1. FORENSIC ANALYSIS of web server logs for exploitation patterns and timeline reconstruction
  2. LOG ANALYSIS for connections to known malicious infrastructure and data exfiltration indicators
  3. CLOUD AUDIT for unauthorized API access, unusual data transfers, and privilege escalation
  4. MALWARE ANALYSIS of recovered PHP backdoors and exploit kits
  5. THREAT HUNTING for additional compromised systems and lateral movement within infrastructure

Priority 3: Remediation & Recovery

  1. REBUILD compromised web servers from known-good images or deploy clean instances
  2. UPDATE all web applications and frameworks to latest secure versions
  3. IMPLEMENT web application firewalls with PHP backdoor detection capabilities
  4. DEPLOY enhanced monitoring for cloud service API abuse and unusual data transfers
  5. ESTABLISH secure coding practices and code review processes for web development

Organizational Guidance

For Executive Leadership

  • Resource Allocation: Assess incident response team deployment, system rebuilding costs, and cloud security investments
  • Business Continuity: Evaluate web service disruption impact and customer communication strategies
  • Compliance Obligations: Review data breach notification requirements for web application compromises
  • Stakeholder Communication: Plan internal and external notification strategies for web service incidents
  • Strategic Security: Consider web application security investments and cloud security posture improvements

For Technical Teams

Recommended Actions:

  • Deploy Detection Signatures: Implement YARA rules and IOCs across web infrastructure
  • Hunt for Compromise Indicators: Search for PHP backdoors, unusual file modifications, and suspicious network connections
  • Network Segmentation: Isolate web servers from internal networks to prevent lateral movement
  • Cloud Security Monitoring: Implement comprehensive logging and alerting for cloud service API usage
  • Security Hardening: Apply secure coding practices, regular patching, and configuration management

For Detailed Technical Procedures:

  • Incident response procedures: See Section 8 (Incident Response Procedures)
  • Forensic analysis guidelines: See Section 4 (Technical Analysis)
  • Infrastructure investigation: See Section 3 (Infrastructure Overview)

Table of Contents


Quick Reference

Detections & IOCs:


Executive Summary

This campaign demonstrates a modular intrusion chain leveraging PHP backdoors, exploit kits, and cloud abuse. Attackers pivot from initial webshell deployment to exploitation, persistence, exfiltration, and infrastructure automation. The reuse of RSA keys, cookie names, and file paths provides strong attribution fingerprints.


Technical Details

Technical Analysis

Infrastructure Overview

Infrastructure Component Value Role in Attack Chain
Primary C2 Server 45.118.144[.]151:8081 Initial webshell deployment and backdoor hosting
Exploitation Server 152.32.191[.]156:8081 Exploit kits, payload delivery, and automation
Content Delivery juyu1[.]yifanyi.app Malicious content distribution and SEO poisoning
Command Infrastructure shellcp[.]info Remote content injection and proxy services

Phase 1: Initial Discovery (45.118.144[.]151)

File: pg-politica-de-privacidade.php

  • Trojanized Privacy Policy page.
  • PHP class A with __wakeup() method.
  • Hardcoded RSA public key → only attacker‑encrypted payloads execute.
  • Trigger: $_POST['mxx'].
  • Obfuscation: dynamically builds function names (openssl_public_decrypt, base64_decode).
  • Executes decrypted payload via eval().
  • Camouflage: Legitimate Portuguese Privacy Policy appended.
  • Implication: Exclusive access backdoor; RSA key is a campaign fingerprint.
  • Hunting Highlights:
    • PHP files with __wakeup() + unserialize() + eval()
    • POST requests with parameter mxx
    • Embedded RSA public key blocks in PHP code

File: upnimix.php

  • Full‑featured PHP webshell.
  • Capabilities: command execution, file upload/edit/delete/rename, directory listing.
  • Implication: Persistence and full remote control.
  • Hunting Highlights:
    • PHP files with goto + exec/system/shell_exec/passthru
    • POSTs with parameters like cmd, file_content, upload
    • PHP spawning OS processes (/bin/sh, cmd.exe)

File: video.php

  • Remote content injector.
  • Behavior: proxies requests to shellcp[.]info/api.php.
  • Cloaks behavior for Googlebot (?googlebot).
  • Implication: SEO poisoning, phishing, or malware delivery.
  • Hunting Highlights:
    • PHP files with file_get_contents("http://shellcp.info/...")
    • Outbound HTTP requests to shellcp[.]info
    • Cloaking logic tied to “oogle” in User‑Agent

Phase 2: Pivot & Exploitation (152.32.191[.]156)

Exploit Kits

  • Scripts: 测试.py, exploit.py, exploit2.py.
  • Helper: Crypto.php (forged clp-fm cookie).
  • Exploit chain: forge cookie → access /file-manager/ → create file → upload shell → set permissions → verify at /htdocs/app/files/public/shell.php.
  • Variants: batch exploitation, version‑specific (CloudPanel 0day Version : 2.0.0 >= 2.3.0).
  • Persistence variant: creates user zeroday / password Etharus@1337.

Webshells

  • One‑liner (?cmd= → system execution, fallback to phpinfo()).
  • shell.php uploaded with 0777 permissions.

Hunting Highlights

  • Web logs with cookie header clp-fm.
  • Access to /file-manager/backend/makefile or /phpmyadmin/js/.
  • New privileged accounts (zeroday).
  • File creation in /htdocs/app/files/public/.
  • Requests with ?cmd= in query strings.

Phase 3: Exfiltration & Cloud Abuse

Modules

  • Dropbox: Client.php, AccessCodeValidator.php → API abuse for stealthy uploads.
  • Rclone: Rclone.php, TarCreator.php → bulk data theft, retries, throttling.
  • AWS: Ami.php, Instance.php, Regions.php → S3 exfiltration, destructive actions possible.

Hunting Highlights

  • Outbound traffic to api.dropboxapi.com.
  • Rclone process execution (rclone, rclone.exe).
  • Unexpected S3 PutObject/DeleteObject events in CloudTrail.
  • Large outbound transfers to cloud storage from servers without backup roles.

Phase 4: Infrastructure Automation

Site Builder Framework (Site/ directory)

  • Installers: WordPressInstaller.php, PhpSite.php, NodejsSite.php, PythonSite.php.
  • Reverse Proxy: ReverseProxySite.php → traffic redirection.
  • Domain Automation: DomainName.php.
  • Scaling: VarnishCache/Creator.php.

Hunting Highlights

  • Automated WordPress installs from non‑admin sources.
  • Sudden creation of reverse proxy configs in Nginx/Apache.
  • Varnish cache deployments on non‑web infra.
  • Suspicious PHP files named WordPressInstaller.php, ReverseProxySite.php.

Attack Chain Analysis

Campaign Structure Summary

Attack Phase Primary Techniques Infrastructure Used Business Impact
Initial Access CloudPanel 0-day exploit kits, PHP backdoors 45.118.144[.]151:8081 CRITICAL - Server compromise
Persistence Webshells, backdoor accounts, RSA-encrypted payloads Multiple compromised servers HIGH - Long-term access
Exfiltration Dropbox API abuse, Rclone, AWS S3 exploitation Legitimate cloud services HIGH - Data theft
Infrastructure Scaling Automated site builder framework, reverse proxies Compromised web infrastructure MEDIUM - Attack expansion

Attribution Fingerprints

Fingerprint Type Value Confidence Level
RSA Public Key Reused across multiple IPs and backdoors CONFIRMED
Cookie Names clp-fm (consistent across exploit kits) CONFIRMED
File Paths /htdocs/app/files/public/shell.php CONFIRMED
Account Patterns zeroday/Etharus@1337 (consistent credentials) LIKELY

Incident Response Procedures

Priority 1: Initial Response

  1. ISOLATE all web servers with potential PHP backdoor infections
  2. BLOCK known malicious infrastructure at network perimeter
  3. SCAN all web servers for suspicious PHP files and backdoors
  4. AUDIT cloud service access logs for unauthorized API usage
  5. COLLECT forensic evidence including web server logs and memory dumps
  6. RESET all credentials for potentially compromised systems and cloud accounts

Priority 2: Investigation & Analysis

  1. FORENSIC ANALYSIS of web server logs for exploitation patterns
  2. LOG ANALYSIS for connections to known malicious infrastructure
  3. CLOUD AUDIT for unauthorized API access and data exfiltration
  4. MALWARE ANALYSIS of recovered PHP backdoors and exploit kits
  5. THREAT HUNTING for additional compromised systems and lateral movement

Priority 3: Remediation & Recovery

  1. REBUILD compromised web servers from known-good images
  2. UPDATE all web applications and frameworks to latest versions
  3. IMPLEMENT web application firewalls with PHP backdoor detection
  4. DEPLOY enhanced monitoring for cloud service API abuse
  5. ESTABLISH secure coding practices and code review processes

Operational Impact Assessment

Impact Scenarios

Impact Category Severity Level Recovery Time
Data Compromise HIGH extended period
System Compromise HIGH several weeks
Cloud Service Abuse MEDIUM several weeks
Operational Disruption HIGH several weeks

Operational Impact Timeline

  • Immediate Response: Web server isolation, service disruption, emergency response
  • Investigation Phase: System rebuilding, security hardening, enhanced monitoring
  • Recovery Phase: Process improvements, cloud security implementation
  • Long-term Phase: Security architecture review, compliance activities

Long-term Defensive Strategy

Technology Enhancements

  1. Web Application Firewall (WAF) with PHP backdoor detection capabilities
  2. Cloud Security Posture Management (CSPM) for continuous cloud monitoring
  3. Runtime Application Self-Protection (RASP) for real-time threat detection
  4. Security Information and Event Management (SIEM) with cloud integration
  5. API Security Gateway for cloud service access control

Process Improvements

  1. Secure Software Development Lifecycle (SSDLC) implementation
  2. Regular Security Assessments including penetration testing of web applications
  3. Cloud Access Security Broker (CASB) deployment for cloud service monitoring
  4. Incident Response Playbooks specific to web application compromises
  5. Change Management procedures with security approval requirements

Organizational Measures

  1. Security Awareness Training for development and operations teams
  2. Regular Security Assessments including code reviews and architecture reviews
  3. Threat Intelligence Subscription for emerging web application threats
  4. Executive Security Briefings on cloud security risks and mitigation strategies
  5. Investment in Security Tools and personnel training for advanced threat detection

Frequently Asked Questions

Technical Questions

Q: What makes the RSA encryption backdoor particularly dangerous?
A: It ensures exclusive attacker access - only payloads encrypted with the corresponding private key will execute, preventing other attackers or security tools from utilizing the backdoor.

Q: How does cloud service abuse work in this campaign?
A: Attackers abuse legitimate cloud APIs (Dropbox, AWS S3) for data exfiltration and infrastructure, making detection difficult as traffic appears to be normal cloud usage.

Q: What are the key hunting indicators for this campaign?
A: PHP files with __wakeup() methods, POST requests with mxx parameter, embedded RSA keys, and access to /file-manager/ endpoints with forged cookies.

Business Questions

Q: What are the regulatory implications of cloud service abuse?
A: Significant - unauthorized cloud access can trigger data breach notifications, compliance violations, and potential liability for customer data exposure.

Q: Should we rebuild or patch compromised web servers?
A: REBUILD is strongly recommended due to the sophistication of backdoors and potential for additional hidden compromise mechanisms.

Q: How can we prevent similar cloud abuse?
A: Implement cloud access monitoring, API security controls, regular access reviews, and principle of least privilege for cloud service accounts.


IOCs

Detections


License

© 2025 Joseph. All rights reserved.
Free to read, but reuse requires written permission.