Campaign Identifier: Webshells-To-Cloud-Modular-Intrusion
Last Updated: October 20, 2025
BLUF (Bottom Line Up Front)
Executive Summary
Business Impact Summary
The “From Webshells to the Cloud” campaign represents a sophisticated, multi-phase intrusion chain that compromises web servers and pivots to cloud infrastructure abuse. This modular attack demonstrates advanced persistence capabilities and strong attribution fingerprints, indicating an organized threat operation with systematic exploitation methodologies.
Key Risk Factors
| Risk Factor | Score | Business Impact |
|---|---|---|
| Web Server Compromise | 9/10 | Complete server control with data exfiltration and lateral movement capabilities |
| Cloud Infrastructure Abuse | 8/10 | Legitimate cloud services abused for C2, exfiltration, and attack infrastructure |
| Persistence Mechanisms | 8/10 | Multiple backdoors with RSA encryption ensuring exclusive attacker access |
| Attribution Fingerprints | 7/10 | Strong attribution evidence but may indicate shared tools across threat groups |
Recommended Actions
Priority 1: Immediate Response (First 60 Minutes)
- ISOLATE all web servers with potential PHP backdoor infections from production networks
- BLOCK known malicious infrastructure at network perimeter (45.118.144.151:8081, 152.32.191.156:8081)
- SCAN all web servers for PHP backdoors and suspicious files using provided IOCs
- AUDIT cloud service access logs for unauthorized API usage and data exfiltration
- COLLECT forensic evidence including web server logs, memory dumps, and network captures
- RESET all credentials for potentially compromised systems and cloud accounts
Priority 2: Investigation & Analysis
- FORENSIC ANALYSIS of web server logs for exploitation patterns and timeline reconstruction
- LOG ANALYSIS for connections to known malicious infrastructure and data exfiltration indicators
- CLOUD AUDIT for unauthorized API access, unusual data transfers, and privilege escalation
- MALWARE ANALYSIS of recovered PHP backdoors and exploit kits
- THREAT HUNTING for additional compromised systems and lateral movement within infrastructure
Priority 3: Remediation & Recovery
- REBUILD compromised web servers from known-good images or deploy clean instances
- UPDATE all web applications and frameworks to latest secure versions
- IMPLEMENT web application firewalls with PHP backdoor detection capabilities
- DEPLOY enhanced monitoring for cloud service API abuse and unusual data transfers
- ESTABLISH secure coding practices and code review processes for web development
Organizational Guidance
For Executive Leadership
- Resource Allocation: Assess incident response team deployment, system rebuilding costs, and cloud security investments
- Business Continuity: Evaluate web service disruption impact and customer communication strategies
- Compliance Obligations: Review data breach notification requirements for web application compromises
- Stakeholder Communication: Plan internal and external notification strategies for web service incidents
- Strategic Security: Consider web application security investments and cloud security posture improvements
For Technical Teams
Recommended Actions:
- Deploy Detection Signatures: Implement YARA rules and IOCs across web infrastructure
- Hunt for Compromise Indicators: Search for PHP backdoors, unusual file modifications, and suspicious network connections
- Network Segmentation: Isolate web servers from internal networks to prevent lateral movement
- Cloud Security Monitoring: Implement comprehensive logging and alerting for cloud service API usage
- Security Hardening: Apply secure coding practices, regular patching, and configuration management
For Detailed Technical Procedures:
- Incident response procedures: See Section 8 (Incident Response Procedures)
- Forensic analysis guidelines: See Section 4 (Technical Analysis)
- Infrastructure investigation: See Section 3 (Infrastructure Overview)
Table of Contents
- Quick Reference
- BLUF (Bottom Line Up Front)
- Technical Analysis
- Attack Chain Analysis
- Incident Response Procedures
- Operational Impact Assessment
- Long-term Defensive Strategy
- Frequently Asked Questions
- IOCs
- Detections
Quick Reference
Detections & IOCs:
Executive Summary
This campaign demonstrates a modular intrusion chain leveraging PHP backdoors, exploit kits, and cloud abuse. Attackers pivot from initial webshell deployment to exploitation, persistence, exfiltration, and infrastructure automation. The reuse of RSA keys, cookie names, and file paths provides strong attribution fingerprints.
Technical Details
Technical Analysis
Infrastructure Overview
| Infrastructure Component | Value | Role in Attack Chain |
|---|---|---|
| Primary C2 Server | 45.118.144[.]151:8081 | Initial webshell deployment and backdoor hosting |
| Exploitation Server | 152.32.191[.]156:8081 | Exploit kits, payload delivery, and automation |
| Content Delivery | juyu1[.]yifanyi.app | Malicious content distribution and SEO poisoning |
| Command Infrastructure | shellcp[.]info | Remote content injection and proxy services |
Phase 1: Initial Discovery (45.118.144[.]151)
File: pg-politica-de-privacidade.php
- Trojanized Privacy Policy page.
- PHP class
Awith__wakeup()method. - Hardcoded RSA public key → only attacker‑encrypted payloads execute.
- Trigger:
$_POST['mxx']. - Obfuscation: dynamically builds function names (
openssl_public_decrypt,base64_decode). - Executes decrypted payload via
eval(). - Camouflage: Legitimate Portuguese Privacy Policy appended.
- Implication: Exclusive access backdoor; RSA key is a campaign fingerprint.
- Hunting Highlights:
- PHP files with
__wakeup()+unserialize()+eval() - POST requests with parameter
mxx - Embedded RSA public key blocks in PHP code
- PHP files with
File: upnimix.php
- Full‑featured PHP webshell.
- Capabilities: command execution, file upload/edit/delete/rename, directory listing.
- Implication: Persistence and full remote control.
- Hunting Highlights:
- PHP files with
goto+exec/system/shell_exec/passthru - POSTs with parameters like
cmd,file_content,upload - PHP spawning OS processes (
/bin/sh,cmd.exe)
- PHP files with
File: video.php
- Remote content injector.
- Behavior: proxies requests to
shellcp[.]info/api.php. - Cloaks behavior for Googlebot (
?googlebot). - Implication: SEO poisoning, phishing, or malware delivery.
- Hunting Highlights:
- PHP files with
file_get_contents("http://shellcp.info/...") - Outbound HTTP requests to
shellcp[.]info - Cloaking logic tied to “oogle” in User‑Agent
- PHP files with
Phase 2: Pivot & Exploitation (152.32.191[.]156)
Exploit Kits
- Scripts: 测试.py, exploit.py, exploit2.py.
- Helper: Crypto.php (forged
clp-fmcookie). - Exploit chain: forge cookie → access
/file-manager/→ create file → upload shell → set permissions → verify at/htdocs/app/files/public/shell.php. - Variants: batch exploitation, version‑specific (CloudPanel 0day Version : 2.0.0 >= 2.3.0).
- Persistence variant: creates user
zeroday/ passwordEtharus@1337.
Webshells
- One‑liner (
?cmd=→ system execution, fallback to phpinfo()). shell.phpuploaded with 0777 permissions.
Hunting Highlights
- Web logs with cookie header
clp-fm. - Access to
/file-manager/backend/makefileor/phpmyadmin/js/. - New privileged accounts (
zeroday). - File creation in
/htdocs/app/files/public/. - Requests with
?cmd=in query strings.
Phase 3: Exfiltration & Cloud Abuse
Modules
- Dropbox: Client.php, AccessCodeValidator.php → API abuse for stealthy uploads.
- Rclone: Rclone.php, TarCreator.php → bulk data theft, retries, throttling.
- AWS: Ami.php, Instance.php, Regions.php → S3 exfiltration, destructive actions possible.
Hunting Highlights
- Outbound traffic to
api.dropboxapi.com. - Rclone process execution (
rclone,rclone.exe). - Unexpected S3 PutObject/DeleteObject events in CloudTrail.
- Large outbound transfers to cloud storage from servers without backup roles.
Phase 4: Infrastructure Automation
Site Builder Framework (Site/ directory)
- Installers: WordPressInstaller.php, PhpSite.php, NodejsSite.php, PythonSite.php.
- Reverse Proxy: ReverseProxySite.php → traffic redirection.
- Domain Automation: DomainName.php.
- Scaling: VarnishCache/Creator.php.
Hunting Highlights
- Automated WordPress installs from non‑admin sources.
- Sudden creation of reverse proxy configs in Nginx/Apache.
- Varnish cache deployments on non‑web infra.
- Suspicious PHP files named WordPressInstaller.php, ReverseProxySite.php.
Attack Chain Analysis
Campaign Structure Summary
| Attack Phase | Primary Techniques | Infrastructure Used | Business Impact |
|---|---|---|---|
| Initial Access | CloudPanel 0-day exploit kits, PHP backdoors | 45.118.144[.]151:8081 | CRITICAL - Server compromise |
| Persistence | Webshells, backdoor accounts, RSA-encrypted payloads | Multiple compromised servers | HIGH - Long-term access |
| Exfiltration | Dropbox API abuse, Rclone, AWS S3 exploitation | Legitimate cloud services | HIGH - Data theft |
| Infrastructure Scaling | Automated site builder framework, reverse proxies | Compromised web infrastructure | MEDIUM - Attack expansion |
Attribution Fingerprints
| Fingerprint Type | Value | Confidence Level |
|---|---|---|
| RSA Public Key | Reused across multiple IPs and backdoors | CONFIRMED |
| Cookie Names | clp-fm (consistent across exploit kits) | CONFIRMED |
| File Paths | /htdocs/app/files/public/shell.php | CONFIRMED |
| Account Patterns | zeroday/Etharus@1337 (consistent credentials) | LIKELY |
Incident Response Procedures
Priority 1: Initial Response
- ISOLATE all web servers with potential PHP backdoor infections
- BLOCK known malicious infrastructure at network perimeter
- SCAN all web servers for suspicious PHP files and backdoors
- AUDIT cloud service access logs for unauthorized API usage
- COLLECT forensic evidence including web server logs and memory dumps
- RESET all credentials for potentially compromised systems and cloud accounts
Priority 2: Investigation & Analysis
- FORENSIC ANALYSIS of web server logs for exploitation patterns
- LOG ANALYSIS for connections to known malicious infrastructure
- CLOUD AUDIT for unauthorized API access and data exfiltration
- MALWARE ANALYSIS of recovered PHP backdoors and exploit kits
- THREAT HUNTING for additional compromised systems and lateral movement
Priority 3: Remediation & Recovery
- REBUILD compromised web servers from known-good images
- UPDATE all web applications and frameworks to latest versions
- IMPLEMENT web application firewalls with PHP backdoor detection
- DEPLOY enhanced monitoring for cloud service API abuse
- ESTABLISH secure coding practices and code review processes
Operational Impact Assessment
Impact Scenarios
| Impact Category | Severity Level | Recovery Time |
|---|---|---|
| Data Compromise | HIGH | extended period |
| System Compromise | HIGH | several weeks |
| Cloud Service Abuse | MEDIUM | several weeks |
| Operational Disruption | HIGH | several weeks |
Operational Impact Timeline
- Immediate Response: Web server isolation, service disruption, emergency response
- Investigation Phase: System rebuilding, security hardening, enhanced monitoring
- Recovery Phase: Process improvements, cloud security implementation
- Long-term Phase: Security architecture review, compliance activities
Long-term Defensive Strategy
Technology Enhancements
- Web Application Firewall (WAF) with PHP backdoor detection capabilities
- Cloud Security Posture Management (CSPM) for continuous cloud monitoring
- Runtime Application Self-Protection (RASP) for real-time threat detection
- Security Information and Event Management (SIEM) with cloud integration
- API Security Gateway for cloud service access control
Process Improvements
- Secure Software Development Lifecycle (SSDLC) implementation
- Regular Security Assessments including penetration testing of web applications
- Cloud Access Security Broker (CASB) deployment for cloud service monitoring
- Incident Response Playbooks specific to web application compromises
- Change Management procedures with security approval requirements
Organizational Measures
- Security Awareness Training for development and operations teams
- Regular Security Assessments including code reviews and architecture reviews
- Threat Intelligence Subscription for emerging web application threats
- Executive Security Briefings on cloud security risks and mitigation strategies
- Investment in Security Tools and personnel training for advanced threat detection
Frequently Asked Questions
Technical Questions
Q: What makes the RSA encryption backdoor particularly dangerous?
A: It ensures exclusive attacker access - only payloads encrypted with the corresponding private key will execute, preventing other attackers or security tools from utilizing the backdoor.
Q: How does cloud service abuse work in this campaign?
A: Attackers abuse legitimate cloud APIs (Dropbox, AWS S3) for data exfiltration and infrastructure, making detection difficult as traffic appears to be normal cloud usage.
Q: What are the key hunting indicators for this campaign?
A: PHP files with __wakeup() methods, POST requests with mxx parameter, embedded RSA keys, and access to /file-manager/ endpoints with forged cookies.
Business Questions
Q: What are the regulatory implications of cloud service abuse?
A: Significant - unauthorized cloud access can trigger data breach notifications, compliance violations, and potential liability for customer data exposure.
Q: Should we rebuild or patch compromised web servers?
A: REBUILD is strongly recommended due to the sophistication of backdoors and potential for additional hidden compromise mechanisms.
Q: How can we prevent similar cloud abuse?
A: Implement cloud access monitoring, API security controls, regular access reviews, and principle of least privilege for cloud service accounts.
IOCs
Detections
License
© 2025 Joseph. All rights reserved.
Free to read, but reuse requires written permission.