
What malicious campaign is lurking under the surface? [Research Saturday]
CyberWire Daily
00:00
Using a JSP Web Shell
The most common technique that we observed was the use of a j s p web shell. They basically imbedded in the e r p web application servers. The next stage was usually to establish some sort of persistence or mechanism that would allow them too cind o keep coming back in and out. We see another common example of how an adversary like that, that as a state sponsor adversary, is developinga proprietary zero de sanferfundr abilities That enable them to gain that initial access into organizations where that softwor is being used.
Play episode from 04:44
Transcript


