CyberWire Daily cover image

What malicious campaign is lurking under the surface? [Research Saturday]

CyberWire Daily

00:00

Using a JSP Web Shell

The most common technique that we observed was the use of a j s p web shell. They basically imbedded in the e r p web application servers. The next stage was usually to establish some sort of persistence or mechanism that would allow them too cind o keep coming back in and out. We see another common example of how an adversary like that, that as a state sponsor adversary, is developinga proprietary zero de sanferfundr abilities That enable them to gain that initial access into organizations where that softwor is being used.

Play episode from 04:44
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app