RIP "Within this assessment, the red team (also referred to as ‘the team’) gained initial access through a web shell left from a third party’s previous security assessment."
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a
Comments
hackers exploiting hackers... last darkent diaries, the aussie guy talks about this as well, getting into places because there was already someone before and forgot to close the door
I once got in for similar reasons, and it was my own web shell that we found on the server. Let me explain why this wasn’t me being a sloppy attacker though!
No, there wasn’t a big risk of someone else discovering the webshell because of uri and authentication, but it lived for MONTHS.
Spun up a fresh IP to connect, and yep. We have a shell again. HOW!? It was 100% removed. I’ve even got documentation of the removal verification.