Security

Research

Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

Here's what $20 gets you these days


More than 4,000 unique backdoors are using expired domains and/or abandoned infrastructure, and many of these expose government and academia-owned hosts – thus setting these hosts up for hijacking by criminals who likely have less altruistic intentions than the security researchers who uncovered the very same backdoors.

In its latest who-can-we-pwn expedition, the watchTowr Labs team set its sights on web shells. The end result is equal parts schadenfreude at witnessing attackers' security snafus and the discovery of real risks associated with abandoned domain names.

"The access here that we're demonstrating is effectively what we've affectionately termed mass-hacking-on-autopilot," watchTowr CEO Benjamin Harris told The Register

"Imagine you want to gain access to thousands of systems, but don't feel like investing the effort to identify and compromise systems yourself – or getting your hands dirty," he continued.

"Instead, you commandeer abandoned backdoors in regularly used backdoors to effectively 'steal the spoils' of someone else's work, giving you the same access to a compromised system as the person who put the effort into identifying the mechanism to compromise, and performing the compromise of said system in the first place."

Once an attacker has that access, they can access all the data on the compromised host and/or use it to launch future attacks.

"Zero effort, same result – for the price of a domain," Harris said.

You commandeer abandoned backdoors in regularly used backdoors to effectively steal the spoils of someone else's work

And, as was the case in an earlier watchTowr effort, the price tag on that abandoned criminal infrastructure was a mere $20 per domain.

This report, published Wednesday, follows the watchTowr crew's earlier research that also delved into abandoned and expired infrastructure. But in this case, the team examined how the "bad guys" throw away internet domains too.

Plus, they also highlight how attackers have historically backdoored the web shells they provide to other miscreants – thus giving the original author of the web shell access to everything that the current user touches.

These backdoored backdoors run the gamut from basic web shells to c99shell, r57shell, and China Chopper, just to name a few of the "all-bells-and-whistles" web shells that include functions "to allow hackers to hack hackers," according to Harris and co-author Aliz Hammond:

Adapting some internal code, we went on a mission – collect as many web shells as possible (regardless of language, target, or age), de-obfuscate any code that happened to be protected by the power of base64, and extract any unregistered domains likely used in some sort of callback function.

We then hooked that up to the AWS Route53 API, and just bought them en masse.

Honestly, it's $20, and we've done worse with more.

The researchers registered more than 40 domains (a list of several of these web shells and associated domains is listed in the report), spun up new infrastructure, and then logged incoming requests before responding with a 404 error message.

The team logged "thousands" of requests, Harris said, adding that these were "primarily across a handful of the domains that we identified and re-registered."

After slogging through logs of incoming requests to watchTowr's newly accrued domains, the researchers found "multiple" compromised government-owned hosts from Bangladesh, China, Nigeria, and other countries, as well as higher-education entities across Thailand, China, and South Korea. 

Among these high-value domains: one belonging to the Federal High Court of Nigeria, for example, had four different web shells pinging it, we're told. "So far we've found over 4,000 breached systems (three or four of which are breached.gov systems)," the duo wrote. "The number keeps going up – as you would expect."

As with watchTowr's earlier research, the team didn't want to let its 40-some web shell domains it registered lapse as their predecessors had.

"For the same reasons that both this research and the .MOBI research came to exist, we would be guilty of the exact same careless disposal of infrastructure if we were to let these domains expire as their previous owners did," Harris said.

To this end, the ShadowServer Foundation agreed to take ownership of the domains and sinkhole them.

Harris described the research as "morbid curiosity." The security shop's researchers would "watch the logs and find out what system we'd see compromised next," he told The Register.

It also held some nostalgia for the team: "As alluded to in the post, we're sure a lot of the cybersecurity industry is familiar with and likely grew up with a number of web shells that we discuss in our research," he added. "The reality, though, is that we consider this a 'peek behind the curtain' of activity that circles the internet every day, and can be incredibly interesting to watch play out in literal real time." ®

Send us news
13 Comments

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process