Rule Category

MALWARE-BACKDOOR -- Snort has detected suspicious communication traffic unrelated to commands, such as exfiltration of data from the infected machine, especially larger chunks of data.

Alert Message

MALWARE-BACKDOOR JSP webshell backdoor detected

Rule Explanation

This event is generated when the download or usage of a JSP Webshell has been detected Impact: Attempted User Privilege Gain Details: This rule detects a JSP webshell used to hiddenly manage an Apache Tomcat server. This webshell allows the attacker to have full control of the server by uploading, downloading, creating, editing and deleting files of the server. It can also open a proxy in the server and allow remote access to the server via a remote terminal. Ease of Attack: Medium

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None