Webshells are a longstanding, popular tactic for attackers to modify, deface, or breach websites. This malware abuses functions in web languages to gain backdoor access and has persisted in popularity for over a decade due to readily available variants.
What does this look like to your security team? A threat actor exploits your website’s vulnerability and gains initial foothold onto a network via the web server. The attacker then uploads malicious files, downloads confidential files, or executes arbitrary commands.
Join Michael Barclay of Expel for strategic guidance on why attackers leverage webshells and how to effectively detect and stop them before they are installed.
Your contact information will be shared by both parties who may contact you to share future promotions.
Michael Barclay is a Senior Detection and Response Engineer at Expel, a managed detection and response provider based in Herndon, Virginia. Before joining Expel, Michael was responsible for threat intelligence and global detection as a Senior Security Analyst at Symantec’s Managed Security Services division.
Brendon Macaraeg leads product marketing for Signal Sciences which protects the web presence of the world’s leading brands. Prior, Brendon led product marketing for the incident response and professional services division of CrowdStrike. He also led product marketing efforts for both the Norton consumer security products and Symantec's enterprise mobility and endpoint management.