

Supershell is a command-and-control (C2) platform designed to remotely control systems through web services. Its main feature is a reverse SSH tunnel that establishes an interactive shell session. Recently, ASEC researchers uncovered that hackers have been using Supershell malware to launch attacks on poorly managed Linux SSH servers.
The Supershell malware stands out for its versatility. It supports Windows, Linux, and Android, making it a cross-platform threat. Developed by Chinese-speaking threat actors using the Go programming language, Supershell’s primary function is to act as a reverse shell, giving attackers complete remote control over infected systems.
The attack likely progresses in multiple stages. Initially, hackers compromise unsecured Linux SSH servers using dictionary attacks from various IP addresses. After gaining unauthorized access, they install a backdoor or deploy a shell script that functions as a downloader for Supershell.
Once installed, Supershell’s reverse shell enables remote access to compromised systems, allowing attackers to execute commands and maintain control.
Supershell spreads through both web servers and FTP servers, which increases its reach and makes it harder to detect. This sophisticated distribution method highlights how modern cyber threats leverage multiple platforms and exploit vulnerabilities in SSH server configurations.
Although Supershell’s initial installation focuses on establishing a backdoor, the ultimate goal is often to mine cryptocurrency. This malware is frequently accompanied by other malicious software, such as the XMRig cryptominer or DDoS bots like ShellBot and Tsunami.
ASEC researchers have outlined several ways to identify Supershell malware. Detection relies on examining its internal strings, behavior, and execution process. Since it targets vulnerable Linux systems, ensuring that your SSH servers are properly secured is critical.
To protect your systems from this and similar malware, follow these recommendations:
If you suspect your server may be compromised, here are some indicators of compromise (IoCs) associated with Supershell:
MD5 Hashes:
URLs:
http[:]//45[.]15[.]143[.]197/sensi[.]sh
http[:]//45[.]15[.]143[.]197/ssh1
http[:]//45[.]15[.]143[.]197/x64[.]bin
http[:]//45[.]15[.]143[.]197[:]10086/supershell/compile/download/ssh
http[:]//45[.]15[.]143[.]197[:]44581/ssh1
IP Addresses:
The discovery of Supershell malware reveals the ongoing evolution of cyber threats targeting Linux SSH servers. By taking preventive measures, such as using strong passwords and regularly updating security software, administrators can minimize the risk of compromise.
Click below and ‘share’ this article!
select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with a level of expertise needed for growing your business!
Copyright 2024 techprovidence