25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

HC3: Stealthy Godzilla Web Shell Used by Chinese APT Groups in Attack Chain

The Health Sector Cybersecurity Coordination Center (HC3) has issued an Analyst Note to raise awareness of a stealthy backdoor – the Godzilla web shell – that is being used by Chinese state-sponsored threat groups to gain persistent remote access to victims’ networks.

Web shells are tools used by threat actors to remotely interact with compromised web servers via a web browser. A web shell can be written in any language supported by the web server and consists of a web script that is dropped on a compromised system that allows the threat actor to interact with the underlying system. Provided the web shell is not detected; the threat actor gains persistent backdoor access to that system. Web shells can be used to run commands on the compromised system, execute code, move laterally, and deliver malicious payloads. The problem for threat actors is that their web shells are increasingly being detected by security solutions.

In response to these detections, a threat actor with the handle BeichenDream claims to have created a stealthy web shell called Godzilla that encrypts its network traffic using Advanced Encryption Standard encryption, making it much harder to detect. Since the web shell is maintained in a public repository, it can be accessed and used by any threat actor with relative ease. Researchers believe with a relatively high level of confidence that the Godzilla web shell is being used by Chinese state-sponsored hackers.

The Godzilla web shell can collect system information such as network configurations, operating systems, and installed software and is used for file management and manipulation, including file uploads, downloads, running commands and executing files, and deleting and modifying files. In addition to using encryption, the web shell executes in the memory, making detection challenging.

Advanced persistent threat actors have been observed using the Godzilla web shell in 2021 in attacks on multiple sectors that exploited an authentication bypass vulnerability in Zoho’s ManageEngine Password Manager. Last year, the Chinese hacking group APT Dalbit (M00nlight) was observed using the Godzilla web shell and other tools in attacks on multiple sectors. Defending against web shells, especially stealthy web shells such as Godzilla, can be a challenge. HC3 has recommended several resources in its Analyst Note on the detection and prevention of web shell malware attacks.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist