Synopsis
NNM detected suspicious Command and Control (CnC) activity.
Description
NNM detected suspicious activity that indicates a remote client interacting and issuing commands on the server via a remote web shell. Once uploaded, an attacker can use other techniques to escalate privileges and issue commands remotely. The remote commands issued have the same privilege and functionality available to the web server and may include the ability to add or delete files, run shell commands, and execute additional exploitation methods.
Solution
Search for ASP scripts containing the 'eval()' function and conduct a forensic examination to determine how the vulnerable ASP payload was installed on the server. Also, check for any additional unauthorized changes.