Hello,
Our fortinet product detected the following: backdoor: China.Chopper.Webshell.Client.Connection
I'd like to know how fortinet interprets this alert. Does this mean Webshell traffic was/is detected and confirmed to be happening on the system, or is this just an alert that lets us know when "attempted" Webshell exploit activity is detected?
Thanks in Advance!
Signature default is blocking for China Chopper.
So if you didn't manually overwrite the action, it got blocked:
The action should also be visible in your IPS Log on your Fortigate. Example from FortiAnalyzer:
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1743 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.