Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Nvidia CEO pushes back against reports that his company’s $100 billion OpenAI investment is stalling

HomeBoost’s app shows you where you can save money on your utility bills

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit serious PHP flaws to deploy Quasar Rat and Xmrig Miners
Identity

Hackers exploit serious PHP flaws to deploy Quasar Rat and Xmrig Miners

userBy userMarch 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 19, 2025Ravi LakshmananThreat Intelligence/Crypto Jacking

Defects in php for deploying quasar rats

Threat actors are taking advantage of the serious security flaws of PHP to provide remote access trojans (rats) like Cryptocurrency Miner and Quasar Rat.

The vulnerability assigned the CVE Identifier CVE-2024-4577 refers to a PHP argument injection vulnerability affecting Windows-based systems running in CGI mode that allows remote attackers to execute arbitrary code.

Cybersecurity firm Bitdefender said a surge in exploitation attempts against CVE-2024-4577 has been observed since the latter half of last year, with significant concentrations reported in Taiwan (54.65%), Hong Kong (27.06%), Brazil (16.39%), Japan (1.57%) and India (0.33%).

Cybersecurity

Approximately 15% of detected exploitation attempts include basic vulnerability checks using commands such as “fuami” and “echo”. Another 15% revolves around commands used for system reconnaissance, such as process enumeration, network discovery, user and domain information, and system metadata collection.

Martin Zugec, director of technical solutions at BitDefender, noted that at least about 5% of detected attacks reached a peak in the Xmrig Cryptocurrency Miner deployment.

“Another small campaign included the deployment of NiceHash Miners, a platform that allows users to sell the computing power of cryptocurrency,” Zugec added. “The minor process was disguised as a legitimate application, such as Javawindows.exe, to avoid detection.”

Defects in php for deploying quasar rats

Other attacks have been found to weaponize the drawback of not only using CMD.exe to run malicious Windows Installer (MSI) files hosted on remote servers, but also delivering remote access tools such as open source Quasar Rats.

Perhaps amid a strong twist of curiosity, the Romanian company also said it had observed attempts to change the firewall configuration of vulnerable servers with the aim of blocking access to known malicious IPS related to exploits.

This extraordinary behavior has increased the chance that rival cryptojacking groups will compete for control of susceptible resources and prevent them from targeting people under their second management. Also, terminating the rival miner process before deploying its own payload is consistent with historical observations of how crypto attacks are known.

Cybersecurity

The development comes shortly after Cisco Talos revealed details of a campaign from the start of the year to weaponize PHP flaws in attacks targeting Japanese organizations.

Users are advised to update their PHP installation to the latest version to protect them from potential threats.

“Because most campaigns use LOTL tools, organizations should consider limiting the use of tools such as PowerShell in their environment to privileged users, such as administrators,” Zugec said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBoston Dynamics’ Atlas introduces advanced reinforcement learning using motion capture technology
Next Article Why the winners of this year’s six Creative Team of the Year are on the sidelines
user
  • Website

Related Posts

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

January 31, 2026

Mandiant discovers ShinyHunters-style Vishing attack that steals MFA and compromises SaaS platforms

January 31, 2026

CERT Polska details coordinated cyberattacks on over 30 wind and solar farms

January 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Nvidia CEO pushes back against reports that his company’s $100 billion OpenAI investment is stalling

HomeBoost’s app shows you where you can save money on your utility bills

Iran-linked RedKitten cyber campaign targets human rights NGOs and activists

This week’s science news: ‘Cloud People’ grave discovered in Mexico, pancreatic cancer epidemic, AI swarms ready to take over social media

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.