Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Did Pakistan shoot down five Indian fighters? What we know | India and Pakistan tension news

Fortinet Patches CVE-2025-32756 Zero-Day RCE Fault exploited in Fortivoice System

IVANTI Patch EPMM Vulnerability was exploited to remote code execution in limited attacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Hackers exploit serious PHP flaws to deploy Quasar Rat and Xmrig Miners
Identity

Hackers exploit serious PHP flaws to deploy Quasar Rat and Xmrig Miners

userBy userMarch 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 19, 2025Ravi LakshmananThreat Intelligence/Crypto Jacking

Defects in php for deploying quasar rats

Threat actors are taking advantage of the serious security flaws of PHP to provide remote access trojans (rats) like Cryptocurrency Miner and Quasar Rat.

The vulnerability assigned the CVE Identifier CVE-2024-4577 refers to a PHP argument injection vulnerability affecting Windows-based systems running in CGI mode that allows remote attackers to execute arbitrary code.

Cybersecurity firm Bitdefender said a surge in exploitation attempts against CVE-2024-4577 has been observed since the latter half of last year, with significant concentrations reported in Taiwan (54.65%), Hong Kong (27.06%), Brazil (16.39%), Japan (1.57%) and India (0.33%).

Cybersecurity

Approximately 15% of detected exploitation attempts include basic vulnerability checks using commands such as “fuami” and “echo”. Another 15% revolves around commands used for system reconnaissance, such as process enumeration, network discovery, user and domain information, and system metadata collection.

Martin Zugec, director of technical solutions at BitDefender, noted that at least about 5% of detected attacks reached a peak in the Xmrig Cryptocurrency Miner deployment.

“Another small campaign included the deployment of NiceHash Miners, a platform that allows users to sell the computing power of cryptocurrency,” Zugec added. “The minor process was disguised as a legitimate application, such as Javawindows.exe, to avoid detection.”

Defects in php for deploying quasar rats

Other attacks have been found to weaponize the drawback of not only using CMD.exe to run malicious Windows Installer (MSI) files hosted on remote servers, but also delivering remote access tools such as open source Quasar Rats.

Perhaps amid a strong twist of curiosity, the Romanian company also said it had observed attempts to change the firewall configuration of vulnerable servers with the aim of blocking access to known malicious IPS related to exploits.

This extraordinary behavior has increased the chance that rival cryptojacking groups will compete for control of susceptible resources and prevent them from targeting people under their second management. Also, terminating the rival miner process before deploying its own payload is consistent with historical observations of how crypto attacks are known.

Cybersecurity

The development comes shortly after Cisco Talos revealed details of a campaign from the start of the year to weaponize PHP flaws in attacks targeting Japanese organizations.

Users are advised to update their PHP installation to the latest version to protect them from potential threats.

“Because most campaigns use LOTL tools, organizations should consider limiting the use of tools such as PowerShell in their environment to privileged users, such as administrators,” Zugec said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBoston Dynamics’ Atlas introduces advanced reinforcement learning using motion capture technology
Next Article Why the winners of this year’s six Creative Team of the Year are on the sidelines
user
  • Website

Related Posts

Fortinet Patches CVE-2025-32756 Zero-Day RCE Fault exploited in Fortivoice System

May 14, 2025

IVANTI Patch EPMM Vulnerability was exploited to remote code execution in limited attacks

May 14, 2025

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Did Pakistan shoot down five Indian fighters? What we know | India and Pakistan tension news

Fortinet Patches CVE-2025-32756 Zero-Day RCE Fault exploited in Fortivoice System

IVANTI Patch EPMM Vulnerability was exploited to remote code execution in limited attacks

The Trump administration will cut another $450 million with Harvard grants. Donald Trump News

Trending Posts

Did Pakistan shoot down five Indian fighters? What we know | India and Pakistan tension news

May 14, 2025

The Trump administration will cut another $450 million with Harvard grants. Donald Trump News

May 14, 2025

Uruguay’s Jose Musica, famous president of Sparse Living, died at 89 | Obituary News

May 13, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Today’s Top Tech Startup Funding News on May 13, 2025

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Can Your Digital Twin Make You Money? Discover the LEHT Opportunity

Plutus will be released more at bases: a new era of tokenized loyalty rewards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.