Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

European cyber agency blames hacking group for massive data breaches and leaks

Microsoft releases details about cookie-controlled PHP web shell persisted via Cron on Linux servers

Facebook Insider Builds Content Moderation for the Age of AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft releases details about cookie-controlled PHP web shell persisted via Cron on Linux servers
Identity

Microsoft releases details about cookie-controlled PHP web shell persisted via Cron on Linux servers

By April 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 3, 2026Linux/Server Hardening

According to findings from the Microsoft Defender Security Research Team, threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to remotely execute code.

“Rather than exposing command execution through URL parameters or the request body, these web shells rely on cookie values ​​provided by threat actors to gate execution, pass instructions, and activate malicious functionality,” the tech giant said.

This approach provides additional stealth by allowing the malicious code to remain dormant during normal application execution and only activate web shell logic when certain cookie values ​​are present. Microsoft notes that this behavior also extends to web requests, scheduled tasks, and trusted background workers.

This malicious activity takes advantage of the fact that the cookie value is available through the $_COOKIE superglobal variable at runtime, allowing the attacker to consume the specified input without any additional parsing. Additionally, this technique is unlikely to raise any red flags, as the cookies are mixed in with normal web traffic, reducing visibility.

There are various implementations of cookie-controlled execution models.

A PHP loader that uses multiple layers of obfuscation and runtime checks before parsing structured cookie input to execute encoded secondary payloads. A PHP script that segments structured cookie data to rebuild operational components such as file processing and decoding functions, and conditionally writes and executes secondary payloads to disk. A PHP script that uses a single cookie value as a marker to trigger a threat actor-controlled action, such as executing provided input or uploading a file.

In at least one case, threat actors have been found to use valid credentials or exploit known security vulnerabilities to gain initial access to a victim-hosted Linux environment and set up a cron job that periodically calls a shell routine that runs an obfuscated PHP loader.

This “self-healing” architecture allows scheduled tasks to repeatedly recreate the PHP loader even if it is removed as part of a cleanup or repair effort, creating a reliable and persistent remote code execution channel. Once the PHP loader is deployed, it remains inactive during normal traffic and starts working when it receives an HTTP request with a specific cookie value.

“By shifting execution control to cookies, the web shell remains hidden from normal traffic and is activated only during intentional interactions,” Microsoft added. “By separating persistence through cron-based re-creation from execution control through cookie-gate activation, the attackers reduced operational noise and limited the metrics observable in daily application logs.”

The common aspects that unite all the aforementioned implementations are obfuscation to hide sensitive functionality while leaving a minimal interactive footprint, and the use of cookie-based gates to initiate malicious actions.

To combat this threat, Microsoft recommends enforcing multi-factor authentication for hosting control panels, SSH access, and administrative interfaces. Monitor for unusual login activity. Restrict shell interpreter execution. Audit cron jobs and scheduled tasks across your web servers. Check for suspicious files in your web directory. Limits the hosting control panel’s shell functionality.

“The consistent use of cookies as a control mechanism suggests a reuse of established web shell tradecraft,” Microsoft said. “By moving control logic to cookies, attackers can gain persistent access post-compromise and bypass many traditional inspection and logging controls.”

“Rather than relying on complex exploit chains, the attackers leveraged legitimate execution paths already present in the environment, including web server processes, control panel components, and cron infrastructure, to stage and store their malicious code.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFacebook Insider Builds Content Moderation for the Age of AI
Next Article European cyber agency blames hacking group for massive data breaches and leaks

Related Posts

UNC1069 Axios Maintainer social engineering led to npm supply chain attack

April 3, 2026

Why third-party risk is the biggest gap in clients’ security posture

April 3, 2026

New SparkCat variants of iOS, Android apps steal recovery phrase images from crypto wallets

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

European cyber agency blames hacking group for massive data breaches and leaks

Microsoft releases details about cookie-controlled PHP web shell persisted via Cron on Linux servers

Facebook Insider Builds Content Moderation for the Age of AI

UNC1069 Axios Maintainer social engineering led to npm supply chain attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.