🦠 Ransomware & Malware

Hackers Weaponize Cookies to Stealthily Run PHP Webshells on Linux Servers

Forget URL params or bloated payloads – hackers are now smuggling control into browser cookies to wake up dormant PHP webshells on Linux hosts. It's clever, it's sneaky, and it's probably already on your server.

PHP code snippet with cookie superglobal triggering a hidden webshell on a Linux terminal

⚡ Key Takeaways

  • Attackers use HTTP cookies to trigger dormant PHP webshells, evading traditional URL and body scans. 𝕏
  • Variants range from heavily obfuscated loaders to simple interactive shells, all cookie-gated. 𝕏
  • Persistence extends to cron jobs and background tasks, making removal tricky. 𝕏
Published by

theAIcatchup

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Microsoft Security Blog

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.