← Back to BrewedIntel
malwarehighRemote Code ExecutionWeb Shell

Apr 03, 2026 • [email protected] (The Hacker News)

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Microsoft Defender Security Research Team has identified a sophisticated web shell technique where threat actors use HTTP cookies as a covert control channel...

Source
The Hacker News
Category
malware
Severity
high

Executive Summary

Microsoft Defender Security Research Team has identified a sophisticated web shell technique where threat actors use HTTP cookies as a covert control channel for PHP-based web shells on Linux servers. Unlike traditional web shells that expose commands via URL parameters, these malicious payloads remain hidden by requiring specific cookie values to trigger execution. The threat actors achieve persistence by scheduling the web shells through cron jobs on compromised systems. This approach enables remote code execution while evading standard detection methods that monitor URL-based command patterns. Organizations running PHP applications on Linux servers should implement robust input validation, monitor for suspicious cookie usage patterns, audit cron job configurations, and deploy web application firewalls to detect anomalous traffic indicative of this stealthy attack vector.

Summary

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. "Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution,

Published Analysis

Microsoft Defender Security Research Team has identified a sophisticated web shell technique where threat actors use HTTP cookies as a covert control channel for PHP-based web shells on Linux servers. Unlike traditional web shells that expose commands via URL parameters, these malicious payloads remain hidden by requiring specific cookie values to trigger execution. The threat actors achieve persistence by scheduling the web shells through cron jobs on compromised systems. This approach enables remote code execution while evading standard detection methods that monitor URL-based command patterns. Organizations running PHP applications on Linux servers should implement robust input validation, monitor for suspicious cookie usage patterns, audit cron job configurations, and deploy web application firewalls to detect anomalous traffic indicative of this stealthy attack vector. Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. "Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution, Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. "Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution,