CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

PHP Web Shells Leveraging Cookie-Based Control Channels for Persistent RCE on Linux Servers

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are deploying PHP-based web shells on Linux servers that use HTTP cookies as a control channel to execute malicious commands and maintain persistent remote code execution (RCE). These shells remain dormant under normal traffic and activate only when specific, attacker-supplied cookie values are present, evading detection in logs and web traffic inspection. The technique integrates with cron jobs to reinstall the shell if removed, creating a self-healing persistence mechanism. Initial access is commonly achieved via valid credentials or exploitation of known vulnerabilities, and the approach leverages legitimate execution paths within web server processes and control panels.

Timeline

  1. 03.04.2026 18:32 1 articles · 4h ago

    Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

    Threat actors deploy PHP-based web shells on Linux servers that use HTTP cookies to gate command execution and maintain persistent RCE. Shells remain dormant under normal traffic and activate only when specific cookies are present, leveraging the $_COOKIE superglobal variable to parse attacker-controlled inputs without additional parsing. Persistence is maintained via cron jobs that reinstall the shell if removed, creating a self-healing RCE channel that evades detection in logs and web traffic inspection.

    Show sources

Information Snippets