Security

PHP Webshells on Linux: Cookie-Controlled Evasion

3 min read

Summary

Microsoft warns that threat actors are using HTTP cookies to control PHP webshells on Linux hosting environments, helping malicious code stay dormant unless specific cookie values are present. The technique reduces visibility in routine logs, supports persistence through cron jobs, and highlights the need for stronger monitoring, web protection, and endpoint detection on hosted Linux workloads.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has published new research on a stealthy PHP webshell technique affecting Linux hosting environments. Instead of using obvious URL parameters or request bodies, attackers are using HTTP cookies as the trigger and control channel for malicious execution, making these webshells harder to spot in normal web traffic and application logs.

For security teams and administrators managing Linux-hosted web apps, this matters because the technique enables low-noise persistence, delayed activation, and more evasive post-compromise access.

What’s new

Microsoft observed multiple PHP webshell variants that all rely on cookie-gated execution:

  • Cookie-controlled activation: The webshell stays inactive unless the attacker sends specific cookie values.
  • Layered obfuscation: Some variants dynamically rebuild PHP functions and execution logic at runtime to avoid static detection.
  • Payload staging: Several samples reconstruct and write secondary payloads to disk only when the required cookie conditions are met.
  • Interactive webshell behavior: Simpler versions use a single cookie as a key to enable command execution or file upload.
  • Cron-based persistence: In one investigated case, attackers used legitimate hosting control panel workflows to register scheduled tasks that recreated the malicious PHP loader if it was removed.

Why this is harder to detect

Cookies often receive less scrutiny than request paths, query strings, or POST bodies. In PHP, cookie values are directly accessible through $_COOKIE, which makes them a convenient input channel for attackers. Combined with obfuscation and staged payload deployment, this allows malicious files to appear inert during normal traffic and activate only during deliberate attacker interactions.

Impact on administrators and defenders

For IT and security administrators, the key risk is persistent remote code execution within a compromised hosting account, even without root-level access. In shared hosting or restricted shell environments, attackers may still have enough permissions to:

  • Modify web content
  • Deploy PHP loaders
  • Recreate deleted malware through cron jobs
  • Maintain long-term access with minimal logging footprint

This can complicate remediation, especially when a “self-healing” scheduled task restores the webshell after cleanup.

Administrators should review Microsoft’s guidance and prioritize these actions:

  • Audit PHP applications and web roots for suspicious obfuscated scripts
  • Review scheduled tasks and cron jobs for unauthorized persistence mechanisms
  • Monitor cookie patterns associated with unusual server-side execution
  • Enable and investigate Microsoft Defender XDR detections and threat analytics
  • Hunt for web-accessible PHP files that write or include secondary payloads
  • Tighten file integrity monitoring and permissions in Linux hosting environments

Organizations running internet-facing PHP workloads should also ensure incident response playbooks include cron persistence checks, cookie-based webshell hunting, and follow-up validation after cleanup.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

PHP webshellLinux securityMicrosoft Defender XDRwebshell detectioncron persistence

Related Posts

Security

@antv npm Attack Hits CI/CD Secrets and Tokens

Microsoft has disclosed an active supply chain attack involving compromised @antv npm packages that used malicious preinstall scripts to steal credentials from GitHub Actions and other CI/CD environments. The campaign matters because it spread through popular downstream dependencies, putting developer pipelines, cloud secrets, and software supply chains at risk.

Security

Microsoft Gaming Security: Key Risks and Defenses

Microsoft’s latest Deputy CISO post explains why securing gaming requires a different approach than traditional enterprise IT. The company outlines the distinct risks across gaming platforms, studios, and shared central teams, and highlights how Entra ID, Purview, Defender for Cloud, and Sentinel help balance security with player experience and developer agility.

Security

Microsoft RAMPART and Clarity Open-Sourced

Microsoft has open-sourced RAMPART and Clarity, two tools aimed at improving safety in agentic AI development. RAMPART brings repeatable adversarial and regression testing into CI pipelines, while Clarity helps teams challenge design assumptions early before code is written.

Security

Fox Tempest Malware Signing Service Disrupted

Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.

Security

Storm-2949 Cloud Breach: Entra ID to Azure Attack

Microsoft detailed how Storm-2949 turned a socially engineered Microsoft Entra ID compromise into broad data theft across Microsoft 365 and Azure. The case highlights how identity attacks can escalate quickly through legitimate cloud management features, making stronger MFA controls, monitoring, and cross-platform detections critical for defenders.

Security

Microsoft Security for SMBs in an AI-Powered World

Microsoft is urging small and medium businesses to treat cybersecurity as a core business risk as AI makes phishing, malware, and identity attacks faster and more effective. The company highlights Microsoft 365 Business Premium and integrated security controls as a practical way for growing businesses to protect users, devices, email, and cloud apps without adding major complexity.