Security

PHP Webshells on Linux: Cookie-Controlled Evasion

3 min read

Summary

Microsoft warns that threat actors are using HTTP cookies to control PHP webshells on Linux hosting environments, helping malicious code stay dormant unless specific cookie values are present. The technique reduces visibility in routine logs, supports persistence through cron jobs, and highlights the need for stronger monitoring, web protection, and endpoint detection on hosted Linux workloads.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has published new research on a stealthy PHP webshell technique affecting Linux hosting environments. Instead of using obvious URL parameters or request bodies, attackers are using HTTP cookies as the trigger and control channel for malicious execution, making these webshells harder to spot in normal web traffic and application logs.

For security teams and administrators managing Linux-hosted web apps, this matters because the technique enables low-noise persistence, delayed activation, and more evasive post-compromise access.

What’s new

Microsoft observed multiple PHP webshell variants that all rely on cookie-gated execution:

  • Cookie-controlled activation: The webshell stays inactive unless the attacker sends specific cookie values.
  • Layered obfuscation: Some variants dynamically rebuild PHP functions and execution logic at runtime to avoid static detection.
  • Payload staging: Several samples reconstruct and write secondary payloads to disk only when the required cookie conditions are met.
  • Interactive webshell behavior: Simpler versions use a single cookie as a key to enable command execution or file upload.
  • Cron-based persistence: In one investigated case, attackers used legitimate hosting control panel workflows to register scheduled tasks that recreated the malicious PHP loader if it was removed.

Why this is harder to detect

Cookies often receive less scrutiny than request paths, query strings, or POST bodies. In PHP, cookie values are directly accessible through $_COOKIE, which makes them a convenient input channel for attackers. Combined with obfuscation and staged payload deployment, this allows malicious files to appear inert during normal traffic and activate only during deliberate attacker interactions.

Impact on administrators and defenders

For IT and security administrators, the key risk is persistent remote code execution within a compromised hosting account, even without root-level access. In shared hosting or restricted shell environments, attackers may still have enough permissions to:

  • Modify web content
  • Deploy PHP loaders
  • Recreate deleted malware through cron jobs
  • Maintain long-term access with minimal logging footprint

This can complicate remediation, especially when a “self-healing” scheduled task restores the webshell after cleanup.

Administrators should review Microsoft’s guidance and prioritize these actions:

  • Audit PHP applications and web roots for suspicious obfuscated scripts
  • Review scheduled tasks and cron jobs for unauthorized persistence mechanisms
  • Monitor cookie patterns associated with unusual server-side execution
  • Enable and investigate Microsoft Defender XDR detections and threat analytics
  • Hunt for web-accessible PHP files that write or include secondary payloads
  • Tighten file integrity monitoring and permissions in Linux hosting environments

Organizations running internet-facing PHP workloads should also ensure incident response playbooks include cron persistence checks, cookie-based webshell hunting, and follow-up validation after cleanup.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

PHP webshellLinux securityMicrosoft Defender XDRwebshell detectioncron persistence

Related Posts

Security

AI Cyberattacks Accelerate Threats Across Attack Chain

Microsoft warns that threat actors are now embedding AI across the full cyberattack lifecycle, from reconnaissance and phishing to malware development and post-compromise operations. For defenders, this means faster, more precise attacks, higher phishing success rates, and a growing need to strengthen identity, MFA protections, and visibility into AI-driven attack surfaces.

Security

Axios npm Supply Chain Compromise: Mitigation Guide

Microsoft warned that malicious Axios npm versions 1.14.1 and 0.30.4 were used in a supply chain attack attributed to Sapphire Sleet. Organizations using the affected packages should immediately rotate secrets, downgrade to safe versions, and review developer endpoints and CI/CD systems for compromise.

Security

Critical Infrastructure Security Readiness in 2026

Microsoft says the threat model for critical infrastructure has shifted from opportunistic attacks to persistent, identity-driven access designed for future disruption. For IT and security leaders, the message is clear: reduce exposure, harden identity, and validate operational readiness now as regulations and nation-state activity intensify.

Security

AI Security Fundamentals: Practical CISO Guidance

Microsoft is advising CISOs to secure AI systems using the same core controls they already apply to software, identities, and data access. The guidance highlights least privilege, prompt injection defenses, and using AI itself to uncover permissioning issues before attackers or users do.

Security

WhatsApp Malware Campaign Uses VBS and MSI Backdoors

Microsoft Defender Experts uncovered a late-February 2026 campaign that uses WhatsApp messages to deliver malicious VBS files, then installs unsigned MSI packages for persistence and remote access. The attack blends social engineering, renamed Windows utilities, and trusted cloud services to evade detection, making endpoint controls and user awareness critical.

Security

Microsoft Copilot Studio Tackles OWASP Agentic AI Risks

Microsoft outlines how Copilot Studio and the upcoming general availability of Agent 365 can help organizations address the OWASP Top 10 for Agentic Applications. The guidance matters because agentic AI systems can use real identities, data, and tools, creating security risks that go far beyond inaccurate outputs.