radar

ONE Sentinel

securitySecurity/M365 SECURITY/HIGH

Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

sourceMicrosoft Security Blog
calendar_todayApril 2, 2026
schedule2 min read
lightbulb

EXECUTIVE SUMMARY

Stealthy Cookie-Controlled PHP Webshells Pose Threat to Linux Hosting

Summary

The article discusses the use of cookie-gated PHP webshells in Linux hosting environments, highlighting their stealthy nature due to obfuscation, php-fpm execution, and cron-based persistence. It focuses on how these webshells evade detection by leveraging specially crafted HTTP cookies.

Key Points

  • Cookie-gated PHP webshells are used in Linux hosting environments to evade detection.
  • These webshells employ obfuscation techniques to conceal their presence.
  • They utilize php-fpm execution to run PHP scripts more efficiently and stealthily.
  • Persistence is achieved through cron jobs, allowing the webshells to maintain access over time.
  • The execution of these webshells is hidden behind specially crafted HTTP cookies.
  • The article was published on the Microsoft Security Blog.

Analysis

The use of cookie-controlled PHP webshells represents a sophisticated method of maintaining unauthorized access to Linux hosting environments. By using obfuscation and leveraging common system processes like cron jobs and php-fpm, attackers can effectively hide their activities from traditional security measures. This highlights the need for advanced detection techniques and continuous monitoring to identify such stealthy threats.

Conclusion

IT professionals should enhance their security measures by implementing advanced monitoring tools and regularly auditing cron jobs and PHP configurations. Staying informed about emerging threats such as cookie-controlled PHP webshells is crucial for maintaining secure hosting environments.