By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Computing

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

News Room
Last updated: 2026/04/03 at 1:42 PM
News Room Published 3 April 2026
Share
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
SHARE

Ravie LakshmananApr 03, 2026Linux / Server Hardening

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team.

“Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution, pass instructions, and activate malicious functionality,” the tech giant said.

The approach offers added stealth as it allows malicious code to stay dormant during normal application execution and activate the web shell logic only when specific cookie values are present. This behavior, Microsoft noted, extends to web requests, scheduled tasks, and trusted background workers.

The malicious activity takes advantage of the fact that cookie values are available at runtime through the $_COOKIE superglobal variable, allowing attacker-supplied inputs to be consumed without additional parsing. What’s more, the technique is unlikely to raise any red flags as cookies blend into normal web traffic and reduce visibility.

The cookie-controlled execution model comes in different implementations –

  • A PHP loader that uses multiple layers of obfuscation and runtime checks before parsing structured cookie input to execute an encoded secondary payload.
  • A PHP script that segments structured cookie data to reconstruct operational components such as file handling and decoding functions, and conditionally writes a secondary payload to disk and executes it.
  • A PHP script that uses a single cookie value as a marker to trigger threat actor-controlled actions, including execution of supplied input and file upload.

In at least one case, threat actors have been found to obtain initial access to a victim’s hosted Linux environment through valid credentials or the exploitation of a known security vulnerability to set up a cron job that invokes a shell routine periodically to execute an obfuscated PHP loader.

This “self-healing” architecture allows the PHP loader to be repeatedly recreated by the scheduled task even if it was removed as part of cleanup and remediation efforts, thereby creating a reliable and persistent remote code execution channel. Once the PHP loader is deployed, it remains inactive during normal traffic and springs into action upon receiving HTTP requests with specific cookie values. 

“By shifting execution control into cookies, the web shell can remain hidden in normal traffic, activating only during deliberate interactions,” Microsoft added. “By separating persistence through cron-based re-creation from execution control through cookie-gated activation, the threat actor reduced operational noise and limited observable indicators in routine application logs.”

A common aspect that ties together all the aforementioned implementations is the use of obfuscation to conceal sensitive functionality and cookie-based gating to initiate the malicious action, while leaving a minimal interactive footprint.

To counter the threat, Microsoft recommends enforcing multi-factor authentication for hosting control panels, SSH access, and administrative interfaces; monitoring for unusual login activity; restricting the execution of shell interpreters; auditing cron jobs and scheduled tasks across web servers; checking for suspicious file creation in web directories; and limiting hosting control panels’ shell capabilities.

“The consistent use of cookies as a control mechanism suggests reuse of established web shell tradecraft,” Microsoft said. “By shifting control logic into cookies, threat actors enable persistent post-compromise access that can evade many traditional inspection and logging controls.”

“Rather than relying on complex exploit chains, the threat actor leveraged legitimate execution paths already present in the environment, including web server processes, control panel components, and cron infrastructure, to stage and preserve malicious code.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 3 best new to Netflix movies you need to watch this weekend (April 3-5) 3 best new to Netflix movies you need to watch this weekend (April 3-5)
Next Article Move, Backup, and Wipe Your PC With One Powerful Bundle Now on Sale for Move, Backup, and Wipe Your PC With One Powerful Bundle Now on Sale for $35
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Vulkan 1.4.348 Ships Four New Extensions – Including One To Help OpenGL Emulation
Vulkan 1.4.348 Ships Four New Extensions – Including One To Help OpenGL Emulation
Computing
Amazon's Big Summer Prime Day Sale Might Be Moving This Year. Here's What to Expect and How to Get Ready
Amazon's Big Summer Prime Day Sale Might Be Moving This Year. Here's What to Expect and How to Get Ready
News
Xiaomi’s newly-launched YU7 reportedly being swiped by scalpers · TechNode
Xiaomi’s newly-launched YU7 reportedly being swiped by scalpers · TechNode
Computing
Bloodhounds, Mormons, Big Mistakes: What’s New to Watch on Netflix the Week of April 3, 2026
Bloodhounds, Mormons, Big Mistakes: What’s New to Watch on Netflix the Week of April 3, 2026
News

You Might also Like

Vulkan 1.4.348 Ships Four New Extensions – Including One To Help OpenGL Emulation
Computing

Vulkan 1.4.348 Ships Four New Extensions – Including One To Help OpenGL Emulation

2 Min Read
Xiaomi’s newly-launched YU7 reportedly being swiped by scalpers · TechNode
Computing

Xiaomi’s newly-launched YU7 reportedly being swiped by scalpers · TechNode

1 Min Read
5 Best Influencer Marketing Campaigns Examples in 2025
Computing

5 Best Influencer Marketing Campaigns Examples in 2025

1 Min Read
Why Your Retry Logic Is Taking Down Your System (And How to Fix It) | HackerNoon
Computing

Why Your Retry Logic Is Taking Down Your System (And How to Fix It) | HackerNoon

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?