Back to News
Cybersecurity

Emerging Threat: Cookie-Controlled PHP Web Shells Exploiting Linux Servers

Microsoft's research reveals a new tactic in web shell attacks that leverages HTTP cookies for remote code execution on Linux servers.

Recent findings from the Microsoft Defender Security Research Team highlight a concerning trend in cybersecurity where threat actors are utilizing HTTP cookies as a control mechanism for PHP-based web shells on Linux servers. This method allows attackers to execute commands remotely without relying on traditional means such as URL parameters or request bodies. By embedding malicious code within cookies, attackers can maintain persistence and evade detection, making it significantly harder for security measures to identify and mitigate these threats.

For businesses, this development underscores the urgent need to enhance their web application security practices. Organizations should consider implementing stricter controls around cookie management, including limiting cookie scopes and employing secure flags to prevent unauthorized access. Additionally, regular audits and monitoring of web server configurations can help identify potential vulnerabilities that could be exploited by such tactics. As the cybersecurity landscape continues to evolve, understanding and adapting to these sophisticated methods is crucial for protecting sensitive data and maintaining the integrity of IT infrastructure.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html)*