InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices
Technology

Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices

October 29, 2025 5 Min Read
Share
Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices
SHARE

Cybersecurity researchers are warning of a surge in automated attacks targeting PHP servers, IoT devices, and cloud gateways from various botnets such as Mirai, Gafgyt, and Mozi.

“These automated campaigns exploit known CVE vulnerabilities and cloud misconfigurations to take control of exposed systems and expand botnet networks,” Qualys Threat Research Unit (TRU) said in a report shared with The Hacker News.

The cybersecurity firm said PHP servers have emerged as the most prominent target for these attacks due to the widespread use of content management systems such as WordPress and Craft CMS. This creates a large attack surface, as many PHP deployments can be affected by misconfigurations, outdated plugins or themes, or insecure file storage.

Here are some of the notable weaknesses in PHP frameworks that have been exploited by threat actors.

  • CVE-2017-9841 – Remote code execution vulnerability in PHPUnit
  • CVE-2021-3129 – Laravel remote code execution vulnerability
  • CVE-2022-47945 – Remote code execution vulnerability in ThinkPHP framework

Qualys said it has also observed an exploit that uses the “/?XDEBUG_SESSION_START=phpstorm” query string in an HTTP GET request to start an Xdebug debugging session in an integrated development environment (IDE) like PhpStorm.

“If Xdebug is left unintentionally active in a production environment, an attacker could use these sessions to gain insight into application behavior or extract sensitive data,” the company said.

Alternatively, threat actors continue to seek out credentials, API keys, and access tokens on servers exposed to the internet to gain control of susceptible systems or exploit known security flaws in IoT devices to incorporate into botnets. These include –

  • CVE-2022-22947 – Spring Cloud Gateway remote code execution vulnerability
  • CVE-2024-3721 – TBK DVR-4104 and DVR-4216 Command Injection Vulnerability
  • Misconfiguration of MVPower TV-7104HE DVR allows unauthenticated users to execute arbitrary system commands via HTTP GET requests
See also  LastPass warns about fake repositories that infect MacOS with Atomic Infostealer

Qualys added that scanning activity often originates from cloud infrastructure such as Amazon Web Services (AWS), Google Cloud, Microsoft Azure, Digital Ocean, and Akamai Cloud, demonstrating how threat actors are exploiting legitimate services for their own benefit while hiding their true origin.

“Today’s threat actors do not need to be highly sophisticated to be effective,” the report said. “The ubiquity of exploit kits, botnet frameworks, and scanning tools means that even entry-level attackers can cause significant damage.”

To protect yourself from this threat, we recommend that users keep their devices up to date, remove production development and debugging tools, use AWS Secrets Manager or HashiCorp Vault to protect secrets, and limit public access to their cloud infrastructure.

“Botnets have traditionally been associated with large-scale DDoS attacks and the occasional cryptocurrency mining scam, but in the era of identity security threats, we believe botnets are taking on a new role in the threat ecosystem,” said James Maud, Field CTO at BeyondTrust.

“Access to a vast network of routers and their IP addresses allows attackers to perform credential stuffing and password spraying attacks at scale. Botnets can steal user credentials or hijack browser sessions, using botnet nodes close to the victim’s physical location or even using the same ISP as the victim to attack anomalous login detection and access. You can also circumvent location controls by circumventing policies.”

The disclosure comes after NETSCOUT classified the DDoS lending botnet known as AISURU as a new class of malware called TurboMirai that is capable of launching DDoS attacks in excess of 20 terabits per second (Tbps). The botnet primarily consists of consumer broadband access routers, online CCTV and DVR systems, and other customer premise equipment (CPE).

See also  The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

“These botnets incorporate additional dedicated DDoS attack capabilities and multi-purpose capabilities, enabling both DDoS attacks and other illegal activities such as credential stuffing, artificial intelligence (AI) web scraping, spamming, and phishing,” the company said.

“AISURU includes an onboard residential proxy service that is used to reflect HTTPS application-layer DDoS attacks generated by external attack harnesses.”

By turning a compromised device into a residential proxy, paying customers can route their traffic through one of the nodes in the botnet, providing anonymity and the ability to blend in with normal network activity. Independent security journalist Brian Krebs, citing data from spur.us, says all major proxy services have seen rapid growth over the past six months.

Share This Article
Twitter Copy Link
Previous Article arc raiders developer "No generation AI is used" The visuals are great, but here's why Embark still needs to be published on Steam arc raiders developer "No generation AI is used" The visuals are great, but here’s why Embark still needs to be published on Steam
Next Article Appeals court blocks order forcing Bovino to explain to judge in Chicago immigration sweep case Appeals court blocks order forcing Bovino to explain to judge in Chicago immigration sweep case

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Evolution of UTA0388 espionage malware
Technology

Evolution of UTA0388 espionage malware

5 Min Read
Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
Technology

Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

3 Min Read
One click allows you to turn Perplexity's Comet AI Browser into Data Thief
Technology

One click allows you to turn Perplexity’s Comet AI Browser into Data Thief

3 Min Read
New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Technology

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?