ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
giovedì, Novembre 13, 2025
No Result
View All Result
Global News 24
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
No Result
View All Result
Global News 24
No Result
View All Result
Home Tech

Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating

by admin
16 Giugno 2024
in Tech
0 0
0
Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

Advertisement. Scroll to continue reading.
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

ADVERTISEMENT
ADVERTISEMENT


Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word

Getty Images

Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability per mezzo di the PHP programming language that executes malicious code acceso web servers, security researchers said.

As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, mongoloide from 1,800 detected acceso Monday. The servers, primarily located per mezzo di , risposta negativa longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 per mezzo di exchange for the decryption key.

The output of PHP servers infected by TellYouThePass ransomware.
Enlarge / The output of PHP servers infected by TellYouThePass ransomware.

Censys

The accompanying ransom note.
Enlarge / The accompanying ransom note.

Censys

When opportunity knocks

The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors per mezzo di the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied ingresso into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched per mezzo di PHP per mezzo di 2012.

CVE-2024-4577 affects PHP only when it runs per mezzo di a mode known as CGI, per mezzo di which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are per mezzo di directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows tipico—used to personalize the OS to the local language of the user—must be set to either Chinese ora Japanese.

Advertisement

The critical vulnerability was published acceso June 6, along with a security patch. Within 24 hours, threat actors were exploiting it to install TellYouThePass, researchers from security firm Imperva reported Monday. The exploits executed code that used the mshta.exe Windows binary to run an HTML application file hosted acceso an attacker-controlled server. Use of the binary indicated an approach known as living the land, per mezzo di which attackers use native OS functionalities and tools per mezzo di an attempt to blend per mezzo di with normal, non-malicious activity.

Per a post published Friday, Censys researchers said that the exploitation by the TellYouThePass cricca started acceso June 7 and mirrored past incidents that opportunistically mass scan the Internet for vulnerable systems following a high-profile vulnerability and indiscriminately targeting any accessible server. The vast majority of the infected servers have IP addresses geolocated to , Taiwan, Hong Kong, ora Japan, likely stemming from the fact that Chinese and Japanese locales are the only ones confirmed to be vulnerable, Censys researchers said per mezzo di an email.

Since then, the number of infected sites—detected by observing the public-facing HTTP response serving an gara open directory listing showing the server’s filesystem, along with the distinctive file-naming convention of the ransom note—has fluctuated from a low of 670 acceso June 8 to a high of 1,800 acceso Monday.

Image tracking day-to-day compromises of PHP servers and their geolocation.
Enlarge / Image tracking day-to-day compromises of PHP servers and their geolocation.

Censys

Censys researchers said per mezzo di an email that they’sire not entirely sure what’s causing the changing numbers.

“From our perspective, many of the compromised hosts appear to remain online, but the port running the PHP-CGI ora XAMPP service stops responding—hence the drop per mezzo di detected infections,” they wrote. “Another point to consider is that there are currently risposta negativa observed ransom payments to the only Bitcoin address listed per mezzo di the ransom taccuino (source). Based acceso these facts, our intuition is that this is likely the result of those services being decommissioned ora going offline per mezzo di some other manner.”

Advertisement

XAMPP used per mezzo di production, really?

The researchers went acceso to say that roughly half of the compromises observed show clear signs of running XAMPP, but that estimate is likely an undercount since not all services explicitly show what software they use.

“Given that XAMPP is vulnerable by default, it’s reasonable to guess that most of the infected systems are running XAMPP,” the researchers said. This Censys query lists the infections that are explicitly affecting the platform. The researchers aren’t aware of any specific platforms other than XAMPP that have been compromised.

The discovery of compromised XAMPP servers took Will Dormann, a senior vulnerability analyst at security firm Analygence, by surprise because XAMPP maintainers explicitly say their software isn’t suitable for production systems.

“People choosing to run not-for-production software have to deal with the consequences of that decision,” he wrote per mezzo di an online interview.

While XAMPP is the only platform confirmed to be vulnerable, people running PHP acceso any Windows system should install the update as soon as possible. The Imperva post linked above provides IP addresses, file names, and file hashes that administrators can use to determine whether they have been targeted per mezzo di the attacks.

Tags: attackersPHPquicklyransomwareratingseverityvulnerabilityweaponize
admin

admin

Next Post
Why You Sweat So Much at Night—And What to Do About It

Why You Sweat So Much at Night—And What to Do About It

Lascia un commento Annulla risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Popular News

  • Patti Stanger acceso How to Attract the Right Socio

    Patti Stanger acceso How to Attract the Right Socio

    0 shares
    Share 0 Tweet 0
  • Subscription vitamin company Care/of is shutting

    0 shares
    Share 0 Tweet 0
  • Avril Lavigne addresses ‘dumb’ body-double conspiracy theory – National

    0 shares
    Share 0 Tweet 0
  • THE MASQUE OF THE RED DEATH 1989 horror free online

    0 shares
    Share 0 Tweet 0
  • ‘Nobody does dishes better than I do’: NVIDIA’s Jensen Huang acceso what it takes to build a trillion dollar firm

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT

About Us

Welcome to Globalnews24.ch The goal of Globalnews24.ch is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Category

  • Business
  • Entertainment
  • Fashion
  • Health
  • Lifestyle
  • Sports
  • Tech
  • Travel
  • World

Recent Posts

  • Company Adds 2M Streaming Households, Hits Key Financial Targets
  • Warner Music Group shake-up: Max Lousada to exit; Elliot Grainge named CEO of Atlantic Music Group, with Julie Greenwald as Chairman
  • Rookie broadcaster Tom Brady has A-list actor’s backing
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

No Result
View All Result
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In