Malware & Threats

Symantec Reports Uptick in PHP Inclusion Attacks

Researchers at Symantec say they have noticed an uptick of PHP code inclusion attacks leveraging a two-year-old vulnerability.

<p><span><span><strong>Researchers at Symantec say they have noticed an uptick of PHP code inclusion attacks leveraging a two-year-old vulnerability.</strong></span></span></p><p><span><span><strong> </strong></span></span></p>

Researchers at Symantec say they have noticed an uptick of PHP code inclusion attacks leveraging a two-year-old vulnerability.

The attacks have targeted the company’s managed security services customers during the past three weeks, and have been leveraging CVE-2012-1823 to infect Internet-facing web servers. Only Linux webservers running out-of-date versions of PHP are vulnerable. As of Jan. 6, more than 60 Security Operations Center customers have been affected by the exploit attempts.

“There is no clear correlation between this activity and any individual industry vertical, with customers in health, financial, telecommunications, local government, and more being affected,” according to Symantec’s MSS Global Threat Response blog. “The main driver behind these exploits is to compromise and infect the victim webserver for financial gain. Binaries were extracted from the malicious servers utilized in the attack, revealing primarily bitcoin mining malware. Bitcoins are a virtual currency which is generated based on mathematical operations known as ‘mining’ on computer hardware.”

Attackers often infect machines with the intent of using them to generate bitcoins for financial gain, the company added. Researchers also linked the attack to a Linux worm targeting embedded devices.

“There’s no clear trend or geographic breakdown of source addresses that would lend itself to attribution,” according to Symantec. “Due to the nature of the attack, return traffic to the source host is not required. Redirection information is contained in the original exploit attempt, leading us to believe that source IP information has been spoofed. Identical exploit strings have been observed from numerous source addresses, further indicating spoofed activity.”

Advertisement. Scroll to continue reading.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version