PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems

Security researchers at Bitdefender Labs have detected a significant surge in exploitation attempts targeting a critical PHP vulnerability that allows attackers to execute malicious code on Windows-based systems. The vulnerability, tracked as CVE-2024-4577, has been actively exploited since June 2024, with attackers primarily deploying cryptocurrency miners and remote access tools on compromised servers. Vulnerability Details […] The post PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems appeared first on Cyber Security News.

Mar 19, 2025 - 13:06
 0
PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems

Security researchers at Bitdefender Labs have detected a significant surge in exploitation attempts targeting a critical PHP vulnerability that allows attackers to execute malicious code on Windows-based systems.

The vulnerability, tracked as CVE-2024-4577, has been actively exploited since June 2024, with attackers primarily deploying cryptocurrency miners and remote access tools on compromised servers.

Vulnerability Details and Exploitation Trends

CVE-2024-4577 is a severe argument injection vulnerability affecting PHP installations running in CGI mode on Windows systems.

The flaw allows remote attackers to execute arbitrary code by manipulating character encoding conversions.

When Windows attempts to “translate” unrecognized characters into the closest match, carefully crafted inputs can transform into instructions that execute code on the targeted machine.

Bitdefender’s telemetry reveals a concerning geographic distribution of attacks, with Taiwan experiencing the highest concentration (54.65%), followed by Hong Kong (27.06%), Brazil (16.39%), Japan (1.57%), and India (0.33%).

Exploitation Trends

While the vulnerability frequently leverages multi-byte character sets common in Asian languages, security experts emphasize that systems worldwide remain at risk.

Security researchers have identified several distinct attack patterns associated with this vulnerability. Approximately 15% of detected exploits involve basic vulnerability checks using simple commands like “whoami” to verify system exploitability.

Another 15% focus on system reconnaissance, where attackers employ “Living Off The Land” techniques using built-in Windows command-line tools to gather information about the compromised system.

“The most concerning pattern we’re seeing is the deployment of cryptocurrency miners, which accounts for about 5% of detected attacks,” noted Bitdefender researchers.

The popular XMRig software is being deployed to mine Monero cryptocurrency, leveraging server resources while remaining hidden from typical monitoring tools.

In a curious development, researchers have documented attempts to modify firewall configurations on vulnerable servers to block access to known malicious IPs associated with the exploit.

This unusual pattern suggests a possible “cryptojacking rivalry” where competing malicious actors are battling for control of compromised systems.

Commands discovered by Bitdefender show attackers creating firewall rules to block both inbound and outbound connections to specific IP addresses, including known Monero mining servers.

This behavior aligns with past observations of competition between cryptojacking operators. Beyond cryptocurrency mining, attackers are deploying remote access tools like Quasar RAT, giving them extensive control over compromised systems.

These tools enable keylogging, screen capture, file transfers, and remote command execution.

Researchers have also identified MSI installations and FTP downloads from malicious domains like oldschool[.]best, indicating possible botnet recruitment efforts.

Mitigations

The PHP development team has released patches addressing this vulnerability in versions 8.3.8, 8.2.20, and 8.1.29.

Organizations running older versions, especially unsupported branches like PHP 8.0, PHP 7, and PHP 5, should update immediately.

Security experts also recommend evaluating more secure architectures than CGI, such as Mod-PHP, FastCGI, or PHP-FPM.

Additionally, organizations should consider limiting the use of PowerShell and other administrative tools to privileged users, as most campaigns leverage these built-in utilities for malicious purposes.

With ransomware affiliates and initial access brokers actively seeking vulnerabilities like CVE-2024-4577, organizations are advised to implement continuous monitoring and proactive threat hunting to detect potential compromise before more damaging attacks can occur.

IoC Table

TypeIndicatorDescription/Purpose
Domainoldschool[.]bestHosts malware on FTP server
IP Address159.100.22[.]58Quasar RAT host, distributes vulnerable WinRing0 driver
IP Address185.208.158[.]206Bot command server, hosts malicious .msi files
IP Address176.65.137[.]85Nicehash mining pool
IP Address37.221.65[.]2Associated with attack infrastructure
IP Address176.123.1[.]163Associated with attack infrastructure
IP Address1.255.85[.]176Korean webserver hosting XMRig cryptocurrency miner
IP Address121.78.147[.]213Korean webserver hosting XMRig cryptocurrency miner
IP Address45.138.16[.]118Download location for XMRig miner
IP Address45.138.16[.]130Download location for XMRig miner
IP Address104.21.39[.]74Download location for XMRig miner
IP Address196.251.113[.]139Malware distribution point (payload unavailable for analysis)
IP Address45.77.219[.]82Malware distribution point (payload unavailable for analysis)
IP Address111.173.105[.]60Malware distribution point (payload unavailable for analysis)
IP Address81.161.238[.]139Malware distribution point (payload unavailable for analysis)
IP Address94.156.167[.]166Malware distribution point (payload unavailable for analysis)
Malicious Filewinrig.sysMalicious driver used to hide mining activity
Malicious Filejavawindows.exeDisguised cryptocurrency miner process
Malicious Fileantivirus.cmdDeceptively named malicious command script
Malicious File5118.msiMalicious MSI installer for botnet deployment
Malicious Filedyn[.]phpMalicious PHP script downloaded via FTP

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems appeared first on Cyber Security News.