Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The new Glutton malware uses popular PHP frameworks such as Laravel and ThinkPHP
Global Security

The new Glutton malware uses popular PHP frameworks such as Laravel and ThinkPHP

AdminBy AdminDecember 16, 2024No Comments4 Mins Read
Glutton PHP Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Glutton PHP Malware

Cybersecurity researchers have discovered a new PHP-based backdoor named Gluttony which has been used in cyberattacks against China, the United States, Cambodia, Pakistan, and South Africa.

QiAnXin XLab, which discovered the malware in late April 2024, attributed the previously unknown malware to the prolific Chinese state-owned group Winnti (aka APT41) with moderate confidence.

“Interestingly, our investigation revealed that the creators of Glutton deliberately targeted systems in the cybercrime market,” the company said in a statement. said. “With poisoning operations, they sought to turn cybercriminals’ tools against themselves — a classic ‘no honor among thieves’ scenario.”

Glutton is designed to collect sensitive system information, remove ELF backdoor components, and inject code into popular PHP frameworks such as Baota (BT), ThinkPHP, Yii, and Laravel. The ELF malware also bears “almost complete similarity” to the well-known Winnti tool known as PWNLNX.

Despite the links to Winnti, XLab said it could not definitively link the backdoor to an adversary due to the lack of stealth techniques commonly associated with the group. The cybersecurity company called the flaws “uncharacteristic.”

Cyber ​​security

This includes the absence of encrypted command-and-control (C2) communications, the use of HTTP (instead of HTTPS) to download payloads, and the fact that the samples are free of any obfuscation.

Essentially, Glutton is a modular malware system capable of infecting PHP files on target devices as well as installing backdoors. Initial access is believed to be achieved by exploiting zero-day and N-day flaws and brute force attacks.

Another unconventional approach involves advertising on cybercrime forums compromised enterprise hosts that contain l0ader_shell, a backdoor injected into PHP files, effectively allowing operators to launch attacks against other cybercriminals.

The main module that provides the attack is “task_loader”, which is used to evaluate the runtime environment and retrieve additional components, including “init_task”, which is responsible for loading an ELF-based backdoor that is masquerading as FastCGI Process Manager (“/lib/php-fpm”), infecting PHP files with malicious code to further execute the payload, as well as collecting sensitive information and modifying system files.

The attack chain also includes a module called “client_loader”, a reengineered version of “init_task” that uses an updated network infrastructure and includes the ability to download and run a backdoor client. It modifies system files like “/etc/init.d/network” to set persistence.

The PHP backdoor is a full-featured backdoor that supports 22 unique commands that allow you to switch C2 connections between TCP and UDP, run a shell, download/upload files, perform file and directory operations, and run arbitrary PHP code. In addition, the framework allows more PHP payloads to be fetched and run by periodically polling the C2 server.

“These payloads are highly modular, able to function independently or be executed sequentially through a task_loader to form a complex attack framework,” XLab said. “All code execution takes place in PHP or PHP-FPM (FastCGI) processes, ensuring that no file payloads are left behind, thus achieving a hidden footprint.”

Another notable aspect is usage HackBrowserData a tool in systems used by cybercriminal operators to steal sensitive information for the possible purpose of informing future phishing or social engineering campaigns.

Cyber ​​security

“In addition to targeting traditional white hat victims through cybercrime, Glutton demonstrates a strategic focus on exploiting cybercrime resource operators,” XLab said. “This creates a recursive chain of attacks, leveraging the attackers’ own activities against them.”

The disclosure comes weeks after XLab detailed an updated version of the APT41 malware called Clefairy which adds improved storage mechanisms and “embeds an RC4-encrypted kernel driver to mask traces of files, processes, and network connections.”

Once installed, the Linux backdoor is equipped to communicate with the C2 server to receive and execute a variety of commands, including gathering device and process information, running a shell, managing processes, performing file and directory operations, and self-removal.

“Mélofée offers simple functionality with very effective stealth capabilities,” it said said. “Examples of this malware family are rare, suggesting that attackers may limit its use to high-value targets.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.