By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Critical PHP RCE vulnerability mass exploited in new attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Critical PHP RCE vulnerability mass exploited in new attacks
Tech News

Critical PHP RCE vulnerability mass exploited in new attacks

By admin 3 Min Read
Share
SHARE

Threat intelligence company GreyNoise warns that a critical PHP remote code execution vulnerability that impacts Windows systems is now under mass exploitation.

Tracked as CVE-2024-4577, this PHP-CGI argument injection flaw was patched in June 2024 and affects Windows PHP installations with PHP running in CGI mode. Successful exploitation enables unauthenticated attackers to execute arbitrary code and leads to complete system compromise following successful exploitation.

A day after PHP maintainers released CVE-2024-4577 patches on June 7, 2024, WatchTowr Labs released proof-of-concept (PoC) exploit code, and the Shadowserver Foundation reported observing exploitation attempts.

GreyNoise’s warning comes after Cisco Talos revealed earlier that an unknown attacker had exploited the same PHP vulnerability to target Japanese organizations since at least early January 2025.

While Talos observed the attackers attempting to steal credentials, it believes their goals extend beyond just credential harvesting, based on post-exploitation activities, which include establishing persistence, elevating privileges to SYSTEM level, deployment of adversarial tools and frameworks, and usage of “TaoWu” Cobalt Strike kit plugins.

New attacks expand to targets worldwide

However, as GreyNoise reported, the threat actors behind this malicious activity cast a much wider net by targeting vulnerable devices globally, with significant increases observed in the United States, Singapore, Japan, and other countries since January 2025.

In January alone, its worldwide network of honeypots known as Global Observation Grid (GOG) spotted 1,089 unique IP addresses attempting to exploit this PHP security flaw.

“While initial reports focused on attacks in Japan, GreyNoise data confirms that exploitation is far more widespread [..] More than 43% of IPs targeting CVE-2024-4577 in the past 30 days are from Germany and China,” the threat intelligence firm said, warning that at least 79 exploits are available online.

“In February, GreyNoise detected a coordinated spike in exploitation attempts against networks in multiple countries, suggesting additional automated scanning for vulnerable targets.”

Previously, CVE-2024-4577 was exploited by unknown attackers who backdoored a university’s Windows systems in Taiwan with newly discovered malware dubbed Msupedge.

The TellYouThePass ransomware gang also started exploiting the vulnerability to deploy webshells and encrypt victims’ systems less than 48 hours after patches were released in June 2024.

Red Report 2025

Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

You Might Also Like

Best AI Models for 2026 Tasks, Context & Memory Tips

Best New Budget Smartwatch of the Year: Tech Advisor Awards 2025-26

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

Minister Niamh Smyth launches National Problem-Solving Competition in Cavan

Poor Sleep Quality Accelerates Brain Aging

TAGGED: Actively Exploited, PHP, RCE, Remote Code Execution, Vulnerability, Windows
Share This Article
Facebook Twitter Copy Link
Previous Article Paige Bueckers leads UConn to Big East title: 'They have all the pieces to win it all'
Next Article Ninja Swirl by Creami Soft Serve Machine Review: Joy in Every Cup
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

It’s New Year’s Day 2026. What’s open and closed?
Business
Tether snaps up another 8,888 BTC, now fifth-largest Bitcoin wallet
Crypto
EU’s carbon border tax on heavy industry goods goes into effect risking trade escalation
World News
Today In History, January 1: Ellis Island opens
World News
HP Is Offloading 14″ Laptop Bundle to Its Lowest Price, Now Cheaper Than an Entry-Level iPad
Gaming News
Single Player Games Are Not Dead, Not Even Close
Gaming News
Iran security force member killed during protests, official says
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

It’s New Year’s Day 2026. What’s open and closed?

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
It’s New Year’s Day 2026. What’s open and closed?
January 1, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?