New Glutton Malware Exploits PHP Frameworks in Global Cyber Attacks

11 views 2 minutes read

Cybersecurity experts are sounding the alarm as Glutton malware exploits PHP frameworks in targeted attacks across China, the United States, Cambodia, Pakistan, and South Africa.

This new PHP-based backdoor, discovered by QiAnXin XLab, is linked to the infamous Chinese cyber espionage group Winnti (APT41).

The malware doesn’t just infiltrate; it manipulates, leveraging the tools of cybercriminals to strike back at them.

Key Takeaway to Glutton Malware Exploits PHP Frameworks:

  • Glutton Malware Exploits PHP Frameworks: Glutton represents a new wave of sophisticated malware targeting critical systems while embedding itself into widely used PHP frameworks like Laravel and ThinkPHP.

The Threat Behind Glutton Malware

What Is Glutton Malware?

Glutton is a modular PHP-based backdoor designed to:

  • Steal Sensitive System Data: It collects vital information from infected devices.
  • Plant ELF Backdoor Components: Allows attackers to infiltrate deeper into systems.
  • Inject Code into PHP Frameworks: Affects popular frameworks like Laravel, ThinkPHP, Yii, and Baota (BT).

This malware is distinct because it focuses on targeting cybercriminals themselves. By compromising enterprise hosts, it creates a recursive attack chain that weaponizes cybercrime tools against their creators.

How Does Glutton Exploit PHP Frameworks?

The attack uses a clever sequence of tools and tactics:

ModuleFunction
task_loaderAssesses the environment and fetches additional components.
init_taskDownloads ELF-based backdoors and modifies system files to maintain access.
client_loaderUpdates the network infrastructure and improves persistence.

The malware infects PHP files and runs payloads via the FastCGI Process Manager (PHP-FPM). This stealthy approach leaves no file traces, making it difficult for defenders to detect.

Key Vulnerabilities Exploited

Glutton exploits both zero-day and N-day vulnerabilities and uses brute-force attacks to gain access. The malware also uses:

  • Unsecured C2 Communications: HTTP connections instead of encrypted HTTPS.
  • Lack of Obfuscation: Malware samples show poor stealth features compared to typical Winnti attacks.

A Twist: Targeting Cybercriminals

In a bold move, Glutton’s operators advertise compromised enterprise hosts on cybercrime forums. These hosts contain l0ader_shell, a PHP backdoor, enabling further attacks on unsuspecting cybercriminals.

Real-Life Example

The tactic of turning tools against cybercriminals isn’t new. In 2016, the Shadow Brokers leak revealed stolen NSA tools that were later used against other attackers.

A Broader Context: Cyber Espionage by Winnti

While the exact ties to Winnti remain unclear, researchers note striking similarities between Glutton’s ELF malware and Winnti’s PWNLNX tool. QiAnXin XLab attributes the malware to the group with moderate confidence, citing:

  • Shared tactics and targets.
  • Links to past Winnti campaigns, including the recently revealed Mélofée malware, which is designed for stealth and persistence.

Glutton, however, lacks Winnti’s usual sophistication, leading to speculation about its true creators or purpose.

About QiAnXin XLab

QiAnXin XLab is a leading cybersecurity research group known for uncovering advanced threats like Glutton and other malware linked to nation-state actors. Visit their official website for more insights.

Rounding Up

As Glutton malware exploits PHP frameworks, it highlights the evolving sophistication of cyber threats in today’s digital landscape.

This backdoor isn’t just targeting traditional victims; it’s infiltrating the cybercrime market, proving there’s truly no honor among thieves.

Staying vigilant and proactive in identifying and mitigating these threats is critical for businesses and individuals alike.


FAQs

What is Glutton malware?

  • Glutton is a PHP-based backdoor that infects systems, steals data, and manipulates PHP frameworks to execute malicious attacks.

What PHP frameworks are affected?

  • Glutton targets Laravel, ThinkPHP, Yii, and Baota (BT), among others.

Who is behind Glutton malware?

  • The malware is attributed to the Chinese cyber espionage group Winnti (APT41) with moderate confidence.

How does Glutton infect systems?

  • It exploits zero-day and N-day vulnerabilities, and brute-force attacks, and uses compromised enterprise hosts to spread malware.

How can organizations protect themselves?

  • Ensure systems are up to date, use encrypted communications, monitor PHP frameworks for anomalies, and implement multi-layered cybersecurity measures.

Stay informed to stay safe in the evolving cybersecurity landscape.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More