Loading cryptocurrency prices...

Spike in Botnet Attacks Targets PHP Servers, IoT Devices, Cloud

  • Automated attacks are increasing against PHP servers, IoT devices, and cloud gateways.
  • Botnets like Mirai, Gafgyt, and Mozi exploit known security flaws and cloud setup errors.
  • PHP-based systems, especially with WordPress and Craft CMS, face high risk due to common vulnerabilities and misconfigurations.
  • Attackers also exploit debugging tools left active in production and seek credentials and API keys on exposed servers.
  • The AISURU botnet can launch massive DDoS attacks and provide residential proxy services for malicious use.

Cybersecurity experts report a surge in automated cyberattacks targeting PHP servers, Internet of Things (IoT) devices, and cloud gateway systems. These attacks, observed worldwide, are carried out by botnets such as Mirai, Gafgyt, and Mozi, which take advantage of known vulnerabilities and cloud misconfigurations to control exposed systems and grow their networks.

- Advertisement -

The Qualys Threat Research Unit detailed in a report shared with The Hacker News that PHP servers are especially targeted because many use popular content management systems like WordPress and Craft CMS. These platforms often have outdated plugins, themes, and insecure storage, making them vulnerable to attacks.

Some major security flaws in PHP frameworks exploited by attackers include CVE-2017-9841 in PHPUnit, CVE-2021-3129 in Laravel, and CVE-2022-47945 in the ThinkPHP Framework. Attackers have also used “/?XDEBUG_SESSION_START=phpstorm” query strings to trigger Xdebug debugging sessions, a tool intended for developers that if left active, can expose sensitive data.

Beyond PHP servers, threat actors search for credentials, API keys, and access tokens on servers exposed to the internet. They also exploit IoT devices using known issues like CVE-2022-22947 in Spring Cloud Gateway, CVE-2024-3721 in TBK DVR models, and misconfigurations in MVPower DVRs that allow unauthorized system command execution.

Much of the scanning activity comes from cloud platforms including Amazon Web Services, Google Cloud, Microsoft Azure, Digital Ocean, and Akamai Cloud. This use of legitimate services helps attackers hide their true locations.

- Advertisement -

James Maude, field CTO at BeyondTrust, explained, “Having access to a vast network of routers and their IP addresses can allow threat actors to perform credential stuffing and password spray attacks at huge scale. Botnets can also evade geolocation controls by stealing a user’s credentials or hijacking a browser session…”

Meanwhile, NETSCOUT identified the AISURU botnet, which can generate distributed denial-of-service (DDoS) attacks exceeding 20 terabits per second. This botnet is mainly composed of consumer broadband routers, CCTV, DVRs, and other customer equipment. According to NETSCOUT, AISURU includes a residential proxy service that allows malicious users to disguise their identity and carry out attacks like HTTPS application-layer DDoS, credential stuffing, spamming, and phishing.

For more details, see the full reports by The Hacker News and NETSCOUT.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Russia to Float First Chinese Yuan Bonds in December 2025

Russia plans to issue its first bonds denominated in the Chinese yuan in December...

Bitcoin Dips Below $100K, JPMorgan Predicts $170K by 2026

Bitcoin's price recently dropped below $100,000, falling to around $94,000 before rebounding.JPMorgan analysts identified...

Aster Confirms Tokenomics Unchanged After CMC Data Mix-Up

Aster confirms no changes to its tokenomics after update discrepancies triggered community concern.Incorrect token...

Five Guilty in US Scheme Aiding North Korean IT Worker Fraud

Five individuals pleaded guilty to aiding North Korea in illicit revenue by enabling fraudulent...

XRP Selling Pressure Rises Amid ETF Debut and Market Shifts

Selling pressure on XRP has increased amid market volatility but recent regulatory progress may...
- Advertisement -

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...