PHP.Malicious.Shell.HHC

description-logoDescription

This indicates an attempt to use a malicious PHP Web Shell.
Most malicious PHP scripts are used to execute command within the privileges of the web applications. Some can also be used to launch attacks or send spam emails.

affected-products-logoAffected Products

Any compromised PHP server

Impact logoImpact

System Compromise: Remote attacker can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Remove malicious php file from the system.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-02-27 14.561 Sig Added
2019-01-31 14.538 Sig Added
2019-01-31 14.538 Default_action:pass:drop
2019-01-22 14.530 Sig Added
2019-01-17 14.526 Sig Added
2019-01-11 14.522