PHP.Malicious.Shell.HHC
Description
This indicates an attempt to use a malicious PHP Web Shell.
Most malicious PHP scripts are used to execute command within the privileges of the web applications. Some can also be used to launch attacks or send spam emails.
Affected Products
Any compromised PHP server
Impact
System Compromise: Remote attacker can gain control of vulnerable systems.
Recommended Actions
Remove malicious php file from the system.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |