Skip to content

Unmasked: PHP instances frequently become victims of TellYouThePass ransomware attacks

Known exploited vulnerability added to CISA catalog, majority of affected hosts detected in China thus far.

PHP instances with insufficient security are frequently subjected to attacks by TellYouThePass...
PHP instances with insufficient security are frequently subjected to attacks by TellYouThePass ransomware.

Unmasked: PHP instances frequently become victims of TellYouThePass ransomware attacks

In the digital landscape, a critical remote code execution vulnerability named CVE-2024-4577 has been affecting a wide range of users, from individual personal website maintainers to enterprise websites. This vulnerability, primarily impacting Windows PHP CGI environments, was first detected by researchers at Imperva on June 7.

The PHP programming language's latest patch versions, including 8.3.8, 8.2.20, and 8.1.29, were released on June 6 to address this issue. However, researchers from Censys have warned of increased exploitation activity by the TellYouThePass ransomware group, which has been in existence since at least 2019.

TellYouThePass has previously leveraged vulnerabilities such as Apache Log4j (CVE-2021-44228) and a vulnerability in Apache ActiveMQ (CVE-2023-46604). As of now, there is no direct evidence or detailed reports linking TellYouThePass to active exploitation of CVE-2024-4577. Analysis of payloads suggests some confusion by attackers attempting to use this vulnerability against Linux systems, indicating possible operational errors by threat actors rather than targeted campaigns.

The Cybersecurity and Infrastructure Security Agency added CVE-2024-4577 to its known exploited vulnerabilities catalog on Wednesday. As of mid-2025, this vulnerability allows attackers to execute arbitrary code by exploiting how PHP treats POST content as executable PHP code under certain configurations. This can lead to full server compromise, data theft, and malware infection for organizations using PHP versions susceptible to this flaw.

Researchers from Palo Alto Networks have also confirmed active exploitation activity as of June 11. The number of observed infections has been declining, with about 1,000 infected hosts observed as of Thursday, primarily located in China. The direct impact on the U.S. is currently limited, with the number of compromised hosts peaking at 39 on Tuesday, compared to a high of 962 compromised hosts in China as of Monday.

It's worth noting that the threat actors seem to be mass scanning the internet, rather than targeting any specific organizations. An unauthenticated attacker can bypass the previous protection for CVE-2012-1823 due to this vulnerability, which has a CVSS score of 9.8 and could allow an attacker to achieve remote code execution.

In summary, prompt updating and patching of PHP versions are the main recommended mitigations to secure supported platforms. Organizations using PHP versions susceptible to CVE-2024-4577 remain vulnerable to arbitrary code execution, which can lead to serious consequences. Stay vigilant and ensure your PHP systems are up-to-date to protect against this ongoing threat.

  1. The TellYouThePass ransomware group, active since at least 2019, has been linked to increased exploitation activity involving ransomware, specifically targeting the vulnerability CVE-2024-4577 in the PHP programming language.
  2. In the general-news and crime-and-justice sectors, a growing concern is the exploitation of CVE-2024-4577 by cybercriminals, with reports suggesting that this vulnerability could lead to significant vulnerabilities for organizations using susceptible PHP versions.
  3. The cybersecurity community advises staying vigilant in the face of ongoing threats such as ransomware attacks, and emphasizes the importance of keeping technology updated, particularly PHP systems, to mitigate vulnerabilities like CVE-2024-4577.

Read also:

    Latest

    Artificial Intelligence customer service solutions receive a boost as Onix acquires UJET Services...

    AI giant Onix acquires UJET's customer service solutions division, bolstering its artificial intelligence capabilities in service delivery.

    Data solution giant Onix expands its service portfolio by purchasing the professional services division from UJET, a prominent player in cloud-based Contact Center as a Service (CCaaS) software. This acquisition empowers Onix to provide more advanced AI-driven customer interaction solutions and...