Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Winnti Group Deploys Glutton PHP Backdoor on Global Frameworks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Winnti Group Deploys Glutton PHP Backdoor on Global Frameworks

Highlights

  • Winnti group deploys Glutton PHP backdoor globally.

  • Glutton targets major PHP frameworks like Laravel and Yii.

  • Advancements in malware increase detection challenges.

Ethan Moreno
Last updated: 16 December, 2024 - 10:18 pm 10:18 pm
Ethan Moreno 5 months ago
Share
SHARE

Cyber warfare and cybercrime activities are increasingly merging, as demonstrated by the latest discovery of the Glutton PHP backdoor. This sophisticated malware, identified by QiAnXin’s XLab, highlights the persistent threats posed by state-linked hacking groups. The rapid detection underscores the critical role of cybersecurity research in safeguarding digital infrastructures worldwide.

Contents
How Does Glutton Maintain Stealth on Web Servers?Which PHP Frameworks Are Targeted by the Backdoor?Why Is Winnti Believed to Be Behind Glutton Despite Flaws?

Backdoors like Glutton represent a significant advancement from previous threats, which often left detectable signatures within systems. Unlike earlier malware, which could be easily identified and countered, Glutton’s ability to operate seamlessly within PHP environments minimizes its visibility. This shift indicates a higher level of technical expertise and a strategic evolution in the tactics employed by groups such as Winnti.

How Does Glutton Maintain Stealth on Web Servers?

Glutton utilizes PHP and PHP-FPM processes to execute code without leaving traditional file payloads. This strategy ensures that the malware remains undetected by standard security scans.

Which PHP Frameworks Are Targeted by the Backdoor?

The backdoor is designed to infiltrate popular PHP frameworks such as Baota, ThinkPHP, Yii, and Laravel, allowing attackers to inject malicious code or exfiltrate sensitive data effectively.

Why Is Winnti Believed to Be Behind Glutton Despite Flaws?

Although Glutton exhibits certain shortcomings in stealth and execution, its connection to Winnti is supported by shared infrastructure and historical activities of the group, leading researchers to attribute the malware to the APT group with moderate confidence.

“with moderate confidence” that Winnti is responsible for the malware.

The deployment of Glutton across multiple countries, including China, the United States, Cambodia, Pakistan, and South Africa, suggests a deliberate strategy to maximize the malware’s reach.

“By poisoning operations, they aimed to turn the tools of cybercriminals against them — a classic ‘no honor among thieves’ scenario,” XLab researchers wrote.

This widespread targeting not only disrupts potential victims but also complicates the efforts of cybersecurity professionals to contain and eradicate the threat.

Robust security practices, including regular updates and monitoring of PHP applications, are essential to defend against sophisticated backdoors like Glutton. Organizations should implement comprehensive anomaly detection systems to identify unusual activities within their web servers. Additionally, collaboration between cybersecurity firms and international agencies can enhance the effectiveness of threat mitigation efforts.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article NJ Cops Seek Protections for Personal Data from Brokers
Next Article Engineers Create Martian Concrete from Local Materials

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?