Cybersecurity researchers have warned of a significant increase in automated attacks targeting PHP servers, IoT devices, and cloud gateways, driven by botnets such as Mirai, Gafgyt, and Mozi. According to a report from Qualys’ Threat Research Unit, these automated attacks exploit known vulnerabilities and inadequate cloud configurations, allowing attackers to take control of exposed systems and thereby expand their botnet networks.
Some simple measures to prevent attacks
PHP servers have become the main targets of these campaigns due to the popularity of content management systems (CMS) like WordPress and Craft CMS. The exposure of these servers to misconfigurations and outdated plugins expands their attack surface. Researchers highlight that some of the methods used by attackers involve the query string ‘/?XDEBUG_SESSION_START=phpstorm’, which allows starting debugging sessions that, if left active in production environments, can facilitate the extraction of sensitive data.
Additionally, it has been observed that attackers seek credentials, API keys, and access tokens on servers exposed to the internet, and they also exploit security vulnerabilities in IoT devices. Scanning activity often originates from cloud infrastructures such as AWS and Google Cloud, highlighting how cybercriminals abuse legitimate services to conceal their true locations.
Experts warn that even low-level attackers can cause significant damage thanks to widely available exploitation tools and botnet kits. To mitigate these risks, users are advised to keep their systems updated, remove development tools in production environments, and restrict public access to their cloud infrastructure.

This surge in the capabilities of botnets is reflected in the recent classification by NETSCOUT, which identified the AISURU botnet as a new class of malware capable of launching DDoS attacks exceeding 20 terabits per second. AISURU combines DDoS attack capabilities with additional functions, allowing illicit activities such as the use of residential proxies to conceal malicious activity.
