Security News > 2021 > March > PHP web language narrowly avoids “backdoor” supply chain attack

Open source web programming language PHP narrowly avoided a potentially dangerous supply chain attack over the weekend.
In theory, anyone who downloaded the very latest "Still in development" version of PHP on Sunday 2021-03-28, compiled it, and installed it on a real-life, internet facing web server could have been at risk.
PHP development is managed using the well-known Git source code control system, on a server operated by the PHP team itself.
The good news, as we mentioned above, is that this backdoor didn't make it into any official PHP releases, so it's highly unlikely that this Trojan Horse code made it into any real-world servers.
If the above backdoor code has somehow made it into your PHP tree, you would see something like this instead. /home/user/php-source$ grep -R zend eval ext/zlib/* ext/zlib/zlib.
In the unlikely event that your code includes the backdoor, you need to refresh your PHP source from the new repository as well as looking for any other unexplained modifications in your code, or unexpected commands in your logs.
News URL
Related news
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)
- China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access (source)
- PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- GitHub supply chain attack spills secrets from 23,000 projects (source)
- Supply chain attack on popular GitHub Action exposes CI/CD secrets (source)
- Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos (source)
- New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors (source)
- GitHub Action hack likely led to another in cascading supply chain attack (source)
- GitHub Action supply chain attack exposed secrets in 218 repos (source)