PVS detected suspicious Command and Control (CnC) activity.
PVS detected suspicious activity that indicates a remote client interacting and issuing commands on the server via a remote web shell. Once uploaded, an attacker can use other techniques to escalate privileges and issue commands remotely. The remote commands issued have the same privilege and functionality available to the web server and may include the ability to add or delete files, run shell commands, and execute additional exploitation methods.
Search for PHP scripts containing the 'eval()' function and conduct a forensic examination to determine how the vulnerable PHP payload was installed on the server. Also, check for any additional unauthorized changes.