AndroxGh0st Malware Integrates Mozi Botnet to Goal IoT and Cloud Providers

Nov 08, 2024Ravie LakshmananIoT Safety / Vulnerability

The risk actors behind the AndroxGh0st malware at the moment are exploiting a broader set of safety flaws impacting numerous internet-facing functions, whereas additionally deploying the Mozi botnet malware.

“This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK mentioned in a brand new report.

AndroxGh0st is the identify given to a Python-based cloud assault instrument that is recognized for its focusing on of Laravel functions with the aim of delicate information pertaining to providers like Amazon Net Providers (AWS), SendGrid, and Twilio.

Energetic since not less than 2022, it has beforehand leveraged flaws within the Apache net server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to achieve preliminary entry, escalate privileges, and set up persistent management over compromised techniques.

Cybersecurity

Earlier this March, U.S. cybersecurity and intelligence companies revealed that attackers are deploying the AndroxGh0st malware to create a botnet for “victim identification and exploitation in target networks.”

The most recent evaluation from CloudSEK reveals a strategic enlargement of the focusing on focus, with the malware now exploiting an array of vulnerabilities for preliminary entry –

  • CVE-2014-2120 (CVSS rating: 4.3) – Cisco ASA WebVPN login web page XSS vulnerability
  • CVE-2018-10561 (CVSS rating: 9.8) – Dasan GPON authentication bypass vulnerability
  • CVE-2018-10562 (CVSS rating: 9.8) – Dasan GPON command injection vulnerability
  • CVE-2021-26086 (CVSS rating: 5.3) – Atlassian Jira path traversal vulnerability
  • CVE-2021-41277 (CVSS rating: 7.5) – Metabase GeoJSON map native file inclusion vulnerability
  • CVE-2022-1040 (CVSS rating: 9.8) – Sophos Firewall authentication bypass vulnerability
  • CVE-2022-21587 (CVSS rating: 9.8) – Oracle E-Enterprise Suite (EBS) Unauthenticated arbitrary file add vulnerability
  • CVE-2023-1389 (CVSS rating: 8.8) – TP-Hyperlink Archer AX21 firmware command injection vulnerability
  • CVE-2024-4577 (CVSS rating: 9.8) – PHP CGI argument injection vulnerability
  • CVE-2024-36401 (CVSS rating: 9.8) – GeoServer distant code execution vulnerability

“The botnet cycles through common administrative usernames and uses a consistent password pattern,” the corporate mentioned. “The target URL redirects to /wp-admin/, which is the backend administration dashboard for WordPress sites. If the authentication is successful, it gains access to critical website controls and settings.”

AndroxGh0st Malware
AndroxGh0st Malware

The assaults have additionally been noticed leveraging unauthenticated command execution flaws in Netgear DGN gadgets and Dasan GPON dwelling routers to drop a payload named “Mozi.m” from totally different exterior servers (“200.124.241[.]140” and “117.215.206[.]216”).

Mozi is one other well-known botnet that has a observe document of hanging IoT gadgets to co-opt them right into a malicious community for conducting distributed denial-of-service (DDoS) assaults.

Cybersecurity

Whereas the malware authors have been arrested by Chinese language regulation enforcement officers in September 2021, a precipitous decline in Mozi exercise wasn’t noticed till August 2023, when unidentified events issued a kill change command to terminate the malware. It is suspected that both the botnet creators or Chinese language authorities distributed an replace to dismantle it.

AndroxGh0st’s integration of Mozi has raised the potential of a potential operational alliance, thereby permitting it to propagate to extra gadgets than ever earlier than.

“AndroxGh0st is not just collaborating with Mozi but embedding Mozi’s specific functionalities (e.g., IoT infection and propagation mechanisms) into its standard set of operations,” CloudSEK mentioned.

“This would mean that AndroxGh0st has expanded to leverage Mozi’s propagation power to infect more IoT devices, using Mozi’s payloads to accomplish goals that otherwise would require separate infection routines.”

“If both botnets are using the same command infrastructure, it points to a high level of operational integration, possibly implying that both AndroxGh0st and Mozi are under the control of the same cybercriminal group. This shared infrastructure would streamline control over a broader range of devices, enhancing both the effectiveness and efficiency of their combined botnet operations.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles

GLASSBRIDGE: Google Blocks 1000’s of Professional-China Pretend Information Websites

Abstract Google has uncovered a community of over 1,000 faux...

Phishing Prevention Framework Reduces Incidents by Half

An information-focused strategy to tackling phishing and enterprise fraud...

Prime 5 Catastrophe Restoration as a Service Suppliers for 2024

Catastrophe restoration as a service helps companies restore their...