
The risk actors in the back of the AndroxGh0st malware at the moment are exploiting a broader set of safety flaws impacting more than a few internet-facing programs, whilst additionally deploying the Mozi botnet malware.
“This botnet makes use of far off code execution and credential-stealing tips on how to handle chronic get admission to, leveraging unpatched vulnerabilities to infiltrate crucial infrastructures,” CloudSEK mentioned in a brand new document.
AndroxGh0st is the title given to a Python-based cloud assault software that is recognized for its concentrated on of Laravel programs with the objective of delicate knowledge bearing on products and services like Amazon Internet Services and products (AWS), SendGrid, and Twilio.
Lively since a minimum of 2022, it has in the past leveraged flaws within the Apache internet server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to achieve preliminary get admission to, escalate privileges, and identify chronic keep watch over over compromised programs.

Previous this March, U.S. cybersecurity and intelligence businesses published that attackers are deploying the AndroxGh0st malware to create a botnet for “sufferer identity and exploitation in goal networks.”
The newest research from CloudSEK unearths a strategic enlargement of the concentrated on focal point, with the malware now exploiting an array of vulnerabilities for preliminary get admission to –
- CVE-2014-2120 (CVSS rating: 4.3) – Cisco ASA WebVPN login web page XSS vulnerability
- CVE-2018-10561 (CVSS rating: 9.8) – Dasan GPON authentication bypass vulnerability
- CVE-2018-10562 (CVSS rating: 9.8) – Dasan GPON command injection vulnerability
- CVE-2021-26086 (CVSS rating: 5.3) – Atlassian Jira trail traversal vulnerability
- CVE-2021-41277 (CVSS rating: 7.5) – Metabase GeoJSON map native record inclusion vulnerability
- CVE-2022-1040 (CVSS rating: 9.8) – Sophos Firewall authentication bypass vulnerability
- CVE-2022-21587 (CVSS rating: 9.8) – Oracle E-Trade Suite (EBS) Unauthenticated arbitrary record add vulnerability
- CVE-2023-1389 (CVSS rating: 8.8) – TP-Hyperlink Archer AX21 firmware command injection vulnerability
- CVE-2024-4577 (CVSS rating: 9.8) – PHP CGI argument injection vulnerability
- CVE-2024-36401 (CVSS rating: 9.8) – GeoServer far off code execution vulnerability
“The botnet cycles thru not unusual administrative usernames and makes use of a constant password development,” the corporate mentioned. “The objective URL redirects to /wp-admin/, which is the backend management dashboard for WordPress websites. If the authentication is a hit, it good points get admission to to crucial website online controls and settings.”


The assaults have additionally been noticed leveraging unauthenticated command execution flaws in Netgear DGN gadgets and Dasan GPON house routers to drop a payload named “Mozi.m” from other exterior servers (“200.124.241[.]140” and “117.215.206[.]216”).
Mozi is any other well known botnet that has a observe file of hanging IoT gadgets to co-opt them right into a malicious community for engaging in disbursed denial-of-service (DDoS) assaults.

Whilst the malware authors had been arrested via Chinese language police officers in September 2021, a precipitous decline in Mozi process wasn’t noticed till August 2023, when unidentified events issued a kill transfer command to terminate the malware. It is suspected that both the botnet creators or Chinese language government disbursed an replace to dismantle it.
AndroxGh0st’s integration of Mozi has raised the potential for a imaginable operational alliance, thereby permitting it to propagate to extra gadgets than ever sooner than.
“AndroxGh0st isn’t just taking part with Mozi however embedding Mozi’s explicit functionalities (e.g., IoT an infection and propagation mechanisms) into its same old set of operations,” CloudSEK mentioned.
“This may imply that AndroxGh0st has expanded to leverage Mozi’s propagation energy to contaminate extra IoT gadgets, the usage of Mozi’s payloads to perform objectives that differently will require separate an infection routines.”
“If each botnets are the usage of the similar command infrastructure, it issues to a prime degree of operational integration, most likely implying that each AndroxGh0st and Mozi are underneath the keep watch over of the similar cybercriminal workforce. This shared infrastructure would streamline keep watch over over a broader vary of gadgets, bettering each the effectiveness and potency in their mixed botnet operations.”