By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services
Tech News

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

By Viral Trending Content 5 Min Read
Share
SHARE

Nov 08, 2024Ravie LakshmananIoT Security / Vulnerability

AndroxGh0st Malware

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware.

“This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK said in a new report.

AndroxGh0st is the name given to a Python-based cloud attack tool that’s known for its targeting of Laravel applications with the goal of sensitive data pertaining to services like Amazon Web Services (AWS), SendGrid, and Twilio.

Active since at least 2022, it has previously leveraged flaws in the Apache web server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to gain initial access, escalate privileges, and establish persistent control over compromised systems.

Cybersecurity

Earlier this March, U.S. cybersecurity and intelligence agencies revealed that attackers are deploying the AndroxGh0st malware to create a botnet for “victim identification and exploitation in target networks.”

The latest analysis from CloudSEK reveals a strategic expansion of the targeting focus, with the malware now exploiting an array of vulnerabilities for initial access –

  • CVE-2014-2120 (CVSS score: 4.3) – Cisco ASA WebVPN login page XSS vulnerability
  • CVE-2018-10561 (CVSS score: 9.8) – Dasan GPON authentication bypass vulnerability
  • CVE-2018-10562 (CVSS score: 9.8) – Dasan GPON command injection vulnerability
  • CVE-2021-26086 (CVSS score: 5.3) – Atlassian Jira path traversal vulnerability
  • CVE-2021-41277 (CVSS score: 7.5) – Metabase GeoJSON map local file inclusion vulnerability
  • CVE-2022-1040 (CVSS score: 9.8) – Sophos Firewall authentication bypass vulnerability
  • CVE-2022-21587 (CVSS score: 9.8) – Oracle E-Business Suite (EBS) Unauthenticated arbitrary file upload vulnerability
  • CVE-2023-1389 (CVSS score: 8.8) – TP-Link Archer AX21 firmware command injection vulnerability
  • CVE-2024-4577 (CVSS score: 9.8) – PHP CGI argument injection vulnerability
  • CVE-2024-36401 (CVSS score: 9.8) – GeoServer remote code execution vulnerability

“The botnet cycles through common administrative usernames and uses a consistent password pattern,” the company said. “The target URL redirects to /wp-admin/, which is the backend administration dashboard for WordPress sites. If the authentication is successful, it gains access to critical website controls and settings.”

AndroxGh0st Malware
AndroxGh0st Malware

The attacks have also been observed leveraging unauthenticated command execution flaws in Netgear DGN devices and Dasan GPON home routers to drop a payload named “Mozi.m” from different external servers (“200.124.241[.]140” and “117.215.206[.]216”).

Mozi is another well-known botnet that has a track record of striking IoT devices to co-opt them into a malicious network for conducting distributed denial-of-service (DDoS) attacks.

Cybersecurity

While the malware authors were arrested by Chinese law enforcement officials in September 2021, a precipitous decline in Mozi activity wasn’t observed until August 2023, when unidentified parties issued a kill switch command to terminate the malware. It’s suspected that either the botnet creators or Chinese authorities distributed an update to dismantle it.

AndroxGh0st’s integration of Mozi has raised the possibility of a possible operational alliance, thereby allowing it to propagate to more devices than ever before.

“AndroxGh0st is not just collaborating with Mozi but embedding Mozi’s specific functionalities (e.g., IoT infection and propagation mechanisms) into its standard set of operations,” CloudSEK said.

“This would mean that AndroxGh0st has expanded to leverage Mozi’s propagation power to infect more IoT devices, using Mozi’s payloads to accomplish goals that otherwise would require separate infection routines.”

“If both botnets are using the same command infrastructure, it points to a high level of operational integration, possibly implying that both AndroxGh0st and Mozi are under the control of the same cybercriminal group. This shared infrastructure would streamline control over a broader range of devices, enhancing both the effectiveness and efficiency of their combined botnet operations.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

Minister Niamh Smyth launches National Problem-Solving Competition in Cavan

Poor Sleep Quality Accelerates Brain Aging

Fixify Chooses Cork for EU Hub, Creating 50 High-Tech Jobs

Apple TV 2026 Release Date, Pricing, and Advanced Features

TAGGED: botnet, Cloud security, Cyber Attack, Cyber Security, Cybersecurity, Exploits, Internet, iot security, Malware, network security, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Dogecoin Set To Enter A Parabolic Growth Phase, Here’s What DOGE Must Do
Next Article Crypto’s $135 million campaign undefeated in 48 races so far
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Europe’s corruption challenge goes beyond an East–West divide
Business
Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close
World News
Over 55% return! Mutual fund scheme of the year 2025 crown goes to HSBC Brazil Fund
Business
Final nail in the 4-year cycle? BTC ends year after halving in the red
Crypto
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
Tech News
20 Best PC Games of 2025
Gaming News
US Banks’ Push To Ban Stablecoin Rewards Could Hand Global Advantage To China, Execs Warn
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Pope Leo XIV asks that Rome be welcoming to foreigners as 2025 draws to an close
January 1, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?