AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

November 8, 2024 at 09:58AM

The AndroxGh0st malware is now exploiting various security vulnerabilities in internet-facing applications while incorporating the Mozi botnet for persistent access and credential theft. This integration enhances its targeting capabilities, allowing it to infect more IoT devices and streamline operations within a shared command infrastructure.

### Meeting Takeaways – November 8, 2024

#### Topic: IoT Security / Vulnerability

1. **Malware Overview**:
– **AndroxGh0st**: A Python-based cloud attack tool targeting Laravel applications to obtain sensitive data from services such as AWS, SendGrid, and Twilio. Active since at least 2022.
– **Mozi Botnet**: Known for exploiting IoT devices for DDoS attacks, now integrated with AndroxGh0st.

2. **New Exploits**:
– AndroxGh0st is exploiting a wider range of vulnerabilities, including but not limited to:
– CVE-2014-2120: Cisco ASA WebVPN XSS vulnerability
– CVE-2018-10561/62: Dasan GPON authentication bypass and command injection
– CVE-2021-26086: Atlassian Jira path traversal vulnerability
– CVE-2022-1040: Sophos Firewall authentication bypass
– CVE-2024-36401: GeoServer remote code execution vulnerability
– Vulnerabilities exhibit varying CVSS scores from 4.3 to 9.8.

3. **Attack Methods**:
– AndroxGh0st employs remote code execution and credential-stealing techniques.
– Common administrative usernames and a consistent password pattern are used for access.
– Attacks often target backend administration dashboards of WordPress sites.

4. **Operational Alliance**:
– Integration of Mozi into AndroxGh0st signifies a collaborative operation, enhancing each botnet’s ability to infect more devices.
– Both botnets may operate under the control of the same cybercriminal group, facilitating streamlined operations.

5. **Key Insights**:
– Increased focus on vulnerabilities for initial access reflects a strategic expansion in attack capabilities.
– Continuous monitoring of these security threats, as well as updates from cybersecurity agencies, is essential for effective defense measures.

### Action Items:
– Review and strengthen defenses against mentioned vulnerabilities.
– Monitor for further developments regarding the AndroxGh0st and Mozi botnet threats.
– Consider implementing stringent access controls and password management practices to mitigate risks.

Full Article