Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

January 17, 2024 at 06:39AM

CISA and FBI warn of AndroxGh0st malware creating a botnet for victim identification and exploitation. Capable of infiltrating servers with known security flaws, it targets credentials for platforms like AWS and Microsoft Office 365. Features enable SMTP abuse and persistent access to compromised systems. Related tools include FBot and spike in botnet scanning activity.

The meeting notes highlight the emergence of a significant cybersecurity threat involving the AndroxGh0st malware and related tools like AlienFox, GreenBot, Legion, and Predator. The malware targets vulnerabilities in cloud environments, particularly those associated with Laravel, AWS, Microsoft Office 365, SendGrid, and Twilio. It has the capability to infiltrate servers and conduct activities such as scanning, exploitation of credentials and APIs, and deployment of web shells. Furthermore, it can be used to download additional payloads and maintain persistent access to compromised systems, making it a potent and persistent threat.

In addition to the AndroxGh0st malware, the notes mention a related tool called FBot, which attackers are using to breach web servers, cloud services, content management systems (CMS), and SaaS platforms. It’s important to note that there has been a significant spike in botnet scanning activity, with a majority of source IP addresses associated with countries like the U.S., China, Vietnam, Taiwan, and Russia. The rise in the use of cheap or free cloud and hosting servers for creating botnet launch pads has been identified as a concerning trend.

Overall, the meeting notes underscore the urgency of addressing these emerging cybersecurity threats and taking proactive measures to secure cloud environments and safeguard against potential breaches.

Full Article