CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Friday, November 8, 2024

AndroxGh0st and Mozi: Expanding Botnet Operations Through Exploited Vulnerabilities

 Attack News for October 8th, 2024

The AndroxGh0st malware operators exploit various security vulnerabilities in various internet-facing applications and deploy the Mozi botnet malware.

According to a new report from CloudSEK, this botnet uses remote code execution and credential-stealing techniques to maintain persistent access, exploiting unpatched vulnerabilities to infiltrate critical infrastructures.

AndroxGh0st, a Python-based cloud attack tool, is known for targeting Laravel applications to access sensitive data from services like Amazon Web Services (AWS), SendGrid, and Twilio. Active since at least 2022, it has previously exploited vulnerabilities in the Apache web server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to gain initial access, escalate privileges, and establish control over compromised systems.

CloudSEK’s latest analysis shows that the malware is now exploiting a broader array of vulnerabilities for initial access, including:

CVE-2023-1389 (CVSS score: 8.8) - TP-Link Archer AX21 firmware command injection vulnerability

CVE-2024-4577 (CVSS score: 9.8) - PHP CGI argument injection vulnerability

CVE-2024-36401 (CVSS score: 9.8) - GeoServer remote code execution vulnerability

“The botnet cycles through common administrative usernames and uses a consistent password pattern,” CloudSEK noted. “The target URL redirects to /wp-admin/, the backend administration dashboard for WordPress sites. If authentication is successful, it gains access to critical website controls and settings.”

The attacks also exploit unauthenticated command execution flaws in Netgear DGN devices and Dasan GPON home routers to drop a payload named “Mozi.m” from various external servers (“200.124.241[.]140” and “117.215.206[.]216”).

Mozi, another well-known botnet, has a history of targeting IoT devices to incorporate them into a malicious network for conducting distributed denial-of-service (DDoS) attacks. Although the malware authors were arrested by Chinese law enforcement in September 2021, a significant decline in Mozi activity wasn’t observed until August 2023, when unidentified parties issued a kill switch command to terminate the malware. It’s suspected that the botnet creators or Chinese authorities distributed an update to dismantle it.

AndroxGh0st’s integration of Mozi suggests a possible operational alliance, allowing it to spread to more devices than ever before.

“AndroxGh0st is not just collaborating with Mozi but embedding Mozi’s specific functionalities (e.g., IoT infection and propagation mechanisms) into its standard operations,” CloudSEK stated.

“AndroxGh0st has expanded to leverage Mozi’s propagation power to infect more IoT devices, using Mozi’s payloads to achieve goals that would otherwise require separate infection routines.”

 “If both botnets use the same command infrastructure, it points to a high level of operational integration, possibly implying that the same cybercriminal group controls both AndroxGh0st and Mozi. This shared infrastructure would streamline control over a broader range of devices, enhancing both the effectiveness and efficiency of their combined botnet operations.”

No comments:

Post a Comment