- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
- This new wireless carrier promises ultra-secure mobile phone service
Androxgh0st Botnet Adopts Mozi Payloads, Expands IoT Reach
Significant developments have emerged in the Androxgh0st botnet, revealing its strategic expansion and integration with elements from the Mozi botnet.
CloudSEK’s Threat Research team today published a new report highlighting that Androxgh0st, active since January 2024, has begun to target web servers, exploiting vulnerabilities to infiltrate systems.
The findings show that this botnet is also deploying Mozi’s Internet of Things (IoT)-focused payloads, raising concerns about a potential operational alliance between the two botnets.
Exploiting High-Profile Vulnerabilities in Major Technologies
According to CloudSEK’s investigation, Androxgh0st leverages various vulnerabilities in high-profile technologies like Cisco ASA, Atlassian JIRA and multiple PHP frameworks. These vulnerabilities grant unauthorized access and facilitate remote code execution, allowing attackers to maintain persistent control over compromised systems.
The US Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory in early 2024, alerting organizations to Androxgh0st’s capacity for systematic exploitation across various CVEs.
Key CVEs Used by Androxgh0st to Infiltrate Systems
Key vulnerabilities identified in Androxgh0st targets include:
Further analysis by CloudSEK revealed that Androxgh0st is also targeting IoT devices, a tactic historically associated with Mozi, which primarily impacted routers and DVRs across China, India and Albania before its creators were arrested in 2021.
Read more on IoT security: Half of IT Leaders Identify IoT as Security Weak Point
Despite Mozi’s disruption, Androxgh0st’s recent command-and-control logs suggest that Mozi’s payloads have been reintegrated into its botnet infrastructure, creating a more extensive infection network and increasing the threat’s reach to IoT environments.
Recommendations to Mitigate Androxgh0st Threat
To mitigate the risks posed by Androxgh0st, CloudSEK advises organizations to immediately patch affected software and network vulnerabilities. Regular system checks, vulnerability scans and updates are also essential in addressing these threats.