Article Details

Scrape Timestamp (UTC): 2024-01-17 11:22:24.270

Source: https://thehackernews.com/2024/01/feds-warn-of-androxgh0st-botnet.html

Original Article Text

Click to Toggle View

Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat actors deploying the AndroxGh0st malware are creating a botnet for "victim identification and exploitation in target networks." A Python-based malware, AndroxGh0st was first documented by Lacework in December 2022, with the malware inspiring several similar tools like AlienFox, GreenBot (aka Maintance), Legion, and Predator. The cloud attack tool is capable of infiltrating servers vulnerable to known security flaws to access Laravel environment files and steal credentials for high-profile applications such as Amazon Web Services (AWS), Microsoft Office 365, SendGrid, and Twilio. Some of the notable flaws weaponized by the attackers include CVE-2017-9841 (PHPUnit), CVE-2021-41773 (Apache HTTP Server), and CVE-2018-15133 (Laravel Framework). "AndroxGh0st has multiple features to enable SMTP abuse including scanning, exploitation of exposed creds and APIs, and even deployment of web shells," Lacework said. "For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute-force attacks." These features make AndroxGh0st a potent threat that can be used to download additional payloads and retain persistent access to compromised systems. The development arrives less than a week after SentinelOne revealed a related-but-distinct tool called FBot that is being employed by attackers to breach web servers, cloud services, content management systems (CMS), and SaaS platforms. It also follows an alert from NETSCOUT about a significant spike in botnet scanning activity since mid-November 2023, touching a peak of nearly 1.3 million distinct devices on January 5, 2024. A majority of the source IP addresses are associated with the U.S., China, Vietnam, Taiwan, and Russia. "Analysis of the activity has uncovered a rise in the use of cheap or free cloud and hosting servers that attackers are using to create botnet launch pads," the company said. "These servers are used via trials, free accounts, or low-cost accounts, which provide anonymity and minimal overhead to maintain." Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.

Daily Brief Summary

CYBERCRIME // CISA and FBI Issue Alert on AndroxGh0st Botnet Credential Theft

U.S. CISA and FBI have issued warnings about the AndroxGh0st malware used in a botnet targeting credentials for services like AWS, Azure, and Office 365.

AndroxGh0st is a Python-based malware initially identified by Lacework in December 2022, and has inspired similar tools aimed at penetrating servers using known vulnerabilities.

Attackers exploit vulnerabilities such as CVE-2017-9841, CVE-2021-41773, and CVE-2018-15133 to infiltrate servers for Laravel environment files and credential theft.

The malware possesses capabilities for SMTP abuse, including scanning for exposed credentials, exploitation of APIs, and deploying web shells for persistent access.

AndroxGh0st also targets AWS by scanning for keys and has brute-force functionalities for generating new keys if needed.

The alert follows reports by SentinelOne on the FBot tool and NETSCOUT on a surge in botnet scanning activity, with the majority of activities traced back to the U.S., China, Vietnam, Taiwan, and Russia.

Attackers increasingly use cheap or free cloud and hosting servers to launch botnets, offering them anonymity and requiring minimal overhead.