⚠️ Androxgh0st botnet is back and evolving
🎯 Targets US universities including UC San Diego
💥 Uses RCE, JNDI, OGNL, web shells
🛡️ Patch devices now!

🔗 https://hackread.com/androxgh0st-botnet-expand-exploit-us-university-servers/

#Androxgh0st #CyberSecurity #RCE #InfoSec #JavaSecurity

Androxgh0st Botnet Expands Reach, Exploiting US University Servers

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto

⚠️ Androxgh0st botnet is back and evolving

🎯 Targets US universities including UC San Diego

💥 Uses RCE, JNDI, OGNL, web shells

🛡️ Patch devices now!

🔗 https://hackread.com/androxgh0st-botnet-expand-exploit-us-university-servers/

#Androxgh0st #CyberSecurity #RCE #InfoSec #JavaSecurity

Androxgh0st Botnet Expands Reach, Exploiting US University Servers

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Botnet con acento italiano: Ballista penetra en los enrutadores TP-Link

Miles de dispositivos Archer desprotegidos se han convertido en parte de un ejército oculto de piratas informáticos

Juniper provides a technical analysis of AndroxGh0st, a Python-based malware designed to target Laravel applications. The Androxgh0st malware leverages three critical vulnerabilities, all three of which are in the CISA KEV Catalog: Androxgh0st exploits CVE-2021-41773 as its first foothold, then gaining RCE through both CVE-2017-9841 and CVE-2018-15133 (which exploits weaknesses in XSRF-TOKEN handling). IOC provided. 🔗 https://blogs.juniper.net/en-us/security/shielding-networks-against-androxgh0st

#AndroxGh0st #thratintel #Laravel #CVE_2021_41773 #CVE_2017_9841 #CVE_2018_15133 #IOC

Shielding Networks From Androxgh0st | Official Juniper Networks Blogs

AndroxGh0st is a Python-based malware designed to target Laravel applications. It works by scanning and taking out important information from .env files, revealing login details linked to AWS and Twilio. Classified as an SMTP cracker, it exploits SMTP using various strategies such as credential exploitation, web shell deployment and vulnerability scanning. While its ability to generate AWS keys hints at potential brute force attacks, this aspect remains more of a novelty. The primary goal is clear: compromise and extract critical data from Laravel applications, emphasizing the need for robust cybersecurity measures. 

Official Juniper Networks Blogs

🎦 Watch @FortiGuardLabs' Jonas Walker dissect the latest Outbreak Alert, #Androxgh0st Malware Attack - a python-based malware, which targets user environment (.env) files.

👉 Watch the full video: https://www.youtube.com/watch?v=zEVXqcHVr_o

📲 Subscribe to Outbreak Alerts: https://ftnt.net/6050TRHtg

#threatintel #cti #cybersecurity security

Androxgh0st Malware Attack | FortiGuard Labs Outbreak Alert

YouTube
Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials
https://thehackernews.com/2024/01/feds-warn-of-androxgh0st-botnet.html #Cybercrime #Botnet #AndroxGh0st
Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

CISA & FBI warn of a growing AndroxGh0st botnet targeting AWS, Microsoft Office 365, SendGrid, and Twilio credentials.

The Hacker News

"⚠️ Alert: Androxgh0st Botnet Targets AWS & Microsoft Credentials! 🚨"

The cybersecurity realm is on high alert with the emergence of Androxgh0st, a botnet malware exploiting vulnerabilities to steal AWS and Microsoft credentials. It's a Python-scripted threat, targeting sensitive .env files and leveraging SMTP for credential scanning and web shell deployment. Key vulnerabilities exploited include CVE-2017-9841, CVE-2018-15133, and CVE-2021-41773, allowing remote code execution and file uploads. This critical development warrants immediate attention and proactive defense strategies.

Tags: #CyberSecurity #Botnet #Androxgh0st #Vulnerability #AWS #Microsoft #SMTP #PHP #CVE20179841 #CVE201815133 #CVE202141773 #RemoteCodeExecution #CyberAttack

Sources:

Mitre - CVE-2017-9841
Mitre - CVE-2018-15133
Mitre - CVE-2021-41773

Hackers Deploying Androxgh0st Botnet Malware that Steals AWS, Microsoft Credentials

FBI and CISA recently discovered that hackers are actively deploying Androxgh0st botnet malware that steals AWS, and Microsoft credentials.

GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation

U.S. CISA and the FBI warned of AndroxGh0st malware used to create a botnet for victim identification and exploitation in target networks.

Security Affairs
FBI: Androxgh0st malware botnet steals AWS, Microsoft credentials

CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential theft and using the stolen information to deliver additional malicious payloads.

BleepingComputer

#FBI : #Androxgh0st #マルウェア ボットネットが #AWS#Microsoft の認証情報を盗む 」: BLEEPINGCOMPUTER

「CISA と FBI は本日、Androxgh0st マルウェアを使用する攻撃者がクラウド資格情報の盗難に焦点を当てたボットネットを構築し、盗まれた情報を使用して追加の悪意のあるペイロードを配信していると警告しました。

2022 年に Racework Labs によって初めて発見された このボットネットは、PHPUnit 単体テスト フレームワーク、PHP Web フレームワーク、リモート コード実行 (RCE) の脆弱性のあるバージョンの Apache Web サーバーを使用して、Web サイトとサーバーをスキャンします。 」

https://www.bleepingcomputer.com/news/security/fbi-androxgh0st-malware-botnet-steals-aws-microsoft-credentials/

#prattohome #BLEEPINGCOMPUTER

FBI: Androxgh0st malware botnet steals AWS, Microsoft credentials

CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential theft and using the stolen information to deliver additional malicious payloads.

BleepingComputer