- Androxgh0st’s integration with Mozi increases global risks
- IoT vulnerabilities are the new battleground for cyber attacks
- Proactive monitoring is essential to combat emerging botnet threats
Researchers recently identified a major evolution in the Androxgh0st botnet, which has become more dangerous by integrating the Mozi botnet’s capabilities.
What started as a web server-targeted attack in early 2024 has now expanded, allowing Androxgh0st to exploit vulnerabilities in IoT devices. CloudSEK’s Threat Research team has said.
The latest report claims that the botnet is now equipped with Mozi’s advanced techniques for infecting and spreading across a wide range of network devices.
The revival of Mozi: a unified botnet infrastructure
Mozi, previously known for infecting IoT devices such as Netgear and D-Link routers, was believed to be inactive after a killswitch activation in 2023.
However, CloudSEK has revealed that Androxgh0st has integrated Mozi’s propagation capabilities, significantly increasing its potential to target IoT devices.
By deploying Mozi payloads, Androxgh0st now has a unified botnet infrastructure that uses specialized tactics to infiltrate IoT networks. This merger allows the botnet to spread more efficiently through vulnerable devices, including routers and other connected technology, making it a more formidable force.
In addition to the integration with Mozi, Androxgh0st has expanded its set of targeted vulnerabilities, exploiting weaknesses in critical systems. CloudSEK’s analysis shows that Androxgh0st is now actively attacking major technologies, including Cisco ASA, Atlassian JIRA, and several PHP frameworks.
In Cisco ASA systems, the botnet exploits cross-site scripting (XSS) vulnerabilities, injecting malicious scripts via unspecified parameters. It also targets Atlassian JIRA with a path traversal vulnerability (CVE-2021-26086), which could allow attackers to gain unauthorized access to sensitive files. In PHP frameworks, Androxgh0st takes advantage of older vulnerabilities such as those in Laravel (CVE-2018-15133) and PHPUnit (CVE-2017-9841), facilitating backdoor access to compromised systems.
Androxgh0st’s threat landscape is not limited to older vulnerabilities. It is also capable of exploiting newly discovered vulnerabilities such as CVE-2023-1389 in TP-Link Archer AX21 firmware, which allows unauthenticated command execution, and CVE-2024-36401 in GeoServer, a vulnerability that can lead to execution of external code. .
The botnet now also uses brute force credential stuffing, command injection, and file capture techniques to compromise systems. By leveraging Mozi’s IoT-focused tactics, it has significantly expanded its geographic impact, spreading infections across regions in Asia, Europe, and beyond.
CloudSEK recommends that organizations strengthen their security posture to mitigate potential attacks. While immediate patching is essential, proactive monitoring of network traffic is also important. By monitoring suspicious outbound connections and detecting anomalous login attempts, especially from IoT devices, organizations can spot early signs of a partnership between Androxgh0st and Mozi.