AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

Share:

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware.

“This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures,” CloudSEK said in a new report.

AndroxGh0st is the name given to a Python-based cloud attack tool that’s known for its targeting of Laravel applications with the goal of sensitive data pertaining to services like Amazon Web Services (AWS), SendGrid, and Twilio.

Active since at least 2022, it has previously leveraged flaws in the Apache web server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to gain initial access, escalate privileges, and establish persistent control over compromised systems.

Earlier this January, U.S. cybersecurity and intelligence agencies revealed that attackers are deploying the AndroxGh0st malware to create a botnet for “victim identification and exploitation in target networks.”

The latest analysis from CloudSEK reveals a strategic expansion of the targeting focus, with the malware now exploiting an array of vulnerabilities for initial access –

  • CVE-2014-2120 (CVSS score: 4.3) – Cisco ASA WebVPN login page XSS vulnerability
  • CVE-2018-10561 (CVSS score: 9.8) – Dasan GPON authentication bypass vulnerability
  • CVE-2018-10562 (CVSS score: 9.8) – Dasan GPON command injection vulnerability
  • CVE-2021-26086 (CVSS score: 5.3) – Atlassian Jira path traversal vulnerability
  • CVE-2021-41277 (CVSS score: 7.5) – Metabase GeoJSON map local file inclusion vulnerability
  • CVE-2022-1040 (CVSS score: 9.8) – Sophos Firewall authentication bypass vulnerability
  • CVE-2022-21587 (CVSS score: 9.8) – Oracle E-Business Suite (EBS) Unauthenticated arbitrary file upload vulnerability
  • CVE-2023-1389 (CVSS score: 8.8) – TP-Link Archer AX21 firmware command injection vulnerability
  • CVE-2024-4577 (CVSS score: 9.8) – PHP CGI argument injection vulnerability
  • CVE-2024-36401 (CVSS score: 9.8) – GeoServer remote code execution vulnerability

“The botnet cycles through common administrative usernames and uses a consistent password pattern,” the company said. “The target URL redirects to /wp-admin/, which is the backend administration dashboard for WordPress sites. If the authentication is successful, it gains access to critical website controls and settings.”

AndroxGh0st Malware

The attacks have also been observed leveraging unauthenticated command execution flaws in Netgear DGN devices and Dasan GPON home routers to drop a payload named “Mozi.m” from different external servers (“200.124.241[.]140” and “117.215.206[.]216”).

Mozi is another well-known botnet that has a track record of striking IoT devices to co-opt them into a malicious network for conducting distributed denial-of-service (DDoS) attacks.

While the malware authors were arrested by Chinese law enforcement officials in September 2021, a precipitous decline in Mozi activity wasn’t observed until August 2023, when unidentified parties issued a kill switch command to terminate the malware. It’s suspected that either the botnet creators or Chinese authorities distributed an update to dismantle it.

AndroxGh0st’s integration of Mozi has raised the possibility of a possible operational alliance, thereby allowing it to propagate to more devices than ever before.

“AndroxGh0st is not just collaborating with Mozi but embedding Mozi’s specific functionalities (e.g., IoT infection and propagation mechanisms) into its standard set of operations,” CloudSEK said.

“This would mean that AndroxGh0st has expanded to leverage Mozi’s propagation power to infect more IoT devices, using Mozi’s payloads to accomplish goals that otherwise would require separate infection routines.”

“If both botnets are using the same command infrastructure, it points to a high level of operational integration, possibly implying that both AndroxGh0st and Mozi are under the control of the same cybercriminal group. This shared infrastructure would streamline control over a broader range of devices, enhancing both the effectiveness and efficiency of their combined botnet operations.”

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:32 pm, May 9, 2025
weather icon 18°C
L: 16° | H: 18°
clear sky
Humidity: 37 %
Pressure: 1020 mb
Wind: 10 mph SE
Wind Gust: 17 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 3%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:17 am
Sunset: 8:35 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
16° | 18°°C 0 mm 0% 12 mph 63 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 20°°C 0 mm 0% 12 mph 86 % 1021 mb 0 mm/h
Sun May 11 10:00 pm
weather icon
11° | 23°°C 0.94 mm 94% 12 mph 86 % 1015 mb 0 mm/h
Mon May 12 10:00 pm
weather icon
12° | 21°°C 0.97 mm 97% 11 mph 95 % 1016 mb 0 mm/h
Tue May 13 10:00 pm
weather icon
13° | 21°°C 0.46 mm 46% 11 mph 77 % 1022 mb 0 mm/h
Today 1:00 pm
weather icon
17° | 18°°C 0 mm 0% 12 mph 37 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
17° | 18°°C 0 mm 0% 11 mph 36 % 1020 mb 0 mm/h
Today 7:00 pm
weather icon
15° | 16°°C 0 mm 0% 9 mph 39 % 1020 mb 0 mm/h
Today 10:00 pm
weather icon
12° | 12°°C 0 mm 0% 8 mph 63 % 1022 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 4 mph 86 % 1020 mb 0 mm/h
Tomorrow 7:00 am
weather icon
11° | 11°°C 0 mm 0% 6 mph 79 % 1020 mb 0 mm/h
Tomorrow 10:00 am
weather icon
17° | 17°°C 0 mm 0% 8 mph 47 % 1020 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,898.05
3.86%
Ethereum(ETH)
€2,103.79
21.39%
Tether(USDT)
€0.89
-0.03%
XRP(XRP)
€2.15
9.65%
Solana(SOL)
€155.70
13.51%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.187150
14.68%
Shiba Inu(SHIB)
€0.000014
15.72%
Pepe(PEPE)
€0.000012
41.65%
Peanut the Squirrel(PNUT)
€0.246319
61.39%
Scroll to Top