Categories: Cyber Security News

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger

The Androxgh0st botnet has significantly expanded its operations since 2023, with cybercriminals now compromising prestigious academic institutions to host their command and control infrastructure.

This sophisticated malware campaign has demonstrated remarkable persistence and evolution, targeting a diverse range of vulnerabilities across web applications, frameworks, and Internet of Things devices to establish widespread network access.

The botnet’s operators have shown particular cunning in their selection of hosting infrastructure, preferring to embed their malicious operations within legitimate, trusted domains.

This strategic approach not only provides operational cover but also exploits the inherent trust associated with educational and institutional websites.

The choice to target academic institutions reflects a calculated decision to leverage domains that typically receive less scrutiny from security monitoring systems and maintain high reputation scores with security vendors.

CloudseeK analysts identified that the Androxgh0st operators successfully compromised a University of California, San Diego subdomain, specifically “api.usarhythms.ucsd.edu,” to host their command and control logger.

Hunting for malicious infrastructure – found misconfigured Logger and Command Sender panels (Source – Cloudsek)

This particular subdomain appears to be associated with the USA Basketball Men’s U19 National Team portal, demonstrating how attackers exploit legitimate but potentially under-monitored institutional web properties.

The compromise represents a significant escalation in the botnet’s sophistication and operational security measures.

The malware’s attack methodology encompasses exploitation of over twenty distinct vulnerabilities, marking a fifty percent increase in initial access vectors compared to previous campaigns.

These vulnerabilities span multiple technology stacks including Apache Shiro JNDI injection flaws, Spring Framework remote code execution vulnerabilities (Spring4Shell), WordPress plugin weaknesses, and Internet of Things device command injection vulnerabilities.

The diversity of attack vectors ensures broad target coverage and maximizes the likelihood of successful system compromise across different organizational environments.

Webshell Deployment and Persistence Mechanisms

The Androxgh0st operators deploy a sophisticated arsenal of four distinct webshells designed for persistent access and continued exploitation of compromised systems.

The primary webshell, “abuok.php,” employs hexadecimal encoding combined with PHP’s eval function to execute obfuscated payloads.

The malicious code utilizes eval(hex2bin()) to decode and execute embedded commands, while wrapping the payload in seemingly innocuous text strings to evade basic detection mechanisms.

error_reporting(0); eval(hex2bin("636c617373204e7b707..."));

The “myabu.php” variant demonstrates additional evasion techniques through ROT13 encoding, where str_rot13("riny") produces “eval” to execute arbitrary code submitted via POST requests.

This encoding method provides a simple yet effective obfuscation layer that bypasses signature-based detection systems while maintaining full remote code execution capabilities.

The webshells collectively enable file upload functionality, code injection capabilities, and persistent backdoor access, ensuring that even if primary infection vectors are patched, the attackers maintain multiple pathways for continued system access and exploitation.

rssfeeds-admin

Recent Posts

Red Dead Redemption 2 Overtakes Wii Sports in Best-Selling Games of All Time List

All eyes are on GTA 6, but Red Dead Redemption 2 continues its remarkable success,…

35 minutes ago

Take-Two Says All Entertainment Properties Need Pre-Release Marketing, as the Wait for GTA 6 Trailer 3 Goes On

GTA 6 has gone a whole year without the release of a new trailer. It…

35 minutes ago

GTA 6 November 2026 Release Date Is Happening, Take-Two Boss Says, Pouring Cold Water on Delay Fears

GTA 6 will launch on November 19, 2026, Take-Two has said, reaffirming the announced release…

36 minutes ago

Lupita Nyong’o Responds to Backlash Over Helen of Troy Casting in The Odyssey

“The criticism will exist whether I engage with it or not,” actress Lupita Nyong’o has…

36 minutes ago

Critical Chrome Vulnerabilities Enable Remote Code Execution Attacks – Patch Now!

Google has released an urgent security update for Chrome, addressing 16 vulnerabilities including two rated…

1 hour ago

Authorities Have Taken Down “First VPN” Used in Ransomware Attacks

In a major international law enforcement success, authorities from seven countries dismantled First VPN, a…

1 hour ago

This website uses cookies.