Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger

Posted on June 26, 2025June 26, 2025 By CWS

The Androxgh0st botnet has considerably expanded its operations since 2023, with cybercriminals now compromising prestigious tutorial establishments to host their command and management infrastructure.

This refined malware marketing campaign has demonstrated outstanding persistence and evolution, focusing on a various vary of vulnerabilities throughout net functions, frameworks, and Web of Issues units to ascertain widespread community entry.

The botnet’s operators have proven specific crafty of their collection of internet hosting infrastructure, preferring to embed their malicious operations inside authentic, trusted domains.

This strategic strategy not solely supplies operational cowl but in addition exploits the inherent belief related to instructional and institutional web sites.

The selection to focus on tutorial establishments displays a calculated choice to leverage domains that usually obtain much less scrutiny from safety monitoring methods and preserve excessive popularity scores with safety distributors.

CloudSEK analysts recognized that the Androxgh0st operators efficiently compromised a College of California, San Diego subdomain, particularly “api.usarhythms.ucsd.edu,” to host their command and management logger.

Attempting to find malicious infrastructure – discovered misconfigured Logger and Command Sender panels (Supply – Cloudsek)

This specific subdomain seems to be related to the USA Basketball Males’s U19 Nationwide Staff portal, demonstrating how attackers exploit authentic however doubtlessly under-monitored institutional net properties.

The compromise represents a big escalation within the botnet’s sophistication and operational safety measures.

The malware’s assault methodology encompasses exploitation of over twenty distinct vulnerabilities, marking a fifty p.c improve in preliminary entry vectors in comparison with earlier campaigns.

These vulnerabilities span a number of expertise stacks together with Apache Shiro JNDI injection flaws, Spring Framework distant code execution vulnerabilities (Spring4Shell), WordPress plugin weaknesses, and Web of Issues system command injection vulnerabilities.

The variety of assault vectors ensures broad goal protection and maximizes the probability of profitable system compromise throughout completely different organizational environments.

Webshell Deployment and Persistence Mechanisms

The Androxgh0st operators deploy a classy arsenal of 4 distinct webshells designed for persistent entry and continued exploitation of compromised methods.

The first webshell, “abuok.php,” employs hexadecimal encoding mixed with PHP’s eval operate to execute obfuscated payloads.

The malicious code makes use of eval(hex2bin()) to decode and execute embedded instructions, whereas wrapping the payload in seemingly innocuous textual content strings to evade fundamental detection mechanisms.

error_reporting(0); eval(hex2bin(“636c617373204e7b707…”));

The “myabu.php” variant demonstrates further evasion strategies by ROT13 encoding, the place str_rot13(“riny”) produces “eval” to execute arbitrary code submitted by way of POST requests.

This encoding technique supplies a easy but efficient obfuscation layer that bypasses signature-based detection methods whereas sustaining full distant code execution capabilities.

The webshells collectively allow file add performance, code injection capabilities, and protracted backdoor entry, making certain that even when major an infection vectors are patched, the attackers preserve a number of pathways for continued system entry and exploitation.

Examine dwell malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Androxgh0st, Botnet, Exploiting, Hosting, Logger, Operators, University

Post navigation

Previous Post: British Man Suspected of Being the Hacker IntelBroker Arrested, Charged
Next Post: Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks

Related Posts

How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Attackers Can Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From Windows 11 24H2 Cyber Security News
Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Cyber Security News
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News