Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger

Posted on June 26, 2025June 26, 2025 By CWS

The Androxgh0st botnet has considerably expanded its operations since 2023, with cybercriminals now compromising prestigious tutorial establishments to host their command and management infrastructure.

This refined malware marketing campaign has demonstrated outstanding persistence and evolution, focusing on a various vary of vulnerabilities throughout net functions, frameworks, and Web of Issues units to ascertain widespread community entry.

The botnet’s operators have proven specific crafty of their collection of internet hosting infrastructure, preferring to embed their malicious operations inside authentic, trusted domains.

This strategic strategy not solely supplies operational cowl but in addition exploits the inherent belief related to instructional and institutional web sites.

The selection to focus on tutorial establishments displays a calculated choice to leverage domains that usually obtain much less scrutiny from safety monitoring methods and preserve excessive popularity scores with safety distributors.

CloudSEK analysts recognized that the Androxgh0st operators efficiently compromised a College of California, San Diego subdomain, particularly “api.usarhythms.ucsd.edu,” to host their command and management logger.

Attempting to find malicious infrastructure – discovered misconfigured Logger and Command Sender panels (Supply – Cloudsek)

This specific subdomain seems to be related to the USA Basketball Males’s U19 Nationwide Staff portal, demonstrating how attackers exploit authentic however doubtlessly under-monitored institutional net properties.

The compromise represents a big escalation within the botnet’s sophistication and operational safety measures.

The malware’s assault methodology encompasses exploitation of over twenty distinct vulnerabilities, marking a fifty p.c improve in preliminary entry vectors in comparison with earlier campaigns.

These vulnerabilities span a number of expertise stacks together with Apache Shiro JNDI injection flaws, Spring Framework distant code execution vulnerabilities (Spring4Shell), WordPress plugin weaknesses, and Web of Issues system command injection vulnerabilities.

The variety of assault vectors ensures broad goal protection and maximizes the probability of profitable system compromise throughout completely different organizational environments.

Webshell Deployment and Persistence Mechanisms

The Androxgh0st operators deploy a classy arsenal of 4 distinct webshells designed for persistent entry and continued exploitation of compromised methods.

The first webshell, “abuok.php,” employs hexadecimal encoding mixed with PHP’s eval operate to execute obfuscated payloads.

The malicious code makes use of eval(hex2bin()) to decode and execute embedded instructions, whereas wrapping the payload in seemingly innocuous textual content strings to evade fundamental detection mechanisms.

error_reporting(0); eval(hex2bin(“636c617373204e7b707…”));

The “myabu.php” variant demonstrates further evasion strategies by ROT13 encoding, the place str_rot13(“riny”) produces “eval” to execute arbitrary code submitted by way of POST requests.

This encoding technique supplies a easy but efficient obfuscation layer that bypasses signature-based detection methods whereas sustaining full distant code execution capabilities.

The webshells collectively allow file add performance, code injection capabilities, and protracted backdoor entry, making certain that even when major an infection vectors are patched, the attackers preserve a number of pathways for continued system entry and exploitation.

Examine dwell malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Androxgh0st, Botnet, Exploiting, Hosting, Logger, Operators, University

Post navigation

Previous Post: British Man Suspected of Being the Hacker IntelBroker Arrested, Charged
Next Post: Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks

Related Posts

Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
  • Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform
  • Why Built-In Protections Aren’t Enough for Modern Data Resilience
  • CISA Warns AMI BMC Vulnerability Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
  • Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform
  • Why Built-In Protections Aren’t Enough for Modern Data Resilience
  • CISA Warns AMI BMC Vulnerability Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News