No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

AWS, Microsoft 365 Accounts Under Active ‘Androxgh0st’ Attack

January 17, 2024
in Protection
0
AWS, Microsoft 365 Accounts Under Active 'Androxgh0st' Attack


The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued an alert about a malware campaign targeting Apache webservers and websites using the popular Laravel Web application framework, leveraging known bugs for initial compromise.

The end goal of the campaign is to steal credentials to high-profile applications such as Amazon Web Services, Microsoft 365, Twilio, and SendGrid, so the threat actors can access sensitive data in the apps or use the apps for other malicious operations.

“For example, when threat actors successfully identify and compromise AWS credentials from a vulnerable website, they have been observed attempting to create new users and user policies,” the two agencies said. In many incidents the adversaries have also used the stolen credentials to create new AWS instances for additional, malicious scanning activity, they noted.

Credential Threat & Misuse

The campaign involves a known malware threat dubbed “Androxgh0st” that Lacework first warned about in December 2022. The malware, written in Python, is designed to scan for and extract application secrets such as credentials and API keys from Laravel .env files.

Laravel is an open source PHP Web application framework that many developers use for common Web development tasks without having to write low-level code from scratch. Laravel .env files are a popular adversary target because they often contain credentials and other information that attackers can use to access and abuse high-value apps, such as AWS, Microsoft 365, and Twilo.  

Lacework identified the malware as capable of scanning for and exploiting exposed credentials and APIs and of deploying Web shells on compromised systems.

This is not the first big campaign for the malicious code; last March, Fortinet reported observing threat actors using Androxgh0st to target Laravel .env files on an average of 40,000 Fortinet devices per day.

Active Scanning for Vulnerable Websites

According to the FBI and CISA, Androxgh0st threat actors are also actively scanning for websites with specific vulnerabilities in them, particularly CVE-2017-9841, a critical remote code execution (RCE) vulnerability in PHPUnit, a module for testing PHP code.

They are exploiting the vulnerability to drop Androxgh0st and other malware on affected websites and make them part of a botnet, used to scan for and gather information on other potential targets. CVE-2017-9841 is a widely targeted vulnerability from 2017, with vendors like Imperva reporting millions of attacks on affected systems through at least early 2020.

In many instances, the Androxgh0st adversaries have also been observed scanning for Web servers running Apache HTTP Server versions 2.4.49 or 2.4.50 that are vulnerable to CVE-2021-41773, a path traversal vulnerability from 2021 that allows for RCE. CISA has previously warned about CVE-2021-41773 being among the list of vulnerabilities that China-backed threat actors tend to exploit the most in their campaigns.

The FBI and CISA alert described the threat actors as using the botnet to scan for websites using the Laravel Web application and to then determine if the domain’s root .env file is exposed.

“If the .env file is exposed, threat actors will issue a GET request to the /.env URI to attempt to access the data on the page,” the two agencies said. “Alternatively, Androxgh0st may issue a POST request to the same URI with a POST variable named 0x[] containing certain data sent to the Web server.” 

If either method elicits a successful response, the threat actors are able to look for secrets in the .env file including usernames and passwords to AWS, email accounts and other enterprise apps.

To protect against this and similar threats, CISA recommended the following best practices:

  1. Prioritize patching known exploited vulnerabilities in Internet-facing systems;

  2. Review and ensure only necessary servers and services are exposed to the Internet;

  3. And review platforms or services that have credentials listed in .env files for unauthorized access or use.



Editorial Team

Editorial Team

Related Posts

You Can Now Run a Spartan Race Using Your FSA/HSA Funds
Protection

You Can Now Run a Spartan Race Using Your FSA/HSA Funds

March 20, 2026
Firefox Is Getting a Free Built-In VPN
Protection

Firefox Is Getting a Free Built-In VPN

March 20, 2026
'Zone Zero' Cardio Isn't What It Sounds Like
Protection

‘Zone Zero’ Cardio Isn’t What It Sounds Like

March 20, 2026
In My Experience, This $460 Bidet Is Worth Every Single Penny
Protection

In My Experience, This $460 Bidet Is Worth Every Single Penny

March 19, 2026
This Ultra-Slim Roborock Vacuum/Mop Combo Is $500 Off Right Now
Protection

This Ultra-Slim Roborock Vacuum/Mop Combo Is $500 Off Right Now

March 19, 2026
Apple Is Finally Letting You Use Your Own Payment Method in Family Sharing
Protection

Apple Is Finally Letting You Use Your Own Payment Method in Family Sharing

March 19, 2026
Load More
Next Post
Condé Nast Traveler

How the Boeing 737 Max 9 Grounding Is Impacting Flights

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • How to Save on Delta Flights by Redeeming Partner Miles

    0 shares
    Share 0 Tweet 0
  • What is Terms of Trade?

    0 shares
    Share 0 Tweet 0
  • How Much Does Landscaping Cost in 2025?

    0 shares
    Share 0 Tweet 0
  • Bitcoin Traders Show Caution With Leverage As Market Uncertainty Spikes – Details

    0 shares
    Share 0 Tweet 0

Latest News

‘The money is tax-free’: I’m 76 and won $50,000 in a settlement related to cancer from nuclear waste. What should I do with it?

‘The money is tax-free’: I’m 76 and won $50,000 in a settlement related to cancer from nuclear waste. What should I do with it?

March 20, 2026
0

“The money is tax-free and does not affect our income, which comes from investments and Social Security.”

Macaulay Culkin and Brenda Song buy a new luxury home in L.A. for $10.3 million

Macaulay Culkin and Brenda Song buy a new luxury home in L.A. for $10.3 million

March 20, 2026
0

Not long after they sold their big Toluca Lake estate for $14.24 million, the couple have reportedly snagged a deal...

Crypto

SEC’s Atkins Charts New Course For Crypto Regulation In Latest Shift Toward Clarity

March 20, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure US Securities and Exchange Commission (SEC) Chair...

Novartis to buy experimental breast cancer drug in up to $3 billion deal

Novartis to buy experimental breast cancer drug in up to $3 billion deal

March 20, 2026
0

Novartis to buy experimental breast cancer drug in up to $3 billion deal

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.