SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Check Point reports rise in Androxgh0st Attacks and LockBit3 ransomware

16 May 2024

Check Point reports rise in Androxgh0st Attacks and LockBit3 ransomware
Contact company
Contact Check Point Software Technologies Inc
icon Add as a preferred source Download PDF version

Check Point® Software Technologies Ltd., an AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for April 2024. 

Androxgh0st and LockBit3 attacks

In April 2024, researchers revealed a significant increase in the use of Androxgh0st attacks, with the malware being used as a tool for stealing sensitive information using botnets. 

Meanwhile, LockBit3 remained the most prevalent ransomware group in April, despite a 55% drop in its rate of detection since the beginning of the year, with its worldwide impact reducing from 20% to 9%.

CVE-2021-3129 and CVE-2024-1709

Attackers deploy web shells for remote control while focusing on building botnets for credential theft

Researchers have been monitoring the activities of the Androxgh0st threat actor since its emergence in December 2022.

Exploiting vulnerabilities such as CVE-2021-3129 and CVE-2024-1709, attackers deploy web shells for remote control while focusing on building botnets for credential theft. This was noted in a joint Cybersecurity Advisory (CSA) issued by the FBI and CISA. 

Exploiting Laravel applications

Notably, this malware operator has been associated with the distribution of Adhublika ransomware. Androxgh0st actors have demonstrated a preference for exploiting vulnerabilities in Laravel applications to loot credentials for cloud-based services like AWS, SendGrid, and Twilio.

Recent indications suggest a shift in focus towards constructing botnets for broader system exploitation.

Double-extortion ransomware groups

Meanwhile, the Check Point Index highlights insights from "shame sites'' run by double-extortion ransomware groups posting victim information to pressure non-paying targets. LockBit3 once again tops the ranking with 9% of published attacks, followed by Play at 7%, and 8Base at 6%.

Re-entering the top three, 8Base, recently claimed they had infiltrated the United Nations IT systems and exfiltrated Human resources and procurement information.

Setbacks experienced

The data leak site was seized as part of a multi-agency campaign coined Operation Cronos

While LockBit3 remains in first place, the group has experienced several setbacks.

In February 2024, the data leak site was seized as part of a multi-agency campaign coined Operation Cronos while in May 2024, the same international law enforcement bodies published new details, identifying 194 affiliates using LockBit3 along with the unmasking and sanctioning of the pioneer of the group.

Proactive cybersecurity measures

"Our research has shown that the collective international efforts to disrupt LockBit3 appear to have been successful, reducing its worldwide impact by more than fifty percent since the start of 2024," remarks Maya Horowitz, VP of Research at Check Point Software.

"Regardless of recent positive developments, organisations must continue to prioritise their cybersecurity by being proactive and strengthening network, endpoint, and email security."

Command Injection Over HTTP

"Implementing multi-layered defenses and establishing robust backup, recovery procedures, and incident response plans is still key to boosting cyber resilience."

In 2024, the most exploited vulnerabilities globally were "Command Injection Over HTTP” and "Web Servers Malicious URL Directory Traversal," impacting 52% of organisations. These were followed by “HTTP Headers Remote Code Execution" with a global impact of 45%.

Top malware families

The arrows relate to the change in rank compared to the previous month. FakeUpdates was the most prevalent malware last month with an impact of 6% worldwide organisations, followed by Androxgh0st with a global impact of 4%, and Qbot with a global impact of 3%.

  • ↔ FakeUpdates – FakeUpdates (AKA SocGholish) is a downloader written in JavaScript. It writes the payloads to disk before launching them. FakeUpdates led to further compromise via many additional malware, including GootLoader, Dridex, NetSupport, DoppelPaymer, and AZORult.
  • ↑ Androxgh0st - Androxgh0st is a botnet that targets Windows, Mac, and Linux platforms. For initial infection, Androxgh0st exploits multiple vulnerabilities, specifically targeting- the PHPUnit, Laravel Framework, and Apache Web Server. The malware steals sensitive information such as Twilio account information, SMTP credentials, AWS key, etc. It uses Laravel files to collect the required information. It has different variants which scan for different information.
  • ↓ Qbot - Qbot AKA Qakbot is a multipurpose malware that first appeared in 2008. It was designed to steal a user’s credentials, record keystrokes, steal cookies from browsers, spy on banking activities, and deploy additional malware. Often distributed via spam email, Qbot employs several anti-VM, anti-debugging, and anti-sandbox techniques to hinder analysis and evade detection. Commencing in 2022, it emerged as one of the most prevalent Trojans.

Top exploited vulnerabilities 

In April 2024, the most exploited vulnerabilities globally were “Command Injection Over HTTP” and “Web Servers Malicious URL Directory Traversal” impacting 52% of organisations. These were followed by “HTTP Headers Remote Code Execution” with a global impact of 45%.

  • ↔ Command Injection Over HTTP (CVE-2021-43936, CVE-2022-24086) - A command Injection over HTTP vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine. 
  • ↔ Web Servers Malicious URL Directory Traversal (CVE-2010-4598, CVE-2011-2474, CVE-2014-0130, CVE-2014-0780, CVE-2015-0666, CVE-2015-4068, CVE-2015-7254, CVE-2016-4523, CVE-2016-8530, CVE-2017-11512, CVE-2018-3948, CVE-2018-3949, CVE-2019-18952, CVE-2020-5410, CVE-2020-8260) - There exists a directory traversal vulnerability On different web servers. The vulnerability is due to an input validation error in a web server that does not properly sanitise the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.
  • ↑ HTTP Headers Remote Code Execution (CVE-2020-10826, CVE-2020-10827, CVE-2020-10828, CVE-2020-1375)- HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine.

Top mobile malware

In April 2024, Anubis was in first place as the most prevalent Mobile malware, followed by AhMyth and Hiddad.

  • ↔ Anubis – Anubis is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger, audio recording capabilities, and various ransomware features. It has been detected on hundreds of different applications available in the Google Store.
  • ↔ AhMyth - AhMyth is a Remote Access Trojan (RAT) discovered in 2017. It is distributed through Android apps that can be found on app stores and various websites. When a user installs one of these infected apps, the malware can collect sensitive information from the device and perform actions such as keylogging, taking screenshots, sending SMS messages, and activating the camera, which is usually used to steal sensitive information.
  • ↑ Hiddad – Hiddad is an Android malware that repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS.

Top-attacked industries globally

In April 2024, Education/Research remained in the 1st place in the attacked industries globally, followed by Government/Military and Healthcare.

  • Education/Research
  • Government/Military
  • Healthcare

Top ransomware groups

The data is based on insights from ransomware "shame sites" run by double-extortion ransomware groups that posted victim information. Lockbit3 was the most prevalent ransomware group last month, responsible for 9% of the published attacks, followed by Play with 7% and 8Base with 6%.

  • Lockbit3 – LockBit is a ransomware, operating in a RaaS model, first reported in September 2019. LockBit targets large enterprises and government entities from various countries and does not target individuals in Russia or the Commonwealth of Independent States. Despite experiencing significant outages in February 2024 due to law enforcement action, Lockbit has resumed publishing information about its victims
  • Play - Play Ransomware, also referred to as PlayCrypt, is ransomware that first emerged in June 2022. This ransomware has targeted a broad spectrum of businesses and critical infrastructure across North America, South America, and Europe, affecting approximately 300 entities by October 2023. Play Ransomware typically gains access to networks through compromised valid accounts or by exploiting unpatched vulnerabilities, such as those in Fortinet SSL VPNs. Once inside, it employs techniques like using living-off-the-land binaries (LOLBins) for tasks such as data exfiltration and credential theft.
  • Base – The 8Base threat group is a ransomware gang that has been active since at least March 2022. It gained significant notoriety in mid-2023 due to a notable increase in its activities. This group has been observed using a variety of ransomware variants, with Phobos being a common element. 8Base operates with a level of sophistication, evidenced by their use of advanced techniques in their ransomware. The group's methods include double extortion tactics.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Healthcare security
  • Security management
  • Security cameras
  • Security monitoring system
  • Network monitoring
  • Network cameras
  • Integration software
  • Cyber security
  • Data Security
  • Network Video Recorders
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • Related links
  • ANPR Software CCTV software
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Corporate news
About this page

Discover insights on rising Androxgh0st attacks and LockBit3 ransomware trends from Check Point's 2024 Global Threat Index. Equip your business with knowledge on prevalent cybersecurity threats and proactive measures.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec