Legion: A Python-based Credential Harvester and SMTP Hijacking Tool
Legion is a new Python-based tool being sold on Telegram by cybercriminals that targets online email services for phishing and spam attacks.
According to a reserch from cybersecurity firm Cado, Legion is a modular malware likely based on the AndroxGhOst malware, with various modules to perform SMTP server enumeration, remote code execution, exploit vulnerable Apache versions, brute-force cPanel and WebHost Manager accounts, interact with Shodan’s API, and abuse AWS services.
Legion targets many services for credential theft and can create administrator users, implant webshells, and send out spam SMS to customers of U.S. carriers.
The tool uses an array of methods to retrieve credentials from misconfigured web servers, and it exploits known PHP vulnerabilities to register a webshell on the targeted endpoint or perform remote code execution to give the attacker full access to the server.
Indicators of Compromise
SHA256 |
fcd95a68cd8db0199e2dd7d1ecc4b7626532681b41654519463366e27f54e65a |
42109b61cfe2e1423b6f78c093c3411989838085d7e6a5f319c6e77b3cc462f3 |