Sunday, December 31, 2023
HomeCyber Security8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Unfold Malware

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Unfold Malware


î ‚Dec 19, 2023î „NewsroomCryptojacking / Cyber Menace

The risk actors related to the 8220 Gang have been noticed exploiting a high-severity flaw in Oracle WebLogic Server to propagate their malware.

The safety shortcoming is CVE-2020-14883 (CVSS rating: 7.2), a distant code execution bug that may very well be exploited by authenticated attackers to take over inclined servers.

“This vulnerability permits distant authenticated attackers to execute code utilizing a gadget chain and is usually chained with CVE-2020-14882 (an authentication bypass vulnerability additionally affecting Oracle Weblogic Server) or the usage of leaked, stolen, or weak credentials,” Imperva mentioned in a report revealed final week.

Cybersecurity

The 8220 Gang has a historical past of leveraging identified safety flaws to distribute cryptojacking malware. Earlier this Might, the group was noticed using one other shortcoming in Oracle WebLogic servers (CVE-2017-3506, CVSS rating: 7.4) to rope the units right into a crypto mining botnet.

Current assault chains documented by Imperva entail the exploitation of CVE-2020-14883 to specifically craft XML information and in the end run code answerable for deploying stealer and coin mining malware similar to Agent Tesla, rhajk, and nasqa.

Oracle WebLogic

“The group seems to be opportunistic when deciding on their targets, with no clear pattern in nation or trade,” Imperva safety researcher Daniel Johnston mentioned.

Targets of the marketing campaign embrace healthcare, telecommunications, and monetary companies sectors within the U.S., South Africa, Spain, Columbia, and Mexico.

“The group depends on easy, publicly obtainable exploits to focus on well-known vulnerabilities and exploit straightforward targets to attain their goals,” Johnston added. “Whereas thought of unsophisticated, they’re continually evolving their ways and methods to evade detection.”

Discovered this text fascinating? Comply with us on Twitter ï‚™ and LinkedIn to learn extra unique content material we submit.





Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments