InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
Technology

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

September 13, 2024 3 Min Read
Share
New Linux Malware
SHARE

Cybersecurity researchers have discovered a new malware campaign targeting Linux environments for illegal cryptocurrency mining.

This campaign specifically targets Oracle Weblogic servers. HadoukenAccording to cloud security company Aqua.

“Once Hadooken is executed, it drops the Tsunami malware and deploys a cryptocurrency miner,” said security researcher Assaf Moran.

The attack chain exploits known security vulnerabilities, such as weak credentials, or misconfigurations to gain an initial foothold and then execute arbitrary code on susceptible instances.

This is achieved by launching two nearly identical payloads, one written in Python and the other in a shell script, both of which are responsible for retrieving the Hadooken malware from a remote server (either “89.185.85(.)102” or “185.174.136(.)204”).

“Additionally, the shell script version iterates through various directories containing SSH data (user credentials, host information, secrets, etc.) and attempts to use this information to attack known servers,” Morag said.

“They then move laterally within an organization or across connected environments to further spread the Hadooken malware.”

New Linux malware

Hadooken incorporates two components: a cryptocurrency miner and a distributed denial of service (DDoS) botnet called Tsunami (also known as Kaiten), which has a history of targeting Jenkins and Weblogic services deployed on Kubernetes clusters.

Additionally, the malware is responsible for establishing persistence on the host by creating a cron job that runs the cryptocurrency miner periodically at various frequencies.

Aqua notes that the IP address 89.185.85(.)102 is registered to German hosting company Aeza International LTD (AS210644), and a previous report from Uptycs in February 2024 linked it to an 8220 Gang cryptocurrency campaign exploiting flaws in Apache Log4j and Atlassian Confluence Server and Data Center.

See also  10 Best AI Accounting Tools (September 2024)

The second IP address, 185.174.136(.)204, is currently inactive but is also linked to Aeza Group Ltd. (AS216246). As noted by Qurium and EU DisinfoLab in July 2024, Aeza is a bulletproof hosting service provider based in two data centers, Moscow M9 and Frankfurt.

“Aeza’s modus operandi and rapid growth can be explained by its recruitment of young developers who have ties to a bulletproof Russian hosting provider that provides a haven for cybercrime,” the researchers said in the report.

Share This Article
Twitter Copy Link
Previous Article Roadwarden, one of the greatest RPGs of all time, releases final update Roadwarden, one of the greatest RPGs of all time, releases final update
Next Article Judge dismisses some charges in Georgia election lawsuit against Trump and others Judge dismisses some charges in Georgia election lawsuit against Trump and others
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

mm
Technology

Data-Centric AI: The Importance of Systematically Designing Training Data

10 Min Read
HTTP Headers for Credential Theft
Technology

Cybercriminals exploit HTTP headers to steal credentials through mass phishing attacks

7 Min Read
Threat Report
Technology

Top 3 insights from the Q2 2024 Threat Report

3 Min Read
Legendary sandbox game Besiege unveils roadmap packed with new features
Gaming

Legendary sandbox game Besiege unveils roadmap packed with new features

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?