A New Campaign of Linux Malware Exploits Oracle Weblogic for Cryptocurrency Mining

Sept 13, 2024Ravie LakshmananEnterprise Security / Vulnerability

A new campaign of malware aimed at Linux systems has been discovered by cybersecurity researchers. Its primary objective is to mine digital currency illicitly.

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

Sept 13, 2024Ravie LakshmananEnterprise Security / Vulnerability

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

A new campaign of malware aimed at Linux systems has been discovered by cybersecurity researchers. Its primary objective is to mine digital currency illicitly.

The attack specifically targets the Oracle Weblogic server and aims to distribute a malicious software named Hadooken, as stated by the cybersecurity company Aqua.

“Upon execution of Hadooken, it installs a Tsunami malware and deploys a cryptocurrency miner,” stated security analyst Assaf Moran in a recent statement.

The breach pathways capitalize on well-known security flaws and misconfigurations, such as vulnerable login details, to establish an initial presence and run unauthorized commands on vulnerable platforms.

Cybersecurity

This operation includes the simultaneous activation of two similar payloads, one coded in Python and the other as a shell script. These payloads are tasked with fetching the Hadooken malware from an external server (“89.185.85[.]102” or “185.174.136[.]204“).

“Additionally, the shell script variant scans through various folders containing SSH data (like user passwords, host specifics, and confidential data) and leverages this data to target vulnerable servers,” emphasized Morag.

“Subsequently, it moves horizontally throughout the organization or interconnected environments to further extend the reach of the Hadooken malware.”

New Linux Malware

Hadooken features two integral elements – a virtual currency miner and a network of denial-of-service bots named Tsunami (also known as Kaiten), which has a track record of targeting Jenkins and Weblogic infrastructures within Kubernetes clusters.

Moreover, the malware ensures continual presence on the system by creating cron tasks to run the cryptocurrency miner at different intervals.

Aqua highlighted that the IP address 89.185.85[.]102 is associated with Aeza International LTD (AS210644) based in Germany, with a preceding study by Uptycs in February 2024 connecting it to an 8220 Gang cryptocurrency offensive through exploiting vulnerabilities in Apache Log4j and Atlassian Confluence Server and Data Center.

Cybersecurity

The second IP address 185.174.136[.]204, currently inactive, is also associated with Aeza Group Ltd. (AS216246). As discussed in a post from July 2024 by Qurium and EU DisinfoLab, Aeza operates as a provider of uncensorable hosting services with servers in Moscow M9 and two data centers in Frankfurt.

“The operational methods of Aeza and its rapid expansion can be attributed to their recruitment of young programmers linked to uncensorable hosting providers in Russia that provide protection for cyber crimes,” stated the researchers in their report.

Enjoyed reading this piece? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.