The notorious cryptojacking team tracked as 8220 Gang has been spotted weaponizing a six-year-aged security flaw in Oracle WebLogic servers to ensnare vulnerable situations into a botnet and distribute cryptocurrency mining malware.
The flaw in problem is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could permit an unauthenticated attacker to execute arbitrary commands remotely.
“This allows attackers to obtain unauthorized entry to sensitive data or compromise the full process,” Craze Micro researcher Sunil Bharti explained in a report posted this week.
8220 Gang, very first documented by Cisco Talos in late 2018, is so named for its first use of port 8220 for command-and-regulate (C2) network communications.
“8220 Gang identifies targets by using scanning for misconfigured or vulnerable hosts on the community internet,” SentinelOne noted previous year. “8220 Gang is recognised to make use of SSH brute force assaults write-up-infection for the uses of lateral motion inside of a compromised network.”
Before this yr, Sydig in-depth assaults mounted by the “minimal-skill” crimeware group concerning November 2022 and January 2023 that intention to breach susceptible Oracle WebLogic and Apache web servers and deploy a cryptocurrency miner.
It has also been noticed generating use of an off-the-shelf malware downloader identified as PureCrypter as effectively as a crypter codenamed ScrubCrypt to conceal the miner payload and evade detection by security application.
In the newest attack chain documented by Development Micro, the Oracle WebLogic Server vulnerability is leveraged to deliver a PowerShell payload, which is then made use of to build a different obfuscated PowerShell script in memory.
This freshly established PowerShell script disables Windows Antimalware Scan Interface (AMSI) detection and launches a Windows binary that subsequently reaches out to a remote server to retrieve a “meticulously obfuscated” payload.
Forthcoming WEBINARLearn to Halt Ransomware with True-Time Protection
Join our webinar and study how to cease ransomware attacks in their tracks with authentic-time MFA and provider account protection.
Help you save My Seat!
The intermediate DLL file, for its component, is configured to down load a cryptocurrency miner from a person of the a few C2 servers – 179.43.155[.]202, function.letmaker[.]major, and su-94.letmaker[.]prime – applying TCP ports 9090, 9091, or 9092.
Craze Micro said current attacks have also entailed the misuse of a authentic Linux software known as lwp-obtain to preserve arbitrary documents on the compromised host.
“lwp-obtain is a Linux utility existing in a selection of platforms by default, and 8220 Gang producing this a portion of any malware schedule can have an affect on a amount of products and services even if it were being reused much more than once,” Bharti stated.
“Taking into consideration the threat actor’s tendency to reuse resources for distinctive strategies and abuse legit equipment as aspect of the arsenal, organizations’ security teams may be challenged to find other detection and blocking alternatives to fend off attacks that abuse this utility.”
Uncovered this post fascinating? Stick to us on Twitter and LinkedIn to examine additional unique content material we write-up.
Some parts of this article are sourced from:
thehackernews.com