• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic

You are here: Home / Cyber Security News / New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic

The notorious cryptocurrency miner team termed 8220 Gang has been observed applying a new crypter known as ScrubCrypt to carry out cryptojacking functions.

In accordance to Fortinet FortiGuard Labs, the attack chain commences with effective exploitation of prone Oracle WebLogic servers to download a PowerShell script that is made up of ScrubCrypt.

Crypters are a type of software that can encrypt, obfuscate, and manipulate malware with the purpose of evading detection by security programs.

ScrubCrypt, which is marketed for sale by its creator, arrives with attributes to bypass Windows Defender protections as well as verify for the presence of debugging and virtual machine environments.

“ScrubCrypt is a crypter used to secure programs with a unique BAT packing approach,” security researcher Cara Lin said in a technological report. “The encrypted data at the top can be break up into 4 elements working with backslash ‘.'”

The crypter, in the remaining stage, decodes and masses the miner payload in memory, thus launching the miner method.

The threat actor has a monitor report of taking gain of publicly disclosed vulnerabilities to infiltrate targets, and the most up-to-date findings are no distinctive.

WEBINARDiscover the Hidden Dangers of 3rd-Party SaaS Applications

Are you conscious of the threats connected with 3rd-get together app accessibility to your company’s SaaS apps? Sign up for our webinar to find out about the styles of permissions remaining granted and how to decrease risk.

RESERVE YOUR SEAT

The enhancement also will come as Sydig specific assaults mounted by the 8220 Gang between November 2022 and January 2023 that intention to breach susceptible Oracle WebLogic and Apache web servers to fall the XMRig miner.

In late January 2023, Fortinet also uncovered cryptojacking attacks that make use of Microsoft Excel documents made up of malicious VBA macros that are configured to download an executable to mine Monero (XMR) on infected devices.

Discovered this report fascinating? Comply with us on Twitter  and LinkedIn to read through additional exclusive content material we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
Next Post: US RESTRICT Act Gains Support, Empowers Biden to Ban Foreign Tech »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
  • eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.