Hacking News Zero-Day vulnerability in Oracle WebLogic servers

Published on June 13th, 2019 📆 | 5449 Views ⚑


Companies with Oracle WebLogic attacked with cryptocurrency malware

A group of web application security experts from Trend Micro firm have detected a hacking campaign against Oracle WebLogic Server implementations to install malicious cryptocurrency mining software. Hackers exploit a vulnerability to install the miner bypassing the detection of system administrators.

The National Vulnerability Database (NVD)
published last April the security alert regarding a severe error in the Oracle
Fusion Middleware WebLogic Server component, tracked as CVE-2019-2725. If
exploited, this flaw would allow threat actors to access the network via HTTP
to compromise the server.  

The most recent reports indicate that the flaw
is much more serious than it was thought, since its exploitation in the wild
has been demonstrated to install mining software and extract the cryptocurrency
in the attacked systems, reported the web application security experts.

Attackers exploit the vulnerability with
malware that forces the system to download a certificate file to save it in a
specific location (specialists detected this file as Coinminer.Win32.MALXMR.TIAOODCJ.Component).
In appearance this is a software certificate, but really the miner is embedded
in the file, this certificate is responsible for downloading and executing
files related to the payload of the XMR mining software.

Web application security experts mentioned that
it is not yet known exactly how many systems have been affected by the
exploitation of this vulnerability, besides the number of Oracle implementations
still mining Monero
for the attackers without knowing it.

According to specialists from the International
Institute of Cyber Security (IICS) this malicious campaign has shown how easy
it is for hackers to use certificate files to inject malicious software by
evading any protection measures.

To worsen the situation a little, experts
predict that the revelation of this vulnerability serves as a catalyst for
multiple cryptojacking campaigns using seemingly harmless certificate files, a
situation that would not only affect the administrators of Oracle
implementations, but also to other database management systems.

(Visited 2 1 times)

(function(d, s, id){
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) {return;}
js = d.createElement(s); js.id = id;
js.src = "http://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.6";
fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = 'https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2';
fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));

Source link

Download Premium WordPress Themes Free
Download Premium WordPress Themes Free
Premium WordPress Themes Download
Download WordPress Themes
free download udemy paid course

Tagged with:

Leave a Reply ✍