Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » 8220 Group exploits Oracle WebLogic Server vulnerability to spread malware
    Cyber Security

    8220 Group exploits Oracle WebLogic Server vulnerability to spread malware

    techempireBy techempireNo Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportDecember 19, 2023Editorial DepartmentCryptojacking/cyber threats

    WebLogic Server Vulnerability

    Threat actors related to this 8220 Gang Malware has been observed exploiting high-severity flaws in Oracle WebLogic Server to spread its malware.

    The security flaw, CVE-2020-14883 (CVSS score: 7.2), is a remote code execution error that could be exploited by an authenticated attacker to take over a vulnerable server.

    Imperva said: “This vulnerability allows an authenticated remote attacker to execute code using a small tool chain, and is commonly associated with CVE-2020-14882 (an authentication bypass vulnerability that also affects Oracle Weblogic Server) or using a leaked, stolen or weak Credentials are associated.” in a report released last week.

    Internet security

    The 8220 gang has a history of exploiting known security vulnerabilities to spread cryptojacking malware. In early May this year, the group was discovered to have exploited another flaw in Oracle WebLogic servers (CVE-2017-3506, CVSS score: 7.4) to connect devices to a cryptocurrency mining botnet.

    The latest attack chain documented by Imperva requires exploiting CVE-2020-14883 to specifically craft an XML file and ultimately run code responsible for deploying stealer and coin-mining malware such as Agent Tesla, rhajk, and nasqa.

    Oracle Network Logic

    “The group appears to be opportunistic in selecting targets, with no clear country or industry trends,” said Daniel Johnston, a security researcher at Imperva.

    Targets of the campaign include the healthcare, telecommunications and financial services industries in the United States, South Africa, Spain, Colombia and Mexico.

    “The group relies on simple, publicly available vulnerabilities to attack well-known vulnerabilities and exploit simple targets to achieve their goals,” Johnston added. “While they are considered immature, they continue to evolve their tactics and techniques to Evade detection.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.