Article Details
Scrape Timestamp (UTC): 2024-09-13 17:09:00.509
Original Article Text
Click to Toggle View
New Linux malware Hadooken targets Oracle WebLogic servers. Hackers are targeting Oracle WebLogic servers to infect them with a new Linux malware named "Hadooken, which launches a cryptominer and a tool for distributed denial-of-service (DDoS) attacks. The access obtained may also be used to execute ransomware attacks on Windows systems. Researchers at container security solution company Aqua Security observed such an attack on a honeypot, which the threat actor breached due to weak credentials. Oracle WebLogic Server is an enterprise-level Java EE application server used for building, deploying, and managing large-scale, distributed applications. The product is commonly used in banking and financial services, e-commerce, telecommunications, government organizations, and public services. Attackers target WebLogic due to its popularity in business-critical environments that typically enjoy rich processing resources, making them ideal for cryptomining and DDoS attacks. Hadooken hitting hard Once the attackers breach an environment and get sufficient privileges, they download a shell script named "c" and a Python script named "y." The two scripts both drop Hadooken, but the shell code also tries to look for SSH data in various directories and uses the info to attack known servers, the researchers say. Additionally, 'c' moves laterally on the network to distribute Hadooken. Hadooken, in turn, drops and executes a cryptominer and the Tsunami malware and then sets up multiple cron jobs with randomized names and payloads execution frequencies. Tsunami is a Linux DDoS botnet malware that infects vulnerable SSH servers through brute-force attacks on weak passwords. Attackers have previously used Tsunami to launch DDoS attacks and remote control on compromised servers, while it has been seen again deployed alongside Monero miners. Aqua Security researchers highlight the practice of Hadooken renaining the malicious services as '-bash' or '-java', to mimic legitimate processes and blend with normal operations. Once this process is completed, system logs are wiped to hide the signs of malicious activity is removed, making discovery and forensic analysis harder. Static analysis of the Hadooken binary uncovered links to the RHOMBUS and NoEscape ransomware families, though no ransomware modules were deployed in the observed attacks. The researchers hypothesize that the the server access may be used to deploy ransomware under certain conditions, like after the operators carry out manual checks. It's also possible that the ability will be introduced in a future release. Furthermore, on one of the servers delivering Hadooken (89.185.85[.]102), the researchers discovered a PowerShell script that downloaded the Mallox ransomware for Windows. There are some reports that this IP address is used to disseminate this ransomware, thus we can assume that the threat actors is targeting both Windows endpoints to execute a ransomware attack, but also Linux servers to target software often used by big organizations to launch backdoors and cryptominers - Aqua Security Based on the researchers' findings using the Shodan search engine for internet-connected devices, there are more than 230,000 Weblogic servers on the public web. A comprehensive list of defense measures and mitigations is present in the final section of Aqua Security's report.
Daily Brief Summary
New Linux malware, called "Hadooken," targets Oracle WebLogic servers to deploy cryptominers and initiate DDoS attacks.
Attack leveraged due to weak credentials; attackers gain system access to potentially execute ransomware on Windows.
Oracle WebLogic is popular in critical sectors such as finance and government, attractive for its rich resources ideal for cryptomining.
Once inside the system, attackers use scripts to propagate Hadooken malware, which also tries to access SSH data and infect other servers.
The malware disguises its processes as legitimate, making detection and removal challenging, and also cleans logs to hinder forensic efforts.
Researchers noted potential links between Hadooken and known ransomware families, suggesting further malicious uses of the malware could emerge.
Over 230,000 WebLogic servers are exposed online, amplifying the potential impact of the malware attack; Aqua Security report details defensive strategies.