Monday, November 25, 2024
HomecryptocurrencyHackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate...

Hackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate Files(.cer)

Published on

Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero Miner. The vulnerability is easily exploitable, any unauthenticated attacker with HTTP access to the server can attack without authentication.

Trend Micro observed a new cryptocurrency-mining activity involving the vulnerability and to hide the malicious code they used certificate files.

Malware Infection

Malware exploits CVE-2019-2725 to execute a PowerShell command to download the malicious code obfuscated in the .cer file. The PowerShell scripts download the encoded certificate file from the attacker’s server.

- Advertisement - SIEM as a Service

To decode the certificate file CertUtil is used, CertUtil is a command-line program that is installed along with Certificate Services.

Infection Chain

The extracted file update.ps1 is executed using PowerShell command, and the downloaded certificate is deleted using command.

“When we downloaded the certificate file, we noticed that it looked like a normal Privacy-Enhanced Mail (PEM) format certificate. However, upon decoding the base64 content, we found that, instead of the commonly used X.509 TLS file format, it comes in the form of the PS command,” reads Trend Micro report.

Last month another campaign leveraged the vulnerability to download Sodinokibi ransomware and to encrypt the customer’s systems.

It is recommended to patch the CVE-2019-2725 vulnerability; you can find the security alert published by Oracle and the Patch Availability here.

Indicators of Compromise

SHA-256
e4bc026aec8a76b887a8fc48726b9c48540fc2aa76eb8e61893da2ee6df6ab3a
4b9842b6be35665174c78c3e4063c645bd6e10eb333f68e4c7840fe823647bdf
c30f42e6f638f3e8218caf73c2190d2a521304431994fd6efeef523cfbaa5e81
3a567b7985b2da76db5e5a1d5554f7c13f375d88a27d6e6d108ad79e797adc9

URLs
hxxp://139[.]180[.]199[.]167:1012/clean[.]bat
hxxp://139[.]180[.]199[.]167:1012/config[.]json
hxxp://139[.]180[.]199[.]167:1012/networkservice[.]exe
hxxp://139[.]180[.]199[.]167:1012/sysguard[.]exe
hxxp://139[.]180[.]199[.]167:1012/sysupdate[.]exe
hxxp://139[.]180[.]199[.]167:1012/update[.]ps1
hxxp://45.32.28.187:1012
hxxp://45.32.28.187:1012/cert.cer
hxxps://pixeldrain[.]com/api/file/bg2Fh-d_
hxxps://pixeldrain[.]com/api/file/cGsOoTyb
hxxps://pixeldrain[.]com/api/file/cGsOoTyb/wujnEh-n1
hxxps://pixeldrain[.]com/api/file/DF1zsieq1
hxxps://pixeldrain[.]com/api/file/TyodGuTm

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...