Sunday, May 18, 2025
HomeCryptocurrency hackOracle Weblogic Exploit to Deploy Monero Miner

Oracle Weblogic Exploit to Deploy Monero Miner

Published on

SIEM as a Service

Follow Us on Google News

Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the compromised machine.

This critical bug allows hackers to run arbitrary commands with WebLogic server with user privileges.

The vulnerability (CVE 2017-10271) was present in the WebLogic Web Services component (wls-wsat) and due to lack of improperly user input sanitizing which allow an unauthenticated remote attacker to install and run crypto miners and hijacking their processing power to mine Monero coins makes the spike in CPU usage.

- Advertisement - Google News

The attackers begun using Chinese security researcher Lian Zhang published a proof-of-concept exploit in December, says Johannes Ullrich, dean of research for SANS Technology Institute.

Also Read: CoffeeMiner – Hacking into WiFi Networks to Inject Cryptocurrency Miners

Ullrich explains Crypto mining relies on lots of processing power generated by computers, servers, and even mobile devices, to mine cryptocurrency.

The attackers use Dropper script which checks for the Web Services while accessing the URL <HOST>/wls-wsat/CoordinatorPortType, then dropped script download the miner and executes it.intentionally kills the Weblogic service on the target.check figure

The script downloads the miner and executes it and intentionally kills the Weblogic service on the target.

The attackers using this exploit  to launch crypto miners on PeopleSoft, WebLogic app servers and Amazon cloud environments that were tied to WebLogic app servers, Ullrich says

According to Ullrich, the miner software being used in the campaign is xmrig, which is a legitimate crypto coin miner for Monero.

According to SANS threat list cryptocurrencies, miners in your network can be found out by correlating the network traffic which contains IP addresses.

Ullrich said finally “It is very likely that more sophisticated attackers used this to gain a persistent foothold on the system. In this case, the only ‘persistence’ we noticed was the CRON job. But there are many more – and more difficult to detect – ways to gain persistence.”

The indicators for this specific campaign includes:

IOCs (Indicators of Compromise)

Network

hxxp://165.227.215.25/
hxxp://165.227.215.25/xmrig-y
hxxps://165.227.215.25/xmrig-y
hxxp://165.227.215.25/java_infected
hxxp://165.227.215.25/xmrig-y%20$mName
hxxp://165.227.215.25/5555
hxxp://165.227.215.25/xmrig-aeon.exe
hxxp://165.227.215.25/xmrig-y.exe
hxxp://165.227.215.25/xmrig-y%20$
hxxp://165.227.215.25/xmrig

Hashes (MD5) Monero Miner

0e0ad37bc72453e4ec2a6029517a8edd
44d3ea4f3542f246a5535c9f114fbb09

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...