Hackers Exploit Critical Oracle WebLogic Server Vulnerability by Hiding Malware in Certificate Files(.cer)

Hackers abuse Oracle WebLogic Server Vulnerability CVE-2019-2725 to deliver Monero Miner. The vulnerability is easily exploitable, any unauthenticated attacker with HTTP access to the server can attack without authentication.

Trend Micro observed a new cryptocurrency-mining activity involving the vulnerability and to hide the malicious code they used certificate files.

Malware Infection

Malware exploits CVE-2019-2725 to execute a PowerShell command to download the malicious code obfuscated in the .cer file. The PowerShell scripts download the encoded certificate file from the attacker’s server.

To decode the certificate file CertUtil is used, CertUtil is a command-line program that is installed along with Certificate Services.

Infection Chain

The extracted file update.ps1 is executed using PowerShell command, and the downloaded certificate is deleted using command.

“When we downloaded the certificate file, we noticed that it looked like a normal Privacy-Enhanced Mail (PEM) format certificate. However, upon decoding the base64 content, we found that, instead of the commonly used X.509 TLS file format, it comes in the form of the PS command,” reads Trend Micro report.

Last month another campaign leveraged the vulnerability to download Sodinokibi ransomware and to encrypt the customer’s systems.

It is recommended to patch the CVE-2019-2725 vulnerability; you can find the security alert published by Oracle and the Patch Availability here.

Indicators of Compromise



You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Guru Baran

Guru is an Ex-Security Engineer at Comodo Cybersecurity. Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Splunk Flaw Let Attackers Escalate Privilege Using crafted web Request

Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide.…

18 hours ago

Amazon Ring Employees Able to Access Every Single Camera Customer Video

California-based Ring LLC endangered its customers’ privacy by allowing any employee or contractor to see…

22 hours ago

Millions of PC Motherboard Were Sold With Backdoor Installed

Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This…

23 hours ago

Free Threat Hunting Platform Security Onion Released Updates – What’s New!

The third Beta version of Security Onion 2.4 is made available by Security Onion Solutions.…

2 days ago

Toyota Server Misconfiguration Leaks Owners Data for Over Seven Years

The Leak discloses Address, Vehicle Identification Number (VIN), Email address, Phone number, Name, and Vehicle…

2 days ago

Dark Pink APT Group Compromised 13 Organizations in 9 Countries

Dark Pink has successfully targeted 13 organizations across 9 countries, highlighting the extent of their…

3 days ago