Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new Linux malware company is using Oracle Weblogic to mine cryptocurrency
Global Security

A new Linux malware company is using Oracle Weblogic to mine cryptocurrency

AdminBy AdminSeptember 13, 2024No Comments2 Mins Read
New Linux Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 13, 2024Ravi LakshmananEnterprise Security / Vulnerability

New Linux malware

Cybersecurity researchers have discovered a new malware campaign targeting Linux environments to conduct illegal cryptocurrency mining.

The activity that makes the Oracle Weblogic server stand out is to deliver duplicate malware Hadukenaccording to cloud security firm Aqua.

“When Hadooken is launched, it removes the Tsunami malware and deploys a crypto miner,” security researcher Assaf Moran said.

Attack chains exploit known security system vulnerabilities and misconfigurations, such as weak credentials, to gain initial foothold and execute arbitrary code on sensitive instances.

Cyber ​​security

This is achieved by running two almost identical payloads, one written in Python and the other a shell script, both of which are responsible for retrieving Hadooken malware from a remote server (“89.185.85(.)102“or”185.174.136(.)204“).

“Additionally, the shell script version tries to loop through various directories containing SSH data (such as user credentials, host information, and secrets) and uses this information to attack known servers,” Morag said.

“It then moves throughout the organization or connected environments to further distribute the Hadooken malware.”

New Linux malware

Hadooken comes with two components built-in: a cryptocurrency miner and a distributed denial-of-service (DDoS) botnet called Tsunami (aka Kaiten) who has a history targeting Jenkins and Weblogic services deployed in Kubernetes clusters.

Additionally, the malware is responsible for establishing security on the host by creating cron jobs periodically run the crypto miner at different frequencies.

Aqua noted that the IP address 89.185.85(.)102 is registered in Germany to the hosting company Aeza International LTD (AS210644), with preliminary report by Uptycs in February 2024, linking it to cryptocurrency company 8220 Gang by exploiting vulnerabilities in Apache Log4j and Atlassian Confluence Server and Data Center.

Cyber ​​security

A second IP address 185.174.136(.)204, while inactive, is also associated with Aeza Group Ltd. (AS216246). How highlighted Qurium and EU DisinfoLab July 2024 Aeza is a bulletproof hosting provider operating in Moscow M9 and two data centers in Frankfurt.

“Aeza’s working methods and its rapid growth can be explained by a recruitment of young developers linked to bulletproof hosting providers in Russia that offer shelter to cybercriminals,” the researchers said in a report.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.