Hadooken: New Linux Malware Exploiting Oracle WebLogic Servers
Hadooken: New Linux Malware Exploiting Oracle WebLogic Servers
Introduction
In the ever-evolving landscape of cybersecurity threats, a new player has emerged: Hadooken. This Linux malware specifically targets Oracle WebLogic servers, which are widely used for running critical applications in enterprises. Let’s dive into the details.
What Is Hadooken?
Attack Vector: Hadooken gains unauthorized access to WebLogic servers by exploiting weak passwords. Once inside, it remotely executes malicious code.
Payload Components:
- A shell script named “c”
- A Python script called “y”
Cryptominer and DDoS Botnet
Hadooken doesn’t stop at infiltration. It includes:- A cryptominer: Hijacking server resources for cryptocurrency mining.
- The Tsunami malware: A DDoS botnet and backdoor, giving attackers full control.
Persistence and Lateral Movement
- Hadooken ensures persistence by creating cron jobs. It can steal user credentials, allowing lateral movement within networks. But there’s more:
- Hadooken actively searches for SSH data in various directories. This allows it to move laterally within the network, potentially compromising other servers.
- To evade detection, the malware employs several techniques:
- Base64 Encoding: By encoding its communication or payloads in base64, Hadooken obscures its intentions.
- Log Clearance: It attempts to erase traces of its activities by clearing logs.
- Process Masquerading: Hadooken disguises itself as legitimate processes, making it harder to spot.
- Associated IP addresses 89.185.85.102 and 185.174.136.204 link to potential ransomware distribution. Specifically:
- Mallox MD5: 4a12098c3799ce17d6d59df86ed1a5b6
- RHOMBUS
- NoEscape
- A related PowerShell script named ‘b.ps1’ (MD5: c1897ea9457343bd8e73f98a1d85a38f) is involved in distributing the Mallox ransomware. This indicates a multi-platform attack approach.
- Shodan reveals over 230,000 internet-connected WebLogic servers with several hundred exposed admin consoles vulnerable to exploitation.
Potential Ransomware Connection
- Hadooken’s binary hints at links to RHOMBUS and NoEscape ransomware strains.
- The threat actors seem to target both Windows endpoints and Linux servers.
- The MITRE ATT&CK framework serves as a comprehensive compendium of adversary tactics, techniques, and procedures (TTPs) employed throughout the intrusion lifecycle.
- Use the image to illustrate specific tactics or techniques discussed in this post.
Street Fighter Reference
- The name “Hadooken” pays homage to the iconic attack move from the Street Fighter video game series.
Conclusion
Stay vigilant! Regularly update passwords, monitor for suspicious activity, and follow best practices to protect your servers.
Comments
Post a Comment