Security

'Hadooken' Linux malware targets Oracle WebLogic servers

Nastyware seeks creds, mines crypto, and plants ransomware that isnt deployed - for now?


An unknown attacker is exploiting weak passwords to break into Oracle WebLogic servers and deploy an emerging Linux malware called Hadooken, according to researchers from cloud security outfit Aqua.

it is unclear if the malware is being deployed in a concerted campaign: Aqua lead data analyst Assaf Morag told The Register that his team "saw a few dozen attacks over the past couple of weeks."

WebLogic is a platform for running applications at enterprise scale, and is often present at financial services providers, e-commerce operations, and other business-critical systems. It is frequently abused as it includes various vulnerabilities.

Aqua caught the malware in a honeypot WebLogic server. The attack exploited a weak password to gain entry, then remotely executed malicious code. The first payload runs a shell script called "c" and a Python script called "y" – both of which attempted to download Hadooken.

Hadooken, likely named after an attack in the Street Fighter videogame series, contains a cryptominer and the Tsunami malware – a DDoS botnet and backdoor that gives attackers full remote control over an infected machine.

Aqua's threat hunters observed they have not seen evidence of Tsunami running, but they speculated it could be used later.

The malware also creates multiple cronjobs to maintain persistence. The shell script that starts the fun can also steal user credentials and other secrets, which attackers use to move laterally and attack other servers.

Aqua traced the downloaded Hadooken malware back to two IP addresses. One of which is associated with a UK-based hosting company. There is no suggestion the company has a role in any malware campaign.

"TeamTNT and Gang 8220 used this IP in the past but that doesn't say anything about potential attribution," Morag explained.

Aqua also wrote that its researchers’ analysis of the Hadooken binary suggests links to the RHOMBUS and NoEscape ransomware strains.

"Thus we can assume that the threat actors [are] targeting … Windows endpoints to execute a ransomware attack, but also Linux servers to target software often used by big organizations to launch backdoors and cryptominers," Morag wrote in a report about Hadooken published on Thursday. ®

Send us news
3 Comments

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Gang gobbles 15K credentials from cloud and email providers' garbage Git configs

Emeraldwhale looked sharp – until it made a common S3 bucket mistake

AWS Cloud Development Kit flaw exposed accounts to full takeover

Remember Bucket Monopoly? Yeah, it gets worse

Uncle Sam outs a Russian accused of developing Redline infostealing malware

Or: why using the same iCloud account for malware development and gaming is a bad idea

Feds investigate China's Salt Typhoon amid campaign phone hacks

'They're taunting us,' investigator says and it looks like it's working

JPMorgan Chase sues scammers following viral 'infinite money glitch'

ATMs paid customers thousands ... and now the bank wants its money back

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began

'My webcam isn't working today' is the new 'The dog ate my network'

Critical hardcoded SolarWinds credential now exploited in the wild

Another blow for IT software house and its customers