New Hadooken Malware Targets Oracle WebLogic Servers

Hadooken Malware

September 16, 2024 – Oracle WebLogic Server, a key platform for developing and managing enterprise applications, has become the latest target of a new Linux malware named “Hadooken.” This malware, discovered by Aqua Nautilus researchers, is exploiting weak admin credentials to infiltrate systems.

Malware Details

Hadooken malware is designed to exploit Oracle WebLogic servers by leveraging weak admin credentials. Once it gains access, it deploys two primary components:

  • Cryptominer: (MD5: 9bea7389b633c331e706995ed4b3999c)
  • Tsunami Malware: (MD5: 8eef5aa6fa9859c71b55c1039f02d2e6)

The attack uses shell and Python scripts to download and execute payloads, targeting non-persistent directories like /tmp.

Hadooken Malware Attack Flow

Deployment and Persistence

The cryptominer is installed as ‘/usr/bin/crondr’, ‘/usr/bin/bprofr’, and ‘/mnt/-java’, while Tsunami malware uses a random filename in /tmp. Persistence is maintained through cron jobs created in /etc/cron.<Period>/<Random String> with varying frequencies.

Lateral Movement and Evasion

Hadooken searches for SSH data in various directories and employs evasion techniques such as base64 encoding, log clearance, and process masquerading.

Associated IP Addresses and Ransomware Links

The malware is linked to IP addresses 89.185.85.102 and 185.174.136.204, which are associated with potential ransomware distribution, including Mallox (MD5: 4a12098c3799ce17d6d59df86ed1a5b6), RHOMBUS, and NoEscape. A related PowerShell script ‘b.ps1’ (MD5: c1897ea9457343bd8e73f98a1d85a38f) is used to distribute Mallox ransomware, indicating a multi-platform attack strategy.

Vulnerability Exposure

Shodan reveals over 230,000 internet-connected WebLogic servers, with several hundred exposed admin consoles vulnerable to exploitation.

Mitigation Strategies

To protect against such threats, experts recommend the following measures:

  • Use IaC scanning tools to detect misconfigurations before deployment.
  • Employ CSPM tools to scan cloud configurations for risks.
  • Scan Kubernetes clusters for misconfigurations.
  • Secure container images and Docker files.
  • Monitor runtime environments.

Conclusion

The discovery of Hadooken malware underscores the critical need for robust security measures for Oracle WebLogic servers. Organizations are urged to implement the recommended mitigation strategies to safeguard their systems from such sophisticated attacks.

Join Our WhatsApp Channel for daily updates and free resources: Click Here

Leave a Reply

Your email address will not be published. Required fields are marked *