BeInNews Academy Ltd © Street: Suite 1701 – 02A, 17/F, 625 King’s Road, North Point. Hong Kong.
A vulnerability in Oracle WebLogic Server is being used to install malicious miners, according to Trend Micro. The vulnerability is being actively exploited to set upmining operations on unsuspecting computers.
In April 2019, Once you've bought or received bitcoins; you now need to keep them as safe as possible. This guide will provide... More notice on CVE-2019-2725 was put out by the National Vulnerability Database regarding a serious issue in the Oracle WebLogic Server component of Oracle Fusion Middleware. The versions affected are 10.3.6.00 and 188.8.131.52.0. The exploit allows attackers to access the network via HTTP to compromise the server.
According to the notice, the vulnerability allows for a takeover of Oracle WebLogic Server.
However, an investigation by Trend Micro revealed that the issue is far deeper than first thought. In fact, it was being exploited to set up Monero miners on unsuspecting systems.
The installation of these malicious miners is apparently quite easy.
First, the malware exploits CVE-2019-2725 with a specific command function which forces the system to download a certificate file and save it under %APPDATA% with the file name cert.cer. This was detected by Trend Micro as Coinminer.Win32.MALXMR.TIAOODCJ.component. Although deeply embedded and made to look like a normal Privacy-Enhanced Mail (PEM) certificate, the miner is embedded within it.
This certificate is responsible for downloading and executing files relating to the XMR miner payload, the config file for the miner, and other files.
It’s unclear how many systems were affected by this breach and how many may still be mining XMR unintentionally.
The trouble with this particular vulnerability is that it demonstrates how easy certificate files can be used to obfuscate hidden threats. For example, a certificate file can avoid detection by appearing to be “normal.” Yet, Trend Micro has now discovered that such files can easily contain malicious directives for hidden miners.
As this exploit catches on, we can likely see more hackers embed mining operations within unsuspecting certificates. The discovery is sure to cause a headache for not just Oracle, but other database management systems.
Have you ever been subject to a malicious attack which implanted a hidden miner on your system? How do you protect against it? Let us know your thoughts below.
Do you want to Be In Crypto?Join our Telegram Trading Group for FREE Trading Signals,a FREE Trading Course for Beginners and Advanced Tradersand a lot of fun! Images courtesy of Shutterstock, TradingView and Twitter.