Healthcare, telecommunications, and financial services firms across the U.S., Mexico, Columbia, Spain, and South Africa are having their Oracle WebLogic servers vulnerable to the remote code execution flaw, tracked as CVE-202014883, targeted by the threat operation 8220 Gang to facilitate malware distribution, The Hacker News reports.
Such a vulnerability which is usually used alongside another WebLogic server bug, tracked as CVE-2020-14882 has been leveraged by 8220 Gang for XML file creation and code execution for the deployment of the Agent Tesla, nasqa, and rhajk payloads, a report from Imperva revealed. Another years-old WebLogic vulnerability, tracked as CVE-2017-3506, was previously reported to have been used by the group to enable cryptojacking malware delivery. "The group relies on simple, publicly available exploits to target well-known vulnerabilities and exploit easy targets to achieve their objectives. While considered unsophisticated, they are constantly evolving their tactics and techniques to evade detection," said Imperva security researcher Daniel Johnston.
Included in the Phobos-hit organizations that paid a ransom were a California public school system, a North Carolina children's hospital, a Maryland-based accounting and consulting service provider, and health organizations in Pennsylvania and Maryland, revealed an unsealed indictment against suspected Phobos administrator Evgenii Ptitsyn.
Attacks involving Ghost Tap commence with the compromise of payment card data and one-time passwords for virtual wallets, which are then delivered by a relay server to money mules who could withdraw the funds without being easily detected, representing a marked improvement from the previously discovered NGate attacks that required ATM withdrawals for threat actors.
Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of the SIGTRANslator Linux ELF binary, network-scanning CordScan utility, and the PingPong backdoor, according to an analysis from CrowdStrike's Counter Adversary Operations team.