The threat actor recognized as “8220 Gang” has been connected with a new payload targeting an exploitable Oracle Weblogic Server in a certain Uniform Source Identifier (URI).
The payload, analyzed by Fortinet security researchers, is characterised by the extraction of ScrubCrypt, a type of malware built to obfuscate and encrypt purposes with the intention of evading detection by security packages.
“We analyzed the malware injected into a victim’s technique and, as element of our analysis, recognized the risk actor as 8220 Gang applying gathered indicators,” wrote Fortinet senior antivirus analyst Cara Lin in Wednesday’s advisory. “This mining group initial appeared in 2017. The title ‘8220’ will come from its initial use of port 8220 for network communications.”

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
According to Lin, ScrubCrypt has currently been current at the very least once. Its creators promise the malware can bypass Windows Defender and supply anti-debug and some bypass capabilities.
“We collected numerous ScrubCrypt samples in February, and each payload is a minor distinct,” the malware analyst wrote, introducing that the attacks noticed by Fortinet transpired involving January and February 2023.
More, the security skilled mentioned that equally the crypto wallet handle made use of in these attacks and the server IP tackle made use of in Monero miner experienced been used by the 8220 Gang in the previous, building the backlink to the threat group achievable (even with the port amount utilised for attacks no for a longer time staying 8220).
“8220 Gang is a properly-known miner group that ordinarily leverages public file-sharing sites and targets method vulnerabilities to infiltrate a victim’s setting,” Lin included.
“Within a quite quick time, it has progressed to use a more recent crypter variant [that] involves evasion and encryption features, producing it harder for antivirus programs to detect 8220 Gang activity. End users ought to be aware of this up-to-date crypter and continue to keep their methods patched.”
The risk actor’s activity was also noticed by Microsoft very last year, with the tech big issuing a warning in opposition to the 8220 Gang in July 2022.
Editorial image credit: max.ku / Shutterstock.com
Some areas of this short article are sourced from:
www.infosecurity-journal.com