• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new scrubcrypt crypter used in cryptojacking attacks targeting oracle weblogic

New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic

You are here: Home / General Cyber Security News / New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic
March 9, 2023

The notorious cryptocurrency miner team referred to as 8220 Gang has been noticed using a new crypter named ScrubCrypt to have out cryptojacking functions.

In accordance to Fortinet FortiGuard Labs, the attack chain commences with prosperous exploitation of prone Oracle WebLogic servers to down load a PowerShell script that has ScrubCrypt.

Crypters are a kind of program that can encrypt, obfuscate, and manipulate malware with the purpose of evading detection by security courses.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ScrubCrypt, which is advertised for sale by its author, arrives with options to bypass Windows Defender protections as properly as check out for the existence of debugging and virtual machine environments.

“ScrubCrypt is a crypter utilised to protected apps with a special BAT packing process,” security researcher Cara Lin stated in a technical report. “The encrypted data at the top rated can be split into four elements using backslash ‘.'”

ScrubCrypt Crypter

The crypter, in the closing phase, decodes and loads the miner payload in memory, thus launching the miner approach.

The menace actor has a keep track of file of using advantage of publicly disclosed vulnerabilities to infiltrate targets, and the most recent results are no diverse.

WEBINARDiscover the Hidden Dangers of 3rd-Party SaaS Applications

Are you mindful of the challenges involved with third-party app obtain to your company’s SaaS apps? Be part of our webinar to understand about the types of permissions remaining granted and how to minimize risk.

RESERVE YOUR SEAT

The enhancement also will come as Sydig thorough attacks mounted by the 8220 Gang among November 2022 and January 2023 that intention to breach vulnerable Oracle WebLogic and Apache web servers to fall the XMRig miner.

In late January 2023, Fortinet also uncovered cryptojacking attacks that make use of Microsoft Excel paperwork containing malicious VBA macros that are configured to down load an executable to mine Monero (XMR) on contaminated techniques.

Located this post intriguing? Adhere to us on Twitter  and LinkedIn to study much more unique content material we publish.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «new critical flaw in fortios and fortiproxy could give hackers New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
Next Post: The global use of collaboration solutions in hybrid working environments the global use of collaboration solutions in hybrid working environments»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.