

Aqua Nautilus researchers have identified a new malware targeting Oracle WebLogic servers. The malware, named Hadooken, is suspected to reference the “surge fist” attack from the Street Fighter series. When executed, it drops the Tsunami malware and deploys a cryptominer, posing a severe threat to enterprise systems. In this post, we’ll break down the malware, its attack components, and detection methods.
Oracle WebLogic Server is a Java EE application server designed for large-scale, distributed systems. It’s commonly used in industries like banking, e-commerce, and business-critical environments due to its scalability and robust support for Java technologies. However, its vulnerabilities make it a frequent target for cyberattacks.
Common vulnerabilities include:
If left unpatched, these weaknesses can lead to remote code execution (RCE), privilege escalation, and severe data breaches.
In the case of Hadooken, the attackers exploited a weak password in Aqua’s WebLogic honeypots to gain access, ultimately leading to remote code execution. Once inside, they deployed several malicious components, including the cryptomining Tsunami malware.
The attack used several well-known tactics and techniques from the MITRE ATT&CK framework:
Aqua’s honeypot environment helped expose the Hadooken malware. Their proactive approach offers insights into how security teams can detect and prevent such attacks.
Infrastructure as Code (IaC) Scanning Tools
Tools like Aqua Trivy scan IaC templates for misconfigurations before deployment, preventing vulnerabilities early in the process.
Cloud Security Posture Management (CSPM)
CSPM tools monitor cloud services (AWS, GCP, Azure) for potential misconfigurations and compliance issues, minimizing security risks.
Kubernetes Security
Tools like Kube-Bench and Aqua Trivy ensure Kubernetes clusters comply with security best practices, checking for vulnerabilities and misconfigurations.
Container Security
Aqua Trivy scans container images for vulnerabilities and hidden malware. This layer of security prevents compromised containers from infiltrating the system.
Runtime Security
Aqua Tracee monitors cloud-native environments for suspicious behavior in real time. In the case of Hadooken, Aqua’s platform detected 16 malicious incidents.
Hadooken exemplifies the increasing sophistication of malware targeting enterprise-level systems like Oracle WebLogic. By exploiting weak credentials and deploying malware components like Tsunami, attackers can compromise entire networks, resulting in financial and operational losses. Leveraging proactive security tools, such as those offered by Aqua, can help detect and mitigate these threats before they cause serious damage.
Stay vigilant and secure your infrastructure.
Click below and ‘share’ this article!
select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with a level of expertise needed for growing your business!
Copyright 2024 techprovidence