The 8220 Gang, a threat actor known for its involvement in cryptojacking activities, has been identified exploiting a significant vulnerability in Oracle WebLogic Server. The specific security flaw is CVE-2020-14883, a remote code execution vulnerability with a CVSS score of 7.2. This flaw allows authenticated attackers to execute code using a gadget chain and is often combined with other vulnerabilities like CVE-2020-14882 (an authentication bypass) or the use of compromised credentials.
The modus operandi of the 8220 Gang involves crafting XML files to exploit CVE-2020-14883, enabling the execution of code responsible for deploying various malware, including stealer and coin mining threats like Agent Tesla, rhajk, and nasqa. This marks a continuation of the group’s strategy, as it was previously observed leveraging another Oracle WebLogic Server vulnerability (CVE-2017-3506) in May to create a crypto mining botnet.
The attackers exhibit an opportunistic approach, targeting a range of sectors such as healthcare, telecommunications, and financial services across the U.S., South Africa, Spain, Colombia, and Mexico. Despite being considered unsophisticated, the 8220 Gang continually adapts its tactics and techniques to avoid detection, relying on easily accessible exploits for well-known vulnerabilities.
Given the group’s history and the potential impact of their activities, organizations using Oracle WebLogic Server are advised to promptly apply security patches and follow best practices to mitigate the risk of exploitation by threat actors like the 8220 Gang.