New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency (thehackernews.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 13 Sep 2024 12:03
https://sh.itjust.works/post/25130414

#cybersecurity

threaded - newest

CaptObvious@literature.cafe on 13 Sep 2024 13:12 next collapse

Would router-blocking the IP addresses provide some protection?

sylver_dragon@lemmy.world on 13 Sep 2024 16:58 collapse

Not really. IP addresses are really easy to change. And doubtless the threat actors will see that their IPs have been identified and will roll them over soon. The solution is to go after the tactics the attackers are using:

The attack chains exploit known security vulnerabilities and misconfigurations, such as weak credentials, to obtain an initial foothold and execute arbitrary code on susceptible instances.

  1. Install your updates. If you have a server open to the internet and you haven’t patched known exploited vulnerabilities, you deserve to have your network ransomed.
  2. Many products have either vendor provided or useful third party security configuration guides. While there are situations where business processes prevent some configuration changes, these guides should be followed when possible. And weak passwords should not be on that list.

EDIT: for Oracle Web Logic, you do a lot worse that going through the DoD STIG for it.

technocrit@lemmy.dbzer0.com on 13 Sep 2024 14:45 collapse

As if running oracle on linux wasn’t bad enough in itself…