pixel_dreams - Fotolia

Cyber criminals exploit Oracle WebLogic flaw

Researchers are urging companies to apply a security update to patch a flaw in Oracle’s WebLogic Server component that is being exploited to mine cryptocurrency

A cyber criminal campaign is deploying Monero cryptocurrency miners on hundreds of victims’ machines by exploiting a flaw in unpatched versions of Oracle’s Fusion Middleware, security researchers have warned.

The worldwide campaign is using a recently published exploit for the flaw (CVE-2017-10271), which was patched by Oracle in October 2017.

The exploit is simple to execute and comes with a Bash script to make it easy to scan for potential victims, according to Renato Marinho, security researcher at Morphus Labs.

The vulnerability affects four supported versions of Oracle Fusion Middleware –,, and – and at least one unsupported version ( for which there is no patch.

Cryptomining is a process used to generate Bitcoin, Monero and other cryptocurrencies. It requires huge amounts of computer processing power, which slows down performance.

As cryptocurrency prices have begun to skyrocket, particularly Bitcoin, cyber criminals have started using cryptominers to make money.

Often, the only indications that a machine is being hijacked to mine cryptocurrencies is reduced performance, a spike in CPU usage, or unusual increases in temperature.

However, the dropper script used to download the miner in the Monero-generating campaign accidentally kills the WebLogic service on target machines, which may have alerted some victims, Marinho wrote in a SANS ISC InfoSec Forums blog post.

The attacks appear to have begun in December after Chinese security researcher Lian Zhang published a proof-of-concept exploit, according to Johannes Ullrich, dean of research at the SANS Technology Institute.

“Lian’s post may not be the first, but this looks like the exploit that was used in the attack discussed here, and the post appears to have started an increased interest in this flaw,” he wrote in a blog post.

Read more about patching

According to Ullrich, the miner being used in the campaign is xmrig, which is a legitimate cryptocoin miner for Monero.

The exploited vulnerability affects WebLogic, but the researchers also found some PeopleSoft servers exploited in the same way.

In January alone, the researchers were able to identify 722 affected computers, with a high concentration of affected IP addresses at cloud providers.

“This isn’t a surprise since many organisations are moving their most critical data to the cloud to make it easier for the bad guys to get to it,” wrote Ullrich.

The attack does not appear to be targeted, with victims distributed worldwide, including the UK. “Once the exploit was published, anybody with limited scripting skills was able to participate in taking down WebLogic (/PeopleSoft) servers,” he wrote.

Ullrich said victims should not attempt to fix the issue by only removing the mining software and patching their server. “Your server was vulnerable to an easily executed remote code execution exploit,” he wrote. “It is very likely that more sophisticated attackers used this to gain a persistent foothold on the system.”

The researchers also warned that the WebLogic vulnerability could be exploited to do other things beyond installing a cryptocurrency miner because it enables any unauthenticated remote attacker to execute remote arbitrary commands with the privileges of the WebLogic server user.

Any WebLogic and PeopleSoft servers that have still not installed the patch could be target by attacks exploiting the flaw, the researchers warned.

“In this case, the campaign objective is to mine cryptocurrencies, but, of course, the vulnerability and exploit can be used for other purposes,” said Marinho. “Check your environment for this vulnerability and, if necessary, apply the patches as soon as possible.”

He also recommended that organisations check whether a vulnerable environment may already have been compromised by carefully analysing processes with a high and constant CPU consumption.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Hackers and cybercrime prevention

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.