Fix yesterday: ransomware software detects the Oracle WebLogic flaw to install without users clicking



[ad_1]

Credit: ID 92722392 © Aleksandr Velichko | Dreamstime.com

A critical flaw affecting Oracle WebLogic Server for which Oracle proposed a patch last week is now for the installation of a new variety of ransomware called Sodinokibi.

This nasty ransomware software aims to encrypt a computer's directory and compromise recovery by removing shadow backups, according to Cisco's Talos Intelligence researchers.

Last Friday, Oracle released an emergency fix for the WebLogic zero-day vulnerability and is now tracking the bug under the name CVE-2019-2725. The deserialization flaw, reported for the first time by Known Sec 404 researchers, can be used by attackers to execute remote commands without requiring valid identification information.

"Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this security alert as soon as possible," Oracle told WebLogic administrators last Friday, two months before the next scheduled release. critical patch updates.

At the time of the release of the patch, it was not known that the flaw was being used to install the Sodinokibi ransomware software. However, Talos researchers now say that the first stage of the attack took place a day before the Oracle patch. According to Talos, this attack resulted in the encryption of certain client files.

[ad_2]

Source link