China-linked 8220 gang exploits Oracle WebLogic bugs to deploy malware

China-linked 8220 gang exploits Oracle WebLogic bugs to deploy malware

A threat actor known as the 8220 gang, believed to be of Chinese origin, has been spotted exploiting a high-severity vulnerability in the Oracle WebLogic platform to deploy AgentTesla, rhajk and nasqa malware variants.

The said flaw is CVE-2020-14883, an improper input validation issue within the Console component in Oracle WebLogic Server, which could be exploited for remote code execution.

“This vulnerability allows remote authenticated attackers to execute code using a gadget chain and is commonly chained with CVE-2020-14882 (an authentication bypass vulnerability also affecting Oracle Weblogic Server) or the use of leaked, stolen, or weak credentials,” Imperva’s threat research team explained in a report. “The 8220 gang uses two different gadget chains: one enables the loading of an XML file, which then contains a call to the other and enables execution of commands on the OS.”

First observed in 2017, the 8220 gang has been known to target Drupal, Hadoop YARN, and Apache Struts2 applications to propagate cryptojacking malware. Most recently, Trend Micro reported the group’s use of the CVE-2017-3506 WebLogic flaw to infect targeted systems.

The group has been seen exploiting the following vulnerabilities in its attacks:

The group appears to be opportunistic when selecting their targets, with no clear trend in country or industry. It was observed targeting healthcare, telecommunications, and financial services in the US, South Africa, Spain, Columbia, and Mexico. The 8220 gang appears to use custom tools written in Python to launch their attack campaigns, and the attacking IPs (located in the US, Mexico and Russia) are associated with known hosting companies, Imperva said.

Back to the list

Latest Posts

Cyber Security Week in Review: May 30, 2025

Cyber Security Week in Review: May 30, 2025

In brief: 9,000 ASUS routers hacked in a botnet campaign, a new Russian state-backed APT discovered, and more.
30 May 2025
Chinese state-backed hackers using Google Calendar for cyberespionage

Chinese state-backed hackers using Google Calendar for cyberespionage

The attack chain begins with spear-phishing emails containing a ZIP archive hosted on the compromised site.
29 May 2025
Over 9,000 ASUS routers compromised in nation-state-like AyySSHush botnet campaign

Over 9,000 ASUS routers compromised in nation-state-like AyySSHush botnet campaign

The attackers reportedly use a mix of brute-force login attempts, authentication bypasses, and old bugs to gain persistent access.
29 May 2025