Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
8820 Gang targeting WebLogic

8820 Gang targeting WebLogic

Type
Campaign
Actors
8️⃣8220 Gang
Pub. date
May 16, 2023
Initial access
1-day vulnerability
Impact
Resource hijackingData exfiltration
Observed techniques
Vulnerability exploitation
Observed tools
AgentTesla
Targeted technologies
WebLogic
References
https://www.imperva.com/blog/imperva-detects-undocumented-8220-gang-activities/https://www.trendmicro.com/en_za/research/23/e/8220-gang-evolution-new-strategies-adapted.html
Status
Finalized
Last edited
Jun 2, 2024 11:53 AM

8220 Gang, a financially-motivated Chinese threat actor known for their cryptojacking activity, has been observed by researchers to be exploiting CVE-2020-14883, a remote code execution (RCE) vulnerability in Oracle WebLogic Server. The attackers seem to be exploiting the vulnerability to infect the victims with cryptojacking malware.

CVE-2020-14883 allows remote code execution for authenticated attackers through a gadget chain. This vulnerability is frequently coupled with CVE-2020-14882, an authentication bypass flaw, or exploited in conjunction with leaked, stolen, or weak credentials.

Upon successful exploitation, the attackers proceed to download specially crafted XML files that serve as a gateway for executing malicious code, culminating in the deployment of malware such as AgentTesla, designed for data theft and cryptocurrency mining.