Log4Shell attacks are spreading fast after flaw exploited

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

Days after the dangerous Log4Shell zero-day vulnerability was found in the Apache Log4j Java-based logging platform, experts have begun warning that malicious actors are already exploiting the flaw against vulnerable endpoints in various ways.

Microsoft has published a list of ways Log4Shell (tracked as CVE-2021-44228) is being used: to install malware, cryptominers, to add the devices to the Mirai and Muhstik botnets, to drop Cobalt Strike beacons, to scan for information disclosure, or for lateral movement throughout the affected network.

“At the time of publication, the vast majority of observed activity has been scanning, but exploitation and post-exploitation activities have also been observed,” the company warned in a blog post. “Microsoft has observed activities including installing coin miners, Cobalt Strike to enable credential theft and lateral movement, and exfiltrating data from compromised systems,” the company said.

Patches and workarounds

Log4Shell is a particularly dangerous type of vulnerability, as it can be used to deploy practically any code on the target device, by virtually all malicious actors, as the threshold to entry is quite low. Given how ubiquitous Apache’s Log4j is in Java applications, the number of vulnerable devices is quite big.

The exploit was first discovered after an unknown hacker published a Proof of Concept on a public GitHub repository. 

The flaw affects versions 2.0, up to 2.141, and although Apache has issued a patch, it’s now up to individual software makers to patch up their versions to make sure their customers remain safe. In the meantime, the vulnerability has already been successfully exploited on some Java 11 runtimes.

Those who are unable to patch up their versions immediately can also deploy a workaround, courtesy of security vendor Cybereason. The company’s tool, which can be found here, disables the vulnerability, giving customers the time needed to update to version 2.15.

Via: Bleeping Computer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Representational image depecting cybersecurity protection
Hackers are breaking SonicWall products to target business networks
Best free Linux firewalls
Fortinet warns a critical vulnerability in its systems could let attackers breach company networks
A person's fingers type at a keyboard, with a digital security screen with a lock on it overlaid.
Apache Foundation urges users to patch now and fix major security worries
Flag of the People's Republic of China overlaid with a technological network of wires and circuits.
One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years
A VPN runs on a mobile phone placed on a laptop keyboard
SonicWall firewalls hit by worrying cyberattack
The best free firewall
Microsoft fixes Power Pages security flaw, tells users to be on their guard
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)