Concerning the dangerous vulnerabilities in the Log4j 2 logging library–CVE-2021-44228, CVE-2021-45046, CVE2021-4104, and CVE-2021-42550–Doctor Web is drawing users’ attention to the need to observe protective measures. The library is used for logging in Java projects and is part of the Apache Logging Project. Vulnerabilities allow attackers to execute arbitrary code on the system and cause a Denial of Service or disclose confidential information. Even though Apache has already released several patches, vulnerabilities may still be a danger.
The most critical vulnerability, Log4Shell (CVE-2021-44228), is based on Log4j 2 log message generation. When the messages are generated in a specific way, a call to a server controlled by the attackers occurs, followed by the execution of the code.
Through these vulnerabilities, cybercriminals spread miners, which are malware for mining cryptocurrencies. They can also spread backdoors to gain remote access to a device and Trojan-DDoS that allow fraudsters to make DDoS attacks.
We record attacks using exploits for the vulnerabilities on one of our honeypots–a special server used by Doctor Web specialists as bait for fraudsters. The most active threat occurred between December 17th-20th, but attacks still continue.
The attacks are carried out from 72 different IP addresses. Talking about the distribution by country, the largest number of attacks were carried out from German IP addresses, with 21%. Russian IP addresses are slightly behind with 19.4%. USA and Chinese IP addresses are ending the top three with 9.7% for both countries.
Some projects depend directly on Log4j 2, while others have one or more implicit dependencies. One way or another, vulnerabilities affect the performance of many projects worldwide. You need to closely watch the release of software updates that use the Log4j 2 library and install them as soon as possible.
Moreover, don’t forget to update Dr.Web regularly. Our products successfully detect the payload of malware that penetrates devices through the Log4j 2 vulnerabilities.
Dr.Web
By clicking the button you agree to Privacy Policy
Unless otherwise stated, the content is available under Creative Commons BY 4.0 license
Supported by the Moscow Government
Content and Editorial:tech@ict.moscow