With a critical vulnerability as wide-spread as Log4j, for which exploitation tactics will continue to evolve, it is not sufficient to patch and scan. Exploited systems are at risk for ransomware, data exfiltration, cryptomining, and other malicious activities perpetrated by criminal organizations and nation-state actors.Īs with previously widespread vulnerabilities – such as SolarWinds and MS Exchange – companies should respond to the Log4j vulnerability in an organized and documented fashion, understanding the potential for regulatory requests to explain their response. Authorities anticipate that threat actors’ efforts to exploit this vulnerability will grow exponentially over the coming weeks. Threat actors are actively exploiting and scanning for vulnerable systems worldwide. This is a critical vulnerability of very high significance to government and industry groups. The vulnerability allows threat actors to remotely execute code on both on-premises and cloud-based application servers, thereby obtaining control of the impacted servers. On Decema critical vulnerability (CVE-2021-44228) was reported within the Apache Log4j Java logging framework. By David Kitchen (US), Chris Cwalina (US), Anna Rudawski (US), David Kessler (US) and Will Daugherty (US) on DecemPosted in Cybercrime, Cybersecurity, Ransomware, Vendor management and transactions
0 Comments
Leave a Reply. |