Experts Predict Log4j Exploits to Continue Into Future

Share post:

Cybersecurity experts predict that a remote code execution vulnerability discovered in Log4j, which is currently being exploited by attackers, will persist for as long as possible. According to experts, due to its ubiquity and simplicity of exploitation, the problem will continue for months, if not years.

Sophos senior threat researcher Sean Gallagher explained that the attacks exploited the vulnerability to install coin miners and botnet. He explained, “The most recent intelligence suggests attackers are trying to exploit the vulnerability to expose the keys used by Amazon Web Service accounts. There are also signs of attackers trying to exploit the vulnerability to install remote access tools in victim networks, possibly Cobalt Strike, a key tool in many ransomware attacks.”

Other security experts also pointed out that hackers began exploiting the vulnerability almost immediately after their discovery. Chris Evans, CISO at HackerOne, said that they had received 692 reports of Log4j to 249 customer programs. Companies that had confirmed that they were vulnerable included Apple, Amazon, Twitter and Cloudflare.

For more information read the original story in ZDNet.

Featured Tech Jobs


Related articles

Cyber Security Today, Week in Review for Friday, December 1, 2023

This episode features a discussion on ransomware, the latest explanation from Okta of a support hack and a survey of infosec pros whose firms w

Cyber Security Today, Dec. 1, 2023 podcast – More on compromises

This episode reports on the sanctioning of the Sinbad crypto mixe

All Okta customer support users had their email addresses copied

Identity and access provider Okta now says the threat actor who accessed its customer help desk system last month got the names and email addresses of all contacts of organizations that use its support system. Originally, the company said that, after an investigation, it determined only one per cent of the contacts from its 18,000

Failure of technology to detect attacks is a prime cause of breaches: Survey

Despite the money being poured into cybersecurity by IT departments, the leading cause of breaches of security controls was the failure of technology to detect an attack, a new survey from Trellix suggests. Forty-two per cent of respondents to the international survey of infosec leaders whose organization had suffered a recent cyber attack said their

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways