{"id":20247,"date":"2021-12-14T12:00:15","date_gmt":"2021-12-14T12:00:15","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20247"},"modified":"2023-03-29T19:51:02","modified_gmt":"2023-03-29T19:51:02","slug":"log4shell-exploitation-grows","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/","title":{"rendered":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat"},"content":{"rendered":"<p>Cybercriminals are quickly ramping up efforts to exploit the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/apache-log4j-zero-day-puts-servers-at-risk\/\">critical flaw found in the widely used Log4j<\/a> open-source logging tool, targeting everything from <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-cryptojacking-and-why-is-it-a-cybersecurity-risk\/\">cryptomining<\/a> to data theft to botnets that target Linux systems.<\/p>\n<p>The cybersecurity community is responding with tools for detecting exploitation of the vulnerability, a remote code execution (RCE) flaw dubbed Log4Shell and tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a>\u00a0(Apache Log4j 2.15.0 requires <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\" target=\"_blank\" rel=\"noopener\">its own fix<\/a>). Efforts include a <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" target=\"_blank\" rel=\"noopener\">Log4j emergency patch<\/a> from the Apache Software Foundation (ASF), a \u201c<a href=\"https:\/\/github.com\/Cybereason\/Logout4Shell\" target=\"_blank\" rel=\"noopener\">vaccine<\/a>\u201d released by Cybereason, a <a href=\"https:\/\/research.nccgroup.com\/2021\/12\/12\/log4j-jndi-be-gone-a-simple-mitigation-for-cve-2021-44228\/\" target=\"_blank\" rel=\"noopener\">mitigation<\/a> from NCC Group to stop Log4j from loading classes remotely over LDAP, a <a href=\"https:\/\/hub.crowdsec.net\/author\/crowdsecurity\/configurations\/apache_log4j2_cve-2021-44228\" target=\"_blank\" rel=\"noopener\">Log4j exploit detection tool<\/a> from CrowdSec, and more.<\/p>\n<p>In addition, the U.S. Cybersecurity Infrastructure and Security Agency (CISA) is continuing to put its weight behind efforts to protect enterprise systems. CISA Director Jen Easterly said in a <a href=\"https:\/\/www.cisa.gov\/news\/2021\/12\/11\/statement-cisa-director-easterly-log4j-vulnerability\" target=\"_blank\" rel=\"noopener\">statement<\/a> over the weekend that the agency has created a Joint Cyber Defense Collaboration senior leadership group to coordinate actions within the government \u2013 including the FBI and National Security Agency (NSA) \u2013 and private sector to manage the risk.<\/p>\n<p>Easterly urged federal and other government agencies as well as private companies to patch the flaw \u2013 which carries the highest severity rating \u2013 as quickly as possible.\u00a0\u201cThis vulnerability, which is being widely exploited by a growing set of threat actors, presents an urgent challenge to network defenders given its broad use,\u201d she said.<\/p>\n<p>CISA has offered <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\">guidance<\/a> for dealing with Log4j vulnerabilities and added Log4Shell to its list of <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">known exploited vulnerabilities<\/a>. CISA is also compiling a list of vulnerable products, but others have stepped up in the meantime, among them the <a href=\"https:\/\/github.com\/NCSC-NL\/log4shell\/tree\/main\/software\" target=\"_blank\" rel=\"noopener\">Dutch National Cyber Security Center<\/a> and researcher <a href=\"https:\/\/www.techsolvency.com\/story-so-far\/cve-2021-44228-log4j-log4shell\/#affected-products\" target=\"_blank\" rel=\"noopener\">Royce Williams<\/a>.<\/p>\n<p>There has been speculation that the vulnerability was behind a <a href=\"https:\/\/community.kronos.com\/s\/feed\/0D54M00004wJKHiSAO?language=en_US\" target=\"_blank\" rel=\"noopener\">massive ransomware attack<\/a> that could knock Kronos Private Cloud services offline for weeks, although the company hasn&#8217;t said that the vulnerability was a factor in the attack.<\/p>\n<p><em>Read <\/em><a href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\"><em>the latest on the Apache Log4Shell vulnerability<\/em><\/a><\/p>\n<h2><strong>A Major Threat<\/strong><\/h2>\n<p>The Log4Shell flaw \u2013 which Impacts Log4j versions 2.0 through 2.14.1\u00a0and has a CVSS severity score of 10.0 \u2013 carries with it a significant threat given the broad enterprise use of Log4j and the countless number of servers and cloud-based services that could be exposed to the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day vulnerability<\/a>. Open-source projects like ElasticSearch and Elastic Logstash also use Log4j, and the vulnerability also could affect default configurations of such Apache frameworks as Apache Struts2, Apache Druid and Apache Flink.<\/p>\n<p>Adding to the dangerousness of the flaw is the ease with which it can be exploited. Bad actors need only send a string that includes the malicious code, which then gets parsed and logged by Log4j and loaded into a server. From there, hackers can gain control of the system that is running the software, giving them a platform for launching a variety of attacks.<\/p>\n<p>\u201cBecause of its large attack surface and the innate severity of remote code execution, security researchers are notably calling this a \u2018shellshock\u2019 vulnerability,\u201d John Hammond, senior security researcher at Huntress Labs, wrote in a <a href=\"https:\/\/www.huntress.com\/blog\/rapid-response-critical-rce-vulnerability-is-affecting-java?__hstc=1139630.5aa644d3f3dafc1d7e5fa0589be98a23.1639405963889.1639405963889.1639405963889.1&amp;__hssc=1139630.2.1639405963890&amp;__hsfp=4053557&amp;hsutk=5aa644d3f3dafc1d7e5fa0589be98a23&amp;contentType=listing-page\" target=\"_blank\" rel=\"noopener\">blog post<\/a>. \u201cAll threat actors need to trigger an attack is one line of text. There\u2019s no obvious target for this vulnerability \u2013 hackers are taking a spray-and-pray approach to wreak havoc.\u201d<\/p>\n<p>Huntress created a <a href=\"https:\/\/log4shell.huntress.com\/\">tool<\/a> to help organizations test whether applications are vulnerable to Log4Shell.<\/p>\n<figure id=\"attachment_20250\" aria-describedby=\"caption-attachment-20250\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20250\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\" alt=\"How Log4j works\" width=\"900\" height=\"604\" \/><figcaption id=\"caption-attachment-20250\" class=\"wp-caption-text\">How the Log4j exploit works<\/figcaption><\/figure>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2><strong>Attacks Include Cryptomining, Data Theft<\/strong><\/h2>\n<p>According to a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> by Microsoft threat researchers, most of the attacks seen were related to mass scanning by bad actors searching for vulnerable servers as well as by security companies and researchers.<\/p>\n<p>\u201cAt the time of publication [Dec. 11], the vast majority of observed activity has been scanning, but exploitation and post-exploitation activities have also been observed,\u201d they wrote. \u201cBased on the nature of the vulnerability, once the attacker has full access and control of an application, they can perform a myriad of objectives. Microsoft has observed activities including installing coin miners, Cobalt Strike to enable credential theft and lateral movement, and exfiltrating data from compromised systems.\u201d<\/p>\n<p>The Microsoft researchers also have seen efforts by cybercriminals to evade detection. When an attacker performs an HTTP request against a targeted system, it generates a log using Log4j that uses JNDI (Java Naming and Directory Interface) to send a request to an attacker-controlled site that launches the payload. Attackers are running obfuscation efforts around the requests to bypass string-matching detections.<\/p>\n<h2><strong>Botnets Strike<\/strong><\/h2>\n<p>Researchers with Netlab, a security unit of Chinese tech giant Qihoo 360, <a href=\"https:\/\/blog.netlab.360.com\/threat-alert-log4j-vulnerability-has-been-adopted-by-two-linux-botnets\/\" target=\"_blank\" rel=\"noopener\">wrote<\/a> over the weekend that their Anglerfish and Apacket <a href=\"https:\/\/www.esecurityplanet.com\/networks\/deception-technology\/\">honeypots<\/a> detected two efforts to leverage Log4Shell to create Muhstik and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">Mirai<\/a> botnets to attack Linux devices. They also wrote that, given the broad impact of the Log4j vulnerability, they expect more bad actors to try to use it to create botnets.<\/p>\n<p>Sophos researchers <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/12\/log4shell-hell-anatomy-of-an-exploit-outbreak\/\" target=\"_blank\" rel=\"noopener\">wrote<\/a> that they have detected cryptomining efforts and \u201chundreds of thousands of attempts since December 9 to remotely execute code\u201d using the vulnerability. Other vendors, including Cisco and <a href=\"https:\/\/core.vmware.com\/vmsa-2021-0028-questions-answers-faq#sec19130-sub4\">VMware<\/a>, also have seen Log4Shell being exploited in the wild.<\/p>\n<figure id=\"attachment_20249\" aria-describedby=\"caption-attachment-20249\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20249\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Log4j-traffic-e1639420395935.png\" alt=\"Log4j attack traffic\" width=\"900\" height=\"603\" \/><figcaption id=\"caption-attachment-20249\" class=\"wp-caption-text\">Log4j attack traffic<\/figcaption><\/figure>\n<p>Researchers at Talus, Cisco\u2019s <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a> business, wrote in a blog post that they detected a lead time between mass scans from bad actors and the callbacks from vulnerable systems.<\/p>\n<p>\u201cThis may indicate that the exploit is being triggered as it makes its way through an [a]ffected enterprise\u2019s infrastructure and its processed by internal systems \u2026 that may completely separate from the intended target system.\u201d<\/p>\n<p>They added that vulnerable inspection, event collection or logging systems on the communications path also could trigger the exploit.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n<h2><strong>A Vaccine for Log4Shell<\/strong><\/h2>\n<p>Cybersecurity firms are trying to stem the rapidly rising tide of attempted exploits of the Log4j vulnerability. Beyond the ASF patch, cybersecurity firm Cybereason on Dec. 10 created a vaccine designed to disable Log4Shell and made freely <a href=\"https:\/\/github.com\/Cybereason\/Logout4Shell\" target=\"_blank\" rel=\"noopener\">available on GitHub<\/a>.<\/p>\n<p>\u201cIn short, the fix uses the vulnerability itself to set the flag that turns it off,\u201d Yonatan Striem-Amit, co-founder and CTO of Cybereason, wrote in a <a href=\"https:\/\/www.cybereason.com\/blog\/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228\" target=\"_blank\" rel=\"noopener\">blog post<\/a>. \u201cBecause the vulnerability is so easy to exploit and so ubiquitous \u2013 it\u2019s one of the very few ways to close it in certain scenarios.\u00a0You can permanently close the vulnerability by causing the server to save a configuration file, but that is a more difficult proposition. The simplest solution is to set up a server that will download and then run a class that changes the server&#8217;s configuration to not load things anymore.\u201d<\/p>\n<p>The vendor\u2019s fix \u201cwill disable the vulnerability and allow you to remain protected while you assess and update your servers,\u201d Striem-Amit wrote.<\/p>\n<p>Casey Ellis, founder and CTO of crowdsourcing security company Bugcrowd, told <em>eSecurity Planet<\/em> that as a first message, companies should be cautious about running Cybereason\u2019s vaccine on someone else\u2019s infrastructure, saying doing so could violate anti-hacking laws.<\/p>\n<p>\u201cAside from that, I quite like the \u2018chaotic good\u2019 nature of this solution, especially given the chaos organizations are experiencing in finding all of the places that Log4j might exist within their environment,\u201d Ellis said. \u201cThe script basically takes the workaround <a href=\"https:\/\/twitter.com\/MalwareTechBlog\/status\/1469289471463944198\" target=\"_blank\" rel=\"noopener\">first flagged by Marcus Hutchins<\/a>, which disables indexing and then uses the vulnerability itself to apply it. The fact that solutions like this are coming out so quickly is telling regarding the ubiquity of this vulnerability, the complexities of applying a proper patch and the sheer number of ways that it can be exploited.\u201d<\/p>\n<h2><strong>Vulnerability Surfaced in Late November<\/strong><\/h2>\n<p>According to the emerging timeline, the security team at Alibaba Cloud in late November first detected the vulnerability on servers running Minecraft and reported it to the ASF. Apache on Dec. 5 identified the vulnerability in a JIRA issue and the next day released the patch. On Dec. 9, weaponized proof-of-concept (POC) exploits began to appear, fueling a rapid increase of scanning and public exploitation the next day, <a href=\"https:\/\/www.greynoise.io\/blog\/apache-log4j-vulnerability-CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">according to GreyNoise researchers<\/a>.<\/p>\n<p>Between noon and 2 p.m. ET on Dec. 10, they saw a five-fold increase in the number of hits per sensor related to Log4Shell.<\/p>\n<p>However, a number of vendors, including Talus and Cloudflare, are reporting that the vulnerability may have been openly exploited more than a week before the first weaponized PoCs were pushed out to the public on Twitter Dec. 9, sparking the scramble of activity.<\/p>\n<p>The problem likely will only get worse, according to Andrii Bezverkhyi, founder and CEO of threat detection and intelligence company SOC Prime.<\/p>\n<p>\u201cThe problem with Log4j is that every major tech on our planet that has Java uses it and the exploit has been around since March,\u201d Bezverkhyi told <em>eSecurity Planet<\/em>. \u201cThis is worse than Zerologon; it could get as bad as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Wannacry<\/a>.\u201d<\/p>\n<p>Enterprise security teams need to work on mitigation, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\">hunt<\/a> to understand if they were breached since March, and report the status to their boards of directors for tactical and strategic support, he said.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">Best Risk Management Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f26fe578a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f26fe578a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f26fe578a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f26fe578a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f26fe578a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f26fe578a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f26fe578a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are quickly ramping up efforts to exploit the critical flaw found in the widely used Log4j open-source logging tool, targeting everything from cryptomining to data theft to botnets that target Linux systems. The cybersecurity community is responding with tools for detecting exploitation of the vulnerability, a remote code execution (RCE) flaw dubbed Log4Shell and [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20250,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15],"tags":[3351,23188],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,379],"class_list":["post-20247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","tag-apache","tag-server-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-14T12:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-29T19:51:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat\",\"datePublished\":\"2021-12-14T12:00:15+00:00\",\"dateModified\":\"2023-03-29T19:51:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\"},\"wordCount\":1525,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\",\"keywords\":[\"Apache\",\"server security\"],\"articleSection\":[\"Applications\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\",\"name\":\"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\",\"datePublished\":\"2021-12-14T12:00:15+00:00\",\"dateModified\":\"2023-03-29T19:51:02+00:00\",\"description\":\"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png\",\"width\":900,\"height\":604,\"caption\":\"How Log4j works\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet","description":"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/","og_locale":"en_US","og_type":"article","og_title":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet","og_description":"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/","og_site_name":"eSecurity Planet","article_published_time":"2021-12-14T12:00:15+00:00","article_modified_time":"2023-03-29T19:51:02+00:00","og_image":[{"width":900,"height":604,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat","datePublished":"2021-12-14T12:00:15+00:00","dateModified":"2023-03-29T19:51:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/"},"wordCount":1525,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png","keywords":["Apache","server security"],"articleSection":["Applications","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/","url":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/","name":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png","datePublished":"2021-12-14T12:00:15+00:00","dateModified":"2023-03-29T19:51:02+00:00","description":"A high-severity flaw in Apache Log4j has set off a storm of cyberattacks - and some unusual defensive tactics by security vendors.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-in-the-works-e1639421249589.png","width":900,"height":604,"caption":"How Log4j works"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20247"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20247"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20250"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20247"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20247"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20247"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}