{"id":20269,"date":"2021-12-16T20:00:03","date_gmt":"2021-12-16T20:00:03","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20269"},"modified":"2021-12-23T19:06:10","modified_gmt":"2021-12-23T19:06:10","slug":"nation-state-ransomware-groups-apache-log4j","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/","title":{"rendered":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw"},"content":{"rendered":"<p>Nation-state cyber threat groups and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attackers are moving in to exploit a critical flaw found in the seemingly ubiquitous Apache Log4j open-source logging tool, as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\">attacks spread<\/a> just days after the vulnerability that could affect hundreds of millions of devices was <a href=\"https:\/\/www.esecurityplanet.com\/threats\/apache-log4j-zero-day-puts-servers-at-risk\/\">made public late last week<\/a>.<\/p>\n<p>Microsoft researchers <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> that the remote code execution (RCE) vulnerability is being exploited by nation-state groups associated with China, North Korea, Iran and Turkey, with the activity that includes \u201cexperimentation during development, integration of the vulnerability to in-the-wild <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">payload<\/a> deployment, and exploitation against targets to achieve the actor\u2019s objectives.\u201d<\/p>\n<p>The vulnerability can be abused to enable an attacker to gain control of a targeted system.<\/p>\n<p>Two of the known groups include Phosphorous from Iran and Hafnium from China. According to Microsoft, Phosphorous has been deploying ransomware and acquiring and making modifications to the Log4j exploit. In addition, Hafnium \u201chas been observed utilizing the vulnerability to attack virtualization infrastructure to extend their typical targeting,\u201d the researchers wrote in the blog post. \u201cIn these attacks, HAFNIUM-associated systems were observed using a DNS service typically associated with testing activity to fingerprint systems.\u201d<\/p>\n<h2>Log4j Patching, Scanning Success Reported<\/h2>\n<p><strong>Update:<\/strong> In one positive and unexpected development, external attack surface management company Cyberpion reported that enterprises are patching the Log4j vulnerabilities unusually fast, if imperfectly.<\/p>\n<p>Meanwhile, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a <a href=\"https:\/\/github.com\/cisagov\/log4j-scanner\" target=\"_blank\" rel=\"noopener\">scanning tool<\/a> to &#8220;help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.&#8221;<\/p>\n<p>Cyberpion scanned more than 500 enterprises to assess their exposure to the flaw in relation to their connected, third-party online assets and infrastructures. The vast majority (95%) of organizations were connected to external vulnerable infrastructure, yet while 3% of their third-party assets were exposed as of Dec 11th, this had fallen to just 0.11% as of Dec. 16.<\/p>\n<p>To quickly block the attack, firewall rules were added by many security teams, though some could easily be bypassed with slightly more sophisticated payloads, indicating that many vulnerabilities still exist and can still be exploited, the company said.<\/p>\n<figure id=\"attachment_20283\" aria-describedby=\"caption-attachment-20283\" style=\"width: 908px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20283\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/log4j-patching-speed.png\" alt=\"log4j patching speed\" width=\"908\" height=\"442\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/log4j-patching-speed.png 908w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/log4j-patching-speed-300x146.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/log4j-patching-speed-768x374.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/log4j-patching-speed-150x73.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/log4j-patching-speed-696x339.png 696w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><figcaption id=\"caption-attachment-20283\" class=\"wp-caption-text\">Log4j patching speed (source: Cyberpion)<\/figcaption><\/figure>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n<h2><strong>Expanding Log4j Attacks<\/strong><\/h2>\n<p>At the same time, cybersecurity professionals are reporting that bad actors are expanding the range of attacks they\u2019re launching against the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day<\/a> Log4j exploit, which is being tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a> and has been dubbed Log4Shell. <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" target=\"_blank\" rel=\"noopener\">Apache is tracking vulnerabilities<\/a> as they emerge, and VMware has issued <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0028.html\" target=\"_blank\" rel=\"noopener\">its own advisory<\/a>.<\/p>\n<p>Bitdefender researchers wrote in a <a href=\"https:\/\/businessinsights.bitdefender.com\/technical-advisory-zero-day-critical-vulnerability-in-log4j2-exploited-in-the-wild\" target=\"_blank\" rel=\"noopener\">blog post<\/a> that early exploit attempts have involved <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-cryptojacking-and-why-is-it-a-cybersecurity-risk\/\">cryptojacking<\/a> and botnets, such as the Muhstik botnet.<\/p>\n<p>However, while most of the attacks seen are targeting Linux servers, there are emerging attacks aimed at Windows systems, including a new ransomware family called Khonsari, which was first observed Dec. 11 as a malicious .NET binary file.<\/p>\n<p>Microsoft researchers also wrote that multiple groups acting as access brokers are using Log4Shell to gain initial access to target networks and then \u201csell access to these networks to ransomware-as-a-service affiliates. We have observed these groups attempting exploitation on both Linux and Windows systems, which may lead to an increase in human-operated ransomware impact on both of these operating system platforms.\u201d<\/p>\n<p>Like Bitdefender, Microsoft also has seen the flaw absorbed into existing botnets, such as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">Mirai<\/a>.<\/p>\n<p>Greg Linares, principal software architect at Cylance, said in a <a href=\"https:\/\/twitter.com\/Laughing_Mantis\/status\/1470165580736987137\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that he expects a worm to be developed within the next day or so that leverages the Log4j flaw.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2><strong>Escalation of Exploit Attempts<\/strong><\/h2>\n<p>Overall, the pace and range of attacks are growing rapidly. Security researchers at Check Point Software in a <a href=\"https:\/\/blog.checkpoint.com\/2021\/12\/13\/the-numbers-behind-a-cyber-pandemic-detailed-dive\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> said that after the first weaponized proof-of-concepts (POCs) illustrating the vulnerability hit the internet on Dec. 9, there were reports of thousands of attacks the next day, expanding to more than 800,000 attacks after 72 hours.<\/p>\n<p>Since Check Point began implementing its protection, the company in three days had prevented more than 1.8 million attempts to \u201callocate the vulnerability,\u201d with more than 46 percent of the attempts being made by known malicious groups, they wrote.<\/p>\n<p>There have been attempted exploits of the Log4j vulnerability on more than 44 percent of all corporate networks worldwide, according to Check Point.<\/p>\n<p>\u201cThree days after the outbreak, we are summing up what we see until now, which is clearly a cyber pandemic that hasn\u2019t seen its peak yet,\u201d they wrote.<\/p>\n<figure id=\"attachment_20273\" aria-describedby=\"caption-attachment-20273\" style=\"width: 849px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20273\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\" alt=\"Log4j attacks\" width=\"849\" height=\"549\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png 849w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph-300x194.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph-768x497.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph-150x97.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph-696x450.png 696w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><figcaption id=\"caption-attachment-20273\" class=\"wp-caption-text\">Growing Log4j attacks<\/figcaption><\/figure>\n<p>In a <a href=\"https:\/\/twitter.com\/eastdakota\/status\/1470767351087964164\" target=\"_blank\" rel=\"noopener\">tweet<\/a> the same day, Cloudflare CEO Matthew Prince said the situation may be even more dire. Prince said his company is seeing more than 400 attempted exploits per second and that \u201cpayloads getting scarier. Ransomware payloads started in force in last 24 hours.\u201d<\/p>\n<h2><strong>Second Vulnerability Detected<\/strong><\/h2>\n<p>Complicating the matter even more is a second Log4j vulnerability, which is being tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-45046\" target=\"_blank\" rel=\"noopener\">CVE-2021-45046<\/a> and is a less severe flaw (with a CVSS rating of 3.7 out of 10) than the first (the highest severity, a 10 out of 10 rating). It affects versions of Log4j from 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0, an <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/download.html\" target=\"_blank\" rel=\"noopener\">emergency fix<\/a> the Apache Software Foundation (ASF) issued late last week to address the initial vulnerability. The ASF said the emergency patch for Log4Shell was \u201cincomplete in certain non-default configurations.\u201d<\/p>\n<p>The group, which is the project maintainer for Log4j, wrote in <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" target=\"_blank\" rel=\"noopener\">advisory<\/a> that the new vulnerability could be leveraged to &#8220;craft malicious input data using a\u00a0JNDI\u00a0[Java Naming and Directory Interface] Lookup pattern resulting in a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\">denial-of-service (DoS)<\/a> attack.\u201d<\/p>\n<p>Casey Ellis, founder and CTO of Bugcrowd, told <em>eSecurity Planet<\/em> that it isn\u2019t surprising that other vulnerabilities were found in Log4j or that fixes for the software could trigger more research and discovery in the wake of a vulnerability as noisy as Log4Shell.<\/p>\n<p>\u201cIn this case, the initial fix provided was developed in a way that mitigated the exploitable symptom, but didn&#8217;t properly address the root cause,\u201d Ellis said while giving plaudits to the Log4j maintainers. \u201cThis also highlights the dangerous dependency open-source users have on libraries which power large portions of the internet but are ultimately written and maintained by unfunded volunteers with limited available time. A huge shoutout to the Log4j maintainers, who I&#8217;m sure have had an even busier and more stressful week than those in cybersecurity.\u201d<\/p>\n<h2><strong>More Flaws on the Way?<\/strong><\/h2>\n<p>Davis McCarthy, principal security researcher at Valtix, told <em>eSecurity Planet<\/em> that the \u201ctechnique of abusing JNDI lookups with user-generated data has been around for years. With the attention CVE-2021-44228 has received, I wouldn\u2019t be surprised if we saw a third CVE related to Log4j2.\u201d<\/p>\n<p>Amid all this, cybersecurity professionals and tech firms are trying to stem the tide of the attacks. Beyond the emergency patch issued by the ASF, Cybereason this week <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cybersecurity-vaccines-ransomware-vulnerability-defense\/\">issued a \u201cvaccine\u201d<\/a> for the vulnerability while the NCC Group rolled out a mitigation to keep Log4j from loading classes remotely over LDAP and CrowdSec unveiled an exploit detection tool.<\/p>\n<p>The latest to offer a Log4j defense tool is WhiteSource, which is offering a free developer tool, <a href=\"https:\/\/github.com\/whitesource\/log4j-detect-distribution\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/github.com\/whitesource\/log4j-detect-distribution&amp;source=gmail&amp;ust=1639674950673000&amp;usg=AOvVaw2SlMfXUWpROj0_iv0vgG5-\">WhiteSource Log4j Detect<\/a>, a CLI tool to help organizations detect and remediate Log4j vulnerabilities CVE-2021-44228 and CVE-2021-445046.<\/p>\n<h2><strong>CISA Steps In<\/strong><\/h2>\n<p>In addition, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\">ramping up its messaging<\/a> about Log4Shell. In an updated advisory, the agency ordered that all civilian federal agencies patch the Log4j and three other vulnerabilities by Dec. 24 and placed Log4Shell on its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">Known Exploited Vulnerabilities<\/a> list.<\/p>\n<p>CISA also is urging vendors to identify, mitigate and update impacted products by using the latest patch, which protects against both Log4Shell and the subsequent flaw and to inform customers of their products to the vulnerability and to encourage them to prioritize software updates.<\/p>\n<blockquote><p><strong>&#8216;this vulnerability is one of the most serious that I&#8217;ve seen in my entire career, if not the most serious&#8217;<\/strong><\/p><\/blockquote>\n<p>This comes as CISA met with industry leaders Dec. 13 in a phone briefing, urging them to take immediate action. <a href=\"https:\/\/www.cnn.com\/2021\/12\/13\/politics\/us-warning-software-vulnerability\/index.html\" target=\"_blank\" rel=\"noopener\">According to CNN<\/a>, CISA Director Jen Easterly reportedly told the executives that \u201cthis vulnerability is one of the most serious that I&#8217;ve seen in my entire career, if not the most serious. We expect the vulnerability to be widely exploited by sophisticated actors and we have limited time to take necessary steps in order to reduce the likelihood of damaging incidents.\u201d<\/p>\n<p>Taking the steps outlined by CISA won\u2019t be easy, Bugcrowd\u2019s Ellis said.<\/p>\n<p>\u201cThat&#8217;s going to be nearly impossible for most organizations,\u201d he said. \u201cThey need to find Log4j before they can patch it, and many are still stuck on that step. If Log4j is found, it&#8217;s likely that it is deeply embedded in existing applications and will require regression testing to ensure that a patch doesn&#8217;t break anything else. In short, the time pressure is a good thing for activating those who aren&#8217;t taking this seriously, but this will be a difficult timeframe for many to meet.\u201d<\/p>\n<h2><strong>A Cyber Pandemic<\/strong><\/h2>\n<p>Still, the Check Point researchers warned that unless companies and service providers take immediate action to prevent attacks on their products, the Log4Shell vulnerability \u201cseems that it will stay with us for years to come.\u201d<\/p>\n<p>\u201cSince the outbreak of the COVID-19 pandemic, society has already gotten used to learning about variants, spread and other terminology that is taken from epidemiology theories,\u201d they wrote. \u201cThe phenomena the world is witnessing with the exploitation of this vulnerability is very much identical. Given the upcoming holiday seasons, when security teams may be slower to implement protective measures, the threat is imminent. This acts precisely like a cyber pandemic \u2013 highly contagious, spreads rapidly and has multiple variants, which force more ways to attack.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools of 2021<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e37e56f5e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e37e56f5e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e37e56f5e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e37e56f5e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e37e56f5e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e37e56f5e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e37e56f5e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nation-state cyber threat groups and ransomware attackers are moving in to exploit a critical flaw found in the seemingly ubiquitous Apache Log4j open-source logging tool, as attacks spread just days after the vulnerability that could affect hundreds of millions of devices was made public late last week. Microsoft researchers reported that the remote code execution [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3351,23281],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,418,379],"class_list":["post-20269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-apache","tag-open-source-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-linux-servers","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn&#039;t so easy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn&#039;t so easy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-16T20:00:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-23T19:06:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"849\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw\",\"datePublished\":\"2021-12-16T20:00:03+00:00\",\"dateModified\":\"2021-12-23T19:06:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\"},\"wordCount\":1653,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\",\"keywords\":[\"Apache\",\"open source security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\",\"name\":\"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\",\"datePublished\":\"2021-12-16T20:00:03+00:00\",\"dateModified\":\"2021-12-23T19:06:10+00:00\",\"description\":\"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn't so easy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png\",\"width\":849,\"height\":549,\"caption\":\"Growing Log4j attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet","description":"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn't so easy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/","og_locale":"en_US","og_type":"article","og_title":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet","og_description":"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn't so easy.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/","og_site_name":"eSecurity Planet","article_published_time":"2021-12-16T20:00:03+00:00","article_modified_time":"2021-12-23T19:06:10+00:00","og_image":[{"width":849,"height":549,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw","datePublished":"2021-12-16T20:00:03+00:00","dateModified":"2021-12-23T19:06:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/"},"wordCount":1653,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png","keywords":["Apache","open source security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/","url":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/","name":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png","datePublished":"2021-12-16T20:00:03+00:00","dateModified":"2021-12-23T19:06:10+00:00","description":"With attacks growing in number and severity, organizations must patch Log4j quickly - which isn't so easy.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Log4j-Check-Point-graph.png","width":849,"height":549,"caption":"Growing Log4j attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Nation-State Attackers, Ransomware Groups Take Aim at Apache Log4j Flaw"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20269"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20269"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20273"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20269"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20269"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20269"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}