{"id":20524,"date":"2022-01-13T22:37:48","date_gmt":"2022-01-13T22:37:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20524"},"modified":"2022-01-14T00:47:36","modified_gmt":"2022-01-14T00:47:36","slug":"iran-based-apt35-group-exploits-log4j-flaw","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/","title":{"rendered":"Iran-Based APT35 Group Exploits Log4J Flaw"},"content":{"rendered":"<p>Security researchers are continuing to see state-supported hacking groups developing tools to leverage the high-profile <a href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\">Log4j vulnerability<\/a> that exploded onto the scene last month even as the White House and other parts of the federal government look for ways to get ahead of the threat.<\/p>\n<p>Check Point Software\u2019s researchers said this week that the Iran-backed advanced persistent threat group APT35 is looking to leverage the critical Apache Log4j flaw to distribute a new modular <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\">PowerShell<\/a>-based framework designed for persistence, gathering information, communicating with a command-and-control (C&amp;C) server and executing commands.<\/p>\n<p>APT35 \u2013 also known as TA453, Phosphorus and Charming Kitten \u2013 was among a number of nation-state supported attack groups that were observed by threat intelligence units with Check Point, Microsoft and other vendors investigating ways to exploit the vulnerability just days after it <a href=\"https:\/\/www.esecurityplanet.com\/threats\/apache-log4j-zero-day-puts-servers-at-risk\/\">became public Dec. 9<\/a>.<\/p>\n<p>\u201cWith the emergence of the Log4j security vulnerability, we\u2019ve already seen multiple threat actors, mostly financially motivated, immediately add it to their exploitation arsenal,\u201d the Check Point researchers wrote in a <a href=\"https:\/\/research.checkpoint.com\/2022\/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> this week. \u201cIt comes as no surprise that some nation-sponsored actors also saw this new vulnerability as an opportunity to strike before potential targets have identified and patched the affected systems.\u201d<\/p>\n<figure id=\"attachment_20527\" aria-describedby=\"caption-attachment-20527\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20527\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\" alt=\"APT35 attack diagram\" width=\"900\" height=\"348\" \/><figcaption id=\"caption-attachment-20527\" class=\"wp-caption-text\">APT35 attack diagram: Check Point<\/figcaption><\/figure>\n<h2><strong>Log4Shell a Significant Threat<\/strong><\/h2>\n<p>The Log4j flaw \u2013 which also is known as Log4Shell and is tracked as CVE-2021-44228 \u2013 is a significant threat due to the broad enterprise use of Log4j and the huge number of servers and cloud-based services that could be exposed to the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day vulnerability<\/a>. Log4j, a free and widely distributed open-source tool from the Apache Software Foundation, is a logging tool and the flaw impacts version 2.0 through 2.14.1.<\/p>\n<p>Security pros have said that the threat posed by Log4Shell is so high not only because of how far-reaching the tool\u2019s use is but also because of how easily the vulnerability can be exploited. Threat actors only need to send a string that includes the malicious code, which is parsed and logged by Log4j and loaded into a server. Hackers can then gain control of the system running the software, creating a platform for launching their attacks.<\/p>\n<p>A number of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/log4shell-exploitation-grows\/\">patches, detection tools and &#8220;vaccines&#8221;<\/a> were released in the weeks after Log4Shell\u2019s disclosure to address the problem. Cybersecurity firm Oxeye this week <a href=\"https:\/\/www.oxeye.io\/press-releases\/oxeye-mitigates-log4shell-vulnerability-with-ox4shell-open-source\" target=\"_blank\" rel=\"noopener\">introduced Ox4Shell<\/a>, a free open-source payload de-obfuscation tool designed to expose hidden payloads actively used by bad actors to confuse security tools and teams and avoid detection of their Log4Shell attacks. Ox4Shell, which officials said is the first in a series of planned solutions to push back against threats that exploit the Log4j flaw, is <a href=\"https:\/\/github.com\/ox-eye\/Ox4Shell\" target=\"_blank\" rel=\"noopener\">available on GitHub<\/a>.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">How Hackers Use Payloads to Take Over Your Machine<\/a><\/p>\n<h2><strong>A Long-Term Security Problem<\/strong><\/h2>\n<p>Despite these efforts, industry experts and government officials have said Log4Shell will continue to be a long-term problem. Jen Easterly, director of the federal Cybersecurity and Infrastructure Security Agency (CISA), reportedly said during a press conference that agency officials \u201cexpect Log4Shell to be used in intrusions well into the future.\u201d<\/p>\n<p>APT35\u2019s PowerShell-based framework \u2013 dubbed CharmPower \u2013 is based on JNDI Exploit Kits, which has been removed from GitHub due to its skyrocketing popularity following the Log4Shell disclosure, according to Check Point. Attackers using the framework exploit a system by sending a crafted request to a victim\u2019s public-facing device. Once exploited, the exploitation server creates and sends back a malicious Java class \u2013 which runs a PowerShell command \u2013 for execution on a vulnerable machine and eventually downloads a PowerShell module.<\/p>\n<p>The module communicates with the C&amp;C server and executes the commands, including validating the network connection and receiving, decrypting and executing follow-up modules, Check Point researchers said.<\/p>\n<p>They wrote that \u201cthe actor\u2019s attack setup was obviously rushed, as they used the basic open-source tool for the exploitation and based their operations on previous infrastructure, which made the attack easier to detect and attribute.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">Best Incident Response Tools and Software<\/a><\/p>\n<h2><strong>Government Cybersecurity Efforts<\/strong><\/h2>\n<p>The Biden Administration and other government entities are working to mitigate the threats from Log4Shell and to try to ensure something similar can\u2019t happen again. The White House on Jan. 13 was meeting with a range of tech companies, including Apple, Facebook\u2019s parent company Meta, Microsoft and IBM, as well as federal agencies like Commerce, Defense, Homeland Security and CISA to talk about security and open-source software in the wake of the Log4j vulnerability.<\/p>\n<p>During her meeting with journalists, Easterly said that CISA has been monitoring threat actors for ones trying to exploit Log4Shell and that \u201cover the past several weeks we have seen widespread exploitation of Log4Shell by criminal actors who use it to install <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-cryptojacking-and-why-is-it-a-cybersecurity-risk\/\">cryptomining<\/a> software on victim computers or to capture victim computers for use in botnets.\u201d<\/p>\n<p>However, she said, \u201cat this time we have not seen the use of Log4Shell resulting in significant intrusions. This may be the case because sophisticated adversaries have already used this vulnerability to exploit targets and are just waiting to leverage their access until network defenders are on lower alert.\u201d<\/p>\n<h2><strong>APT35 Efforts Show Real Threat of Flaw<\/strong><\/h2>\n<p>However, Chris Morgan, senior cyberthreat intelligence analyst at digital risk protection solutions vendor Digital Shadows, said Check Point\u2019s detection of APT35\u2019s exploitation of Log4Shell conflicts with what Easterly and other CISA officials said about no significant intrusion being tied to the Log4j flaw.<\/p>\n<p>\u201cThis likely emphasizes ongoing issues with incident disclosure and transparency and the lag that can exist between threat actor activity and discovery,\u201d Morgan told <em>eSecurity Planet<\/em>, adding that as Easterly said, \u201cLog4Shell will undoubtedly be featured heavily in threat actor campaigns for a considerable amount of time and the full scale of impact from Log4Shell will likely not be known for several months.\u201d<\/p>\n<p>He also noted that APT35 used the publicly available JNDI exploit kit that was published on \u2013 and since removed from \u2013 GitHub, which will probably ramp up debate regarding GitHub\u2019s policy on proof-of-concept (PoC) exploit kits and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> samples hosted on the service.<\/p>\n<p>\u201cGithub changed their policy in June 2021 to permit the removal of such items in order to minimize the risk of the exploits being used in live attacks,\u201d Morgan said. \u201cThis decision originally was related to the removal of a PoC raised by a security researcher for the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\">ProxyLogon Microsoft Exchange vulnerabilities<\/a>, which was widely criticized by many in the security community.\u201d<\/p>\n<p>APT35 is a \u201clive example of how a public exploit can fall into the wrong hands quickly,\u201d he said. Check Point\u2019s \u201cfindings may prove to be a justification of why their change in policy was a correct decision.\u201d<\/p>\n<p>The researchers wrote that whenever there is a new critical vulnerability published, the InfoSec community \u201cholds its breath until its worst fears come true: scenarios of real-world exploitation, especially by state-sponsored actors. As we showed in this article, the wait in the case of the Log4j vulnerability was only a few days. The combination of its simplicity, and the widespread number of vulnerable devices, made this a very attractive vulnerability for actors such as APT35.\u201d<\/p>\n<p>They also noted that the threat actors used the same or similar infrastructure as in many of their previous attacks, but that given their ability to take advantage of the Log4j vulnerability and \u201cthe code pieces of the CharmPower backdoor, the actors are able to change gears rapidly and actively develop different implementations for each stage of their attacks.\u201d<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e390d9271-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e390d9271\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e390d9271\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e390d9271\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e390d9271\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e390d9271\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e390d9271\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers are continuing to see state-supported hacking groups developing tools to leverage the high-profile Log4j vulnerability that exploded onto the scene last month even as the White House and other parts of the federal government look for ways to get ahead of the threat. Check Point Software\u2019s researchers said this week that the Iran-backed [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[5648,10990],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788],"class_list":["post-20524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-advanced-persistent-threats","tag-critical-vulnerabilities","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T22:37:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-14T00:47:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Iran-Based APT35 Group Exploits Log4J Flaw\",\"datePublished\":\"2022-01-13T22:37:48+00:00\",\"dateModified\":\"2022-01-14T00:47:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\"},\"wordCount\":1283,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\",\"keywords\":[\"advanced persistent threats\",\"critical vulnerabilities\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\",\"name\":\"Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\",\"datePublished\":\"2022-01-13T22:37:48+00:00\",\"dateModified\":\"2022-01-14T00:47:36+00:00\",\"description\":\"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png\",\"width\":900,\"height\":348,\"caption\":\"APT35 attack diagram: Check Point\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iran-Based APT35 Group Exploits Log4J Flaw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet","description":"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/","og_locale":"en_US","og_type":"article","og_title":"Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet","og_description":"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/","og_site_name":"eSecurity Planet","article_published_time":"2022-01-13T22:37:48+00:00","article_modified_time":"2022-01-14T00:47:36+00:00","og_image":[{"width":900,"height":348,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Iran-Based APT35 Group Exploits Log4J Flaw","datePublished":"2022-01-13T22:37:48+00:00","dateModified":"2022-01-14T00:47:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/"},"wordCount":1283,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png","keywords":["advanced persistent threats","critical vulnerabilities"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/","url":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/","name":"Iran-Based APT35 Group Exploits Log4J Flaw | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png","datePublished":"2022-01-13T22:37:48+00:00","dateModified":"2022-01-14T00:47:36+00:00","description":"The Apache Log4j Log4Shell vulnerability is being targeted by one major threat group, and others will likely follow.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/APT35-attack-diagram-e1642113390221.png","width":900,"height":348,"caption":"APT35 attack diagram: Check Point"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Iran-Based APT35 Group Exploits Log4J Flaw"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20524"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20524"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20527"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20524"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20524"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20524"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}