Attacks

Log4j: What You Need to Know

Table of Contents

On December 9, 2021, The Apache Foundation disclosed a critical security vulnerability in their Log4j utility that results in remote code execution. 

Log4j in Brief

Log4j is a utility for logging error messages which is very commonly used across much of the internet. The vulnerability (designated as CVE-2021-44228 by MITRE) stems from Log4j trusting user-generated content and then not only logging that content, but also interpreting specially crafted instructions found in that content. Threat actors are therefore able to execute arbitrary code in the vulnerable system.

News articles have said that threat actors are leveraging the log4j flaw to deploy ransomware, remote access Trojans, and web shells on vulnerable systems. Several botnets have already adapted to exploit the Log4j vulnerability.

How Common Is Log4j?

The affected version of Log4j is included in Apache Struts2, Solr, Druid, Flink, and Swift frameworks. Consequently, advisories and patches have been released by Amazon Web Services, IBM, and Oracle, among others. All told, millions of software applications could be affected.

How Lumu Addresses the Log4j Vulnerability

First, Lumu detects contacts with adversarial infrastructure that are potentially related to adversaries attempting to exploit this vulnerability. 

Second, Lumu systematically collects and analyzes network metadata. By doing so, Lumu gives organizations the ability to detect malicious activity related to malware families that are known to be using the Log4j vulnerability to communicate with their networks—and does so in real time.

Your Call to Action

Installing the most recent version of the Log4j utility is the paramount priority. At the time of writing, 2.16.0 is the latest version, but new versions are being released by The Apache Foundation.

Proofs of concept for the exploitation of Log4j are available in the public domain, which means that cybercriminals can access them as well. At this moment, it is critical to look for connections of adversaries trying to exploit the Log4j vulnerability, continuously monitor compromised assets, and automate response tasks associated with this threat. 

At Lumu, we believe that all companies can operate cybersecurity, no matter their size. That’s why we offer Lumu Free, which allows you to immediately see if your network is speaking with adversaries exploiting the Log4j vulnerability or others.

Recent Posts

  • Blog

Detecting Cyberattacks Hidden via Anonymization

Reading Time: 4 minsDetecting and stopping attacks using anonymization techniques can give your team the…

4 days ago
  • Blog

Advisory Alert: PowerSchool Data Breach

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12…

6 days ago
  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

1 month ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

1 month ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

1 month ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

2 months ago