Connect with us

Hi, what are you looking for?

HEADLINES

Phl continues to experience cyber threats – Fortinet

Fortinet shared that a zero-day vulnerability officially labeled as CVE-2021-44228 or popularly known as log4Shell was discovered in the Apache software, the maker of log4j. It has the potential for a wide-scale impact across most Java applications, including business systems that record log information.

Photo by Dan Nelson from Unsplash.com

The Philippines continues to experience cyber threats that can pose a problem on the Internet, applications and devices during the first quarter of the year. 

Fortinet shared that a zero-day vulnerability officially labeled as CVE-2021-44228 or popularly known as log4Shell was discovered in the Apache software, the maker of log4j. It has the potential for a wide-scale impact across most Java applications, including business systems that record log information. This zero-day exploit, which was first discovered on December 9, 2021 in the Java logging library log4j (version 2), was one of the most detected exploitation techniques in the Philippines.

This vulnerability should be taken seriously as this is trivial to exploit or easy to perform but it could permit a remote attacker to execute a complete remote code execution (RCE) on vulnerable systems when exploited. The ubiquitous nature of Log4j is part of what makes CVE-2021-44228 so dangerous. Millions of applications such as iCloud, Steam, an Minecraft, use Log4j for logging. An attacker simply needs to get the app to log a special string to successfully exploit this vulnerability. So far, these cloud services and applications have all been found vulnerable.

Fortinet describes how the exploit work. Once a target has been selected, an attacker adds a JNDI query to a connection request to that target in a field that likely to get logged via Log4j. A vulnerable version of Log4j then takes that request and attempts to contact ‘malicious-server host’ with an LDAP query. Should the connection be successful, the ‘malicious-server hosts’ under the attackers control replies to the query by inserting a malicious Java class file location into the directory data. The Java implementation on the target then downloads the malicious Java class file and executes it.

Advertisement. Scroll to continue reading.

The log4Shell can potentially compromise millions of devices across the Internet. In light of this, FortiGuard Labs released the IPS signature “Apache Log4j Error Log Remote Code Execution” to detect and mitigate exploit attempts, which was initially released in the IPS version 19.215 package.

 The second vulnerability, labeled CVE-2021-45046 causes a Denial of Service (DoS) condition when successfully exploited. Threat actors wasted no time in leveraging Log4Shell by deploying new malware and potentially unwanted programs (PUPs) to compromise vulnerable machines. It was revealed that an information leak and remote code execution in some environments and local code execution in all environments could be achieved due to successful exploitation.

In addition, a considerable increase in massive scans was detected, which allows an adversary to identify services in the target system and carry out further attack based on their findings. Adversaries may perform different forms of active scanning depending on what information they seek to gather. These scans can also be performed in various ways, including using native features of network protocols. FortiLabs also detected many attacks related to Remote Code Execution on IoT devices and home routers which allow the adversary to gain control over vulnerable systems.

Meanwhile, Mirai continues to be the Botnet campaign that registers the most activity in the Philippines. Mirai is a Linux IoT malware that causes infected machines to join a botnet (T1584 005) [16] used for Distributed Denial of Service (DDoS) attacks. However, FortiLabs is aware of a new variant of Mirai Linux spreading using the CVE-2021-44228 vulnerability known as Log4Shell. This is possibly the first Mirai variant equipped with embedded Log4Shell exploit code along with a Mirai variant as the vulnerability was disclosed on December 9, 2021.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

Advertisement