SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers
Story image

Logjam: Log4j exploit attempts continue in globally distributed scans, attacks

Wed, 29th Dec 2021
FYI, this story is more than a year old

Log4j exploit attempts continue in globally distributed scans and attacks, according to Sean Gallagher, senior threat researcher at Sophos.

Gallagher says since the first vulnerability in the Apache Foundation's Log4j logging tool was revealed on December 10, three sets of fixes to the Java library have been released as additional vulnerabilities were uncovered.

"This rapid iteration of fixes has left software developers and organisations worldwide scrambling to assess and mitigate their exposure with nearly daily-changing guidance," he says.

"In the meantime, we've seen attempts to detect or exploit the vulnerability continue non-stop."

As we pass the first week since the exposure of the first vulnerability, SophosLabs has continued to track attempts against its customers' networks to exploit Log4Shell.

"The traffic we've observed includes benign scans by security researchers and penetration testers as well as malicious activity, and it does not directly reflect the state of criminal and state actor attempts to exploit the vulnerability," says Gallagher.

"But from portions of the data, we can see enough about the requests to gain some insight into the infrastructure involved in these attempts, and in some cases the intent behind them," he says.

"What is certain is that we have not seen a significant reduction in exploit attempts since they peaked on December 15, and that these probes and exploits are coming from a globally distributed infrastructure.

"In some cases, a request comes from an IP address in one geographic region, with embedded URLs for Log4j that connect to servers elsewhere—sometimes multiple different servers.

"We have seen millions of incoming attempts to exploit Log4j in customer telemetry."

Who's doing this?
Gallagher says that while Sophos cannot distinguish the intent of every request, the segment of its telemetry that provided traffic details provides a snapshot of the infrastructure involved in Log4j abuse.

"Looking at the source of attempted abusive packets thus far, the vast majority come from IP addresses in Russia and China. This does not include traffic that conceals its source by use of virtual private networks; a statistically significant amount of traffic was routed through NordVPN's exit point in Panama, for example," he says.

"Of the traffic we could identify a source for, 11% came from a single IP address in Russia: 195[.]54[.]160[.]149. This IP address has been associated with the Kinsing cryptocoin-mining botnet."

Gallagher says that because of the way Log4j exploits work—by prompting "lookups" to remote servers via LDAP, DNS, and other Java Name and Directory Interface (JNDI) supported protocols—the lookup requests can be directed to a different location than the source of the exploit. For example, a request routed through NordVPN's Panama exit point (94[.]140[.]9[.]194) used a request URL that redirected to a URL in Kenya (41[.]169[.]130[.]19:8443/api/login).

"Nearly two-thirds of these requests had URLs for infrastructure in India. And over 40% had URLs directed to infrastructure in the US," he says.

"Over seven percent of exploit requests were directed to the Interactsh tool's domain—18% of all the traffic to US infrastructure. The numbers in the chart below add up to more than 100% because some exploit attempts used multiple URLs with different destinations."

According to Gallagher, "Because Interactsh has been used by both researchers and malicious actors, it's difficult to separate the benign from the bad—just as it is with much of the other traffic we're currently detecting and blocking.

"But it is clear that malicious exploit attempts remain a majority of this traffic," he says.

Mitigation and protection
When the first patch for Log4j was released, the Apache team offered a number of work-arounds to prevent exploitation. But all of these fixes turned out to be moot as additional vulnerability paths were discovered.

"The only sure way to protect against exploitation—either to gain remote code execution or to cause denial of service—is to update software to use the current "safe" versions of Log4j (2.17.0 for Java 8, 2.12.3 for Java 7)," says Gallagher.

"A list of vulnerable commercial products is being maintained by multiple government computer security agencies, including the US' Cybersecurity and Infrastructure Security Administration (CISA). Organisations should assess their software's vulnerability as soon as possible and deploy updates where possible," he says.

Where fixes are not yet available, network filtering definitions will protect against a large percentage of existing exploit traffic—but do not guarantee protection against emerging threats and highly targeted attacks.

Sophos continues to identify new methods of obfuscation for exploiting traffic, and new payloads that are being deployed via Log4j exploits.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X