• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Latest Cybersecurity News Linux security Mac security Windows security

Log4j Vulnerability exploiters evolve the attack vector to mine Monero

William Marshal Posted On December 17, 2021
0



Log4j vulnerability

Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or sometimes they are combined together for better success rates. In continuation to our earlier post on this vulnerability, this article will discuss the emerging attack vector exploiting Log4j.

Log4Shell Vulnerability is already being exploited in the wild and this recent changes are a development in the attacking vector and the security professionals need to be aware of these changes to defend against it. Criminals are attempting to hijack resources for mining Monero, but this can be developed further by others for multiple exploitation.

Log4J Vulnerability development from LDAP to RMI

Initially the attacks targeting the Log4J vulnerability were using the LDAP service. However, the recent development with Remote Method Invocation (RMI) API seems to be super-seeding the success rate of the attack by ensuring one over other. Compared to LDAP the RMI can be effortless channel to achieve remote code execution exploitation as VM’s usually do not own strong policies. And since LDAP routes are highly monitored this new path could be sneaky and allow attackers to achieve their mission.

This is because many IPS/IDS tools are only filtering requests with LDAP and JNDI, so RMI can fool the defenders. However, as already mentioned in some cases both LDAP and RMI are combined in the same HTTP POST request.

Findings about Log4J vulnerability by Juniper Labs

According to Juniper Labs Report, the code invokes a bash shell command to execute the downloaded script. It seems the attackers at the moment using this RMI to only mine Monero cryptocurrency and they aren’t harming any network directly. The mining is done via Linux systems, and CheckPoint said that the Win32 EXE leverages Log4j vulnerability called StealthLoader.

How to defend against Log4J vulnerability exploited via RMI

Defenders need to update Log4J to version 2.16.0 immediately. Furthermore, security professionals need to keep an eye on Apache’s Updates on Log4J and update the Log4J as and when recommended. If you need a complete breakdown about this Log4J vulnerability please visit CISA’s site.

The products affected by Log4J vulnerability named as CVE-2021-4428 are listed below,

  • Adobe – Read the advisory
  • Amazon – Read the advisory
  • Broadcom – Read the advisory
  • Cisco – Read the advisory
  • Citrix – Read the advisory
  • ConnectWise – Read the advisory
  • cPanel – Read the advisory
  • Debian – Read the advisory
  • Docker – Read the advisory
  • FortiGuard – Read the advisory
  • F-Secure – Read the advisory
  • Ghidra – Read the advisory
  • IBM – Read the advisory
  • Juniper Networks – Read the advisory
  • McAfee – Read the advisory
  • MongoDB – Read the advisory
  • Okta – Read the advisory
  • Oracle – Read the advisory
  • OWASP Foundation – Read the advisory
  • Red Hat – Read the advisory
  • Siemens – Read the advisory
  • Solarwinds – Read the advisory
  • SonarSource – Read the advisory
  • SonicWall – Read the advisory
  • Sophos – Read the advisory
  • Splunk – Read the advisory
  • TrendMicro – Read the advisory
  • VMware – Read the advisory
  • Ubiquiti – Read the advisory
  • Ubuntu – Read the advisory
  • ManageEngine – Read the advisory
  • Zscaler – Read the advisory

If any of the vendors you are looking for is missing please visit the GitHub Repository for their security advisory. If you experience any unusual behavior in your network or systems, please report it to FBI or CISA.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends


Log4j AttackLog4j exploitLog4j Vulnerability


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Third-patch is released to fix the critical Apache Log4j Vulnerability
December 19, 2021
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search