Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Microsoft warns of continued Log4j attacks

virus-vulnerability-freepik1170.jpg
January 6, 2022

Microsoft has warned the security community that the Log4j vulnerabilities still represent a complex and high risk for companies across the globe, as this open-source component is widely used across many suppliers' software and services. 


In an update, the company says it had observed attackers using many of the same inventory techniques to locate targets. Sophisticated adversaries (like nation-state actors) and commodity attackers have been observed taking advantage of these vulnerabilities. There is high potential for the expanded use of the vulnerabilities, Microsoft says. 


Exploitation attempts and testing were high during the last weeks of December, with many existing attackers adding exploits of Log4j vulnerabilities to their existing malware kits and tactics, from coin miners to hands-on keyboard attacks. 


Stefano De Blasi, Cyber Threat Intelligence Analyst at Digital Shadows, a provider of digital risk protection solutions, notes that the latest guidance emphasizes that the Log4Shell vulnerabilities remain an important target for various threat actors with differing objectives.


De Blasi explains that attackers have mainly been observed mass scanning for this vulnerability to identify vulnerable systems. He says, "This indicates that attackers are fully aware of the severity of this bug and potential for widespread exploitation of this set of vulnerabilities. Log4j represents a useful medium for gaining an initial foothold in targeted environments, which can be further compromised later on. Once attackers have gained access to a victim's application through the exploitation of Log4j, they have performed a variety of attacks, such as installing coin miners, performing credential theft and lateral movement, and exfiltrating sensitive data. Surprisingly enough, the number of ransomware attacks did not increase along with discovering this set of vulnerabilities; however, Initial Access Brokers (IABs) interest in this vulnerability has been observed; this includes incorporating Log4Shell in IAB toolkits. As such, these actors are likely establishing a foothold on vulnerable corporate environments, with accesses to these networks likely to be sold at a later stage in cybercriminal forums."


Organizations may not realize that their environments may have been compromised. "Due to the many software and services that are impacted and given the pace of updates, Microsoft expects the vulnerabilities to have a long tail for remediation, requiring ongoing, sustainable vigilance.


Ray Kelly, Fellow at NTT Application Security, provider of application security, says, "The importance of detection cannot be overstated as it is not always obvious which software is utilizing a vulnerable version of the Log4j library. Microsoft has laid out several methods for detecting active exploit attempts utilizing Log4j; however, identifying the vulnerable version before an attack would be ideal. This will be a continuing battle for both consumers and vendors going forward into 2022 in what will need to be a two-pronged approach. Security vendors have been quick on the response for consumers by adding Log4j rules that enable DAST scanners to detect if a website can be exploited with a malicious Log4j web request against a company's web server. At the same time, vendors must ensure that they are not shipping software with the vulnerable version using tools such as SCA."


Jake Williams, Co-Founder and CTO at BreachQuest, incident response provider, believes that any organization asking today what they need to do regarding Log4j almost certainly has an incident on their hands. "Every organization with a security team knows what needs to be done to hunt down Log4j; they just need the resources and political backing to actually get it done," Williams adds. "Being exploited through an internet-facing system running vulnerable Log4j at this point is a leadership failure, not a technical one."


Security teams should employ a two-fold approach when dealing with potential Log4Shell intrusions, De Blasi says. "First, defenders should prioritize identifying and remediating vulnerable appliances with the provided scripts and scanning tools. Second, if an intrusion has been detected, defenders should escalate the investigation and incident response to ensure that compromised environments are remediated effectively," he says.

KEYWORDS: cyber security information security risk management security vulnerabilities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • phishing freepik

    Microsoft warns of Russian Nobelium phishing campaign

    See More
  • laptop-with-padlock.jpg

    Log4j bug being used in new malicious attacks

    See More
  • laptop open to email account

    Philadelphia warns citizens against tax-based phishing attacks

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing