Log4j alarm: Bitdefender Labs with first Log4Shell balance

Log4j Log4shell

Share post

The experts at Bitdefender Labs report an initial assessment of Log4j and Log4Shell: Hackers are intensively looking for vulnerabilities. A Tor concealment of the accesses to real endpoints makes Germany the seemingly number one country of origin of the attacks. Bitdefender counted 36.000 hits on honeypots in seven days.

The Log4Shell vulnerability has been actively exploited by Apache as CVE-9-2021 since it was disclosed on December 2021, 44228. The results are amazing. Most of the attack attempts seem to come from western industrialized countries such as Germany, the USA and the Netherlands, but apparently some of them hide their origin behind exit nodes of the Tor network. This suggests that the attackers are actually operating from other countries. Almost every second victim worldwide is in the United States. That's what the data analysis of Bitdefender Labs Honeypots and Bitdefender Telemetry of several 100 million endpoints shows from December 9th to December 16th. Bitdefender is currently seeing a high level of interest in the new attack options on the Darknet.

There is also a dynamic threat situation and an active hacker scene

Country of origin of the Log4Shell attacks on real endpoints - Bitdefender telemetry data (Image: Bitdefender).

Since it will take months to fix the vulnerability or even to understand the extent of the threat, the hackers now have a large window of time to exploit the vulnerability. Bitdefender Labs have not yet discovered any activities by known ransomware-as-a-service gangs or APT backers. But many are looking for ways to set foot in the networks now in order to become active later. Bitdefender expects that professional attackers will use this loophole as the first vehicle for their long-term attacks on highly relevant targets. After that, they will secretly close the chess point in order to exclude other attackers and to hide their intrusion from the defense scan. The attacks will come when the storm subsides. The attackers will presumably wait until Christmas or the turn of the year with their actual attacks.

Where did the attacks come from?

According to telemetry data, most attacks on real endpoints seem to originate in Germany (34%), ahead of the USA (26%) (Figure 1). Here, however, the concealment of the original location via the Tor network must be taken into account.

With the 36.000 honeypot attacks counted in the last seven days, a different picture emerges: Here the attacks come most frequently from the USA (21%). Behind are India (20%), Germany and Hong Kong with 12% each - closely followed by China (10%) and Russia (9%) (Figure 2).

Almost every second network attacked is in the US (48%), followed by Canada and the UK (8% each) and Romania (7%), according to Bitdefender telemetry. Germany is in fifth place here with 6%. (Figure 3).

Obfuscation of origin when attacking real endpoints

Targets of the attackers - Real endpoints - Bitdefender telemetry data (Image: Bitdefender).

The high rate of attacks allegedly originating in Germany and western industrial nations on real endpoints in Bitdefender telemetry does not result from the initially assumed reason that one-time virtual machines from Infrastructure-as-a-Service data centers are the starting point. Only a small percentage of attacks have a source address that points to cloud providers such as AWS, Azure or Google Cloud Platform (GCP). However, over 50% of the source IPs could be assigned to exit nodes of the Tor network (onion router). The hackers use a network of virtual tunnels to hide their identity and origin. When routing their attacks, they choose machines closer to the target victims as a starting point.

The threat is taken seriously

Fortunately, the analysis also showed how conscientiously and efficiently companies check their own IT and take the threat seriously. In the run-up to the telemetry analysis, the experts filtered out around 75 percent of the attacks on endpoints that were obviously started by the IT managers in order to check their own system for weak points.

Bitdefender protects against the vulnerability

Bitdefender products and services are protected against the vulnerability. Information on how to do this can be found online at Bitdefender.

More at Bitdefender.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more