EXPERTS warn that Apache Log4j threat actors are switching up their method to secure resources for Monero mining.

Some of the attackers exploiting the Apache Log4j vulnerability, which experts predict could last for years, have moved from using LDAP to RMI in an attempt to maximize their chances of success.

Apache Log4j attackers are switching up their tactics

2

Apache Log4j attackers are switching up their tactics

Up until recently, most of the attacks on the Java-based logging utility have been through a service called LDAP, or Lightweight Directory Access Protocol.

Now hackers have found that by switching to RMI (Remote Method Invocation) they can sometimes avoid additional security checkpoints.

Furthermore, as some JVM (Java Virtual Machine) versions are built with less-strict features, RMI can sometimes be an easier road to achieving RCE (remote code execution) than LDAP.

Juniper Labs has found that some of the threat actors are actually using both LDAP and RMI to attack Log4j’s vulnerability in the hopes of increasing their chances of success.

Some of the attackers appear to have one goal in mind: Hijack resources to mine in Monero, an unusual type of cryptocurrency.

Threat actors have described the activity as something that “ain’t going to harm anyone else,” according to Juniper Labs’ reports.

Most read in Tech

The cybersecurity world has been on high alert ever since the vulnerability, which puts systems running Apache Log4j version 2.14.1 or below at risk of being compromised, was discovered last week.

“As soon as I saw how you could exploit it, it was horrifying,” Peter Membrey, chief architect of ExpressVPN said.

“Like one of those disaster movies where there’s a nuclear power plant, they find it’s going to melt down, but they can’t stop it. You know what’s coming, but there are very limited things you can do.”

Experts have been desperately trying to identify vulnerable programs as well as prevent exploits wherever possible, but the list of the affected software, as compiled by the Cybersecurity and Infrastructure Security Agency (CISA), is hundreds long.

Meanwhile, the number of affected applications, experts believe, is undoubtedly in the thousands.

“I ran queries in our database to see every customer who was using Log4j in any of their applications, and the answer was: every single one of them that has any applications written in Java,” Jeremy Katz, co-founder of Tidelift, said.

The Java-based logging utility has been the victim of thousands of attacks daily, as of late.

2

The Java-based logging utility has been the victim of thousands of attacks daily, as of late.
Cyber security company show how hackers could use your PRINTER to access your Gmail in new cyber security threat

In other news, a NASA spacecraft has officially touched the sun, plunging through the unexplored solar atmosphere known as the corona.

Samsung is reportedly killing off its beloved Note smartphone after more than a decade.

Apple has announced that it will let customers fix their own iPhones for the first time starting next year.

We pay for your stories!

Do you have a story for The US Sun team?

This post first appeared on Thesun.co.uk

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Inside luxury life of 10-year-old YouTuber Ryan Kaji who earns a staggering $27MILLION a year for just playing with toys

HE may only be ten years old, but YouTuber Ryan Kaji enjoys…

Huge Call of Duty Season 2 update incoming – new guns, maps and start time revealed

CALL of Duty is gearing up for a major mid-season update –…

Richard III was behind the ‘Princes in the Tower’ murder mystery

King Richard III likely did have King Edward V and Richard, Duke…

Flying motorcycle that costs $380,000 and can travel 300 mph completes first flight test

The makers of a luxury vehicle billed as a ‘flying motorcycle’ that…