Digital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Facebook X (Twitter) Instagram
Trending
  • Fagbemi, Maida Seek Unified Communications Regulation For Digital Growth
  • Kaycee Orji Unveils Roxettes Plaza In Enugu, Declares Africa Ready To Compete
  • Umunneochi Council Of PGs Decries “Ugly Trends” In Legislative Council, Calls For Peace
  • LASUED Wins Gold At Lagos Campus Beach Soccer 2025
  • $1 Trillion Economy: Why Tinubu Must Listen To Dangote, Ekeh, Others
  • Peter Obi Decries Nigeria’s Rising Debt Profile, Warns Of Dire Consequences
  • NASENI, BPP Sign MoU To Enforce “Nigeria First Movement”
  • NGX Boss, Umaru Kwairanga, To Chair Business Journal Fintech Roundtable 2025
Facebook X (Twitter) Instagram
Digital Times NigeriaDigital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Digital Times Nigeria
Home » Sophos Detects How Cyberattackers Are Exploiting Apache Log4Shell Vulnerability
TechExtra

Sophos Detects How Cyberattackers Are Exploiting Apache Log4Shell Vulnerability

DigitalTimesNGBy DigitalTimesNG15 December 2021No Comments4 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
SOPHOS OFFICE
Share
Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp

 

Sophos has provided new threat intelligence on how cyberattackers are already exploiting or attempting to exploit unpatched systems.

This follows the reporting of the Apache Log4Shell vulnerability.

The threat intelligence as detailed in the SophosLabs Uncut report, Log4Shell Hell: Anatomy of an Exploit Outbreak, shows that Sophos is seeing a rapid uptick in attacks exploiting or attempting to exploit this vulnerability, with hundreds of thousands of attempts detected so far.

The report also indicated that Cryptomining botnets are among the earliest “attack” adopters; botnets focus on Linux server platforms, which are particularly exposed to this vulnerability.

Sophos has also seen attempts to extract information from services, including Amazon Web Services keys and other private data.SOPHOS DETECTION

The company said it observed that attempts to exploit network services start by probing for different types.

Around 90 per cent of the probes Sophos detected were focused on the Lightweight Directory Access Protocol (LDAP). A smaller number of probes targeted Java’s Remote Interface (RMI,) but Sophos researchers noted that there seem to be a larger variety of unique RMI-related attempts

Sophos said it expects adversaries to intensify and diversify their attack methods and motivations in the coming days and weeks, including the possibility of leveraging for ransomware.

According to Sean Gallagher, a senior threat researcher at Sophos, in the SophosLabs Uncut report issued on Dec. 9, Sophos has detected hundreds of thousands of attempts to remotely execute code using the Log4Shell vulnerability.

“Initially, these were Proof-of-Concept (PoC) exploit tests by security researchers and potential attackers, among others, as well as many online scans for the vulnerability. This was quickly followed by attempts to install coin miners, including the Kinsing miner botnet.

READ ALSO  Sophos Reports How Active Adversaries Increasingly Exploit Stolen Session Cookies

“The most recent intelligence suggests attackers are trying to exploit the vulnerability to expose the keys used by Amazon Web Service accounts. There are also signs of attackers trying to exploit the vulnerability to install remote access tools in victim networks, possibly Cobalt Strike, a key tool in many ransomware attacks.

“The Log4Shell vulnerability presents a different kind of challenge for defenders. Many software vulnerabilities are limited to a specific product or platform, such as the ProxyLogon and ProxyShell vulnerabilities in Microsoft Exchange. Once defenders know what software is vulnerable, they can check for and patch it.

“However, Log4Shell is a library that is used by many products. It can, therefore, be present in the darkest corners of an organisation’s infrastructure, for example, any software developed in-house. Finding all systems that are vulnerable because of Log4Shell should be a priority for IT security.

“Sophos expects the speed with which attackers are harnessing and using the vulnerability will only intensify and diversify over the coming days and weeks. Once an attacker has secured access to a network, then any infection can follow.SOPHOS DETECTION 2 1

“Therefore, alongside the software update already released by Apache in Log4j 2.15.0, IT security teams need to do a thorough review of activity on the network to spot and remove any traces of intruders, even if it just looks like nuisance commodity malware”, Gallagher added,

New and additional information on how Log4Shell works is also available in the Sophos Naked Security article, Log4Shell Explained – How it Works, Why You Need to Know, and How to Fix It, by Paul Ducklin.

READ ALSO  Sophos Introduces Customer Success Team, Strengthening Commitment To Customers, Partners

According to Paul Ducklin, a principal research scientist at Sophos, “Technologies including IPS, WAF and intelligent network filtering are all helping to bring this global vulnerability under control.

“But the staggering number of different ways that the Log4Shell ‘trigger text’ can be encoded, the huge number of different places in your network traffic that these strings can appear, and the wide variety of servers and services that could be affected are collectively conspiring against all of us.

“The very best response is perfectly clear: patch or mitigate your own systems right now. Our article provides practical advice that explains how the vulnerability works, why it works, what it can do, and how to fix it.”

Sophos said its threat intelligence experts are continuing to monitor Log4Shell.

#Apache #Cyberattackers #Log4Shell #Sophos #Vulnerability
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow Airtel Lost Bid For 5G License To Mafab And MTN Nigeria
Next Article MTN Nigeria Successfully Bids For 3.5GHz Spectrum License For 5G Rollout
DigitalTimesNG
  • X (Twitter)

Related Posts

Google Announces $37 Million AI Investment To Advance Africa’s Research, Talent, And Food Security

25 July 2025

Anambra’s Digital Leap: GEFAS Mobile Tech Hub Hits The Road With Free WiFi Access

25 July 2025

For 16th Year Running, Sophos Named Leader In Gartner’s 2025 Magic Quadrant For EPPs

22 July 2025

Again, PalmPay Earns Spot On CNBC, Statista’s 2025 Global Top 300 Fintech Companies List

22 July 2025

Digital Push For Soludo As GEFAS Unveils Office To Energize Tech Movement And 2025 Campaign

19 July 2025

NITDA DG Urges Business Leaders To Embrace AI As Collaborative Partner, Not Threat

13 July 2025

Comments are closed.

Categories
About
About

Digital Times Nigeria (www.digitaltimesng.com) is an online technology publication of Digital Times Media Services.

Facebook X (Twitter) Instagram
Latest Posts

Fagbemi, Maida Seek Unified Communications Regulation For Digital Growth

30 July 2025

Kaycee Orji Unveils Roxettes Plaza In Enugu, Declares Africa Ready To Compete

30 July 2025

Umunneochi Council Of PGs Decries “Ugly Trends” In Legislative Council, Calls For Peace

29 July 2025
Popular Posts

Building Explainable AI (XAI) Dashboards For Non-Technical Stakeholders

2 May 2022

Building Ethical AI Starts With People: How Gabriel Ayodele Is Engineering Trust Through Mentorship

8 January 2024

Gabriel Tosin Ayodele: Leading AI-Powered Innovation In Web3

8 November 2022
© 2025 Digital Times NG. Designed by Max Excellence LLC.
  • Advert Rate
  • Terms of Use
  • Advertisement
  • Private Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.