Source |
Security Affairs |
Identifiant |
3787259 |
Date de publication |
2021-12-13 09:44:17 (vue: 2021-12-13 10:05:46) |
Titre |
Log4Shell was in the wild at least nine days before public disclosure |
Texte |
Threat actors are already abusing Log4Shell vulnerability in the Log4j library for malicious purposes such as deploying malware. A few hours ago, researchers at NetLab 360 reported that their Anglerfish and Apacket honeypots were already hit by attacks attempting to trigger the Log4Shell flaw in the Log4j library. The attempts were carried out by Muhstik and Mirai botnets in […]
|
Envoyé |
Oui |
Condensat |
360 abusing actors ago already anglerfish apacket are attacks attempting attempts before by muhstik and mirai botnets carried days deploying disclosure flaw hit honeypots hours least library log4j log4shell malicious malware netlab nine out public purposes reported researchers such threat trigger vulnerability wild |
Tags |
Vulnerability
|
Stories |
|
Notes |
|
Move |
|