The Race to the Vulnerable: Measuring the Log4j Shell Incident

05/05/2022
by   Raphael Hiesgen, et al.
0

The critical remote-code-execution (RCE) Log4Shell is a severe vulnerability that was disclosed to the public on December 10, 2021. It exploits a bug in the wide-spread Log4j library. Any service that uses the library and exposes an interface to the Internet is potentially vulnerable. In this paper, we measure the rush of scanners during the two months after the disclosure. We use several vantage points to observe both researchers and attackers. For this purpose, we collect and analyze payloads sent by benign and malicious communication parties, their origins, and churn. We find that the initial rush of scanners quickly ebbed. Especially non-malicious scanners were only interested in the days after the disclosure. In contrast, malicious scanners continue targeting the vulnerability.

READ FULL TEXT
research
05/11/2022

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

The traditional design principle for Internet protocols indicates: "Be s...
research
01/31/2019

LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics

Identifying potentially vulnerable locations in a code base is critical ...
research
04/19/2021

Multi-context Attention Fusion Neural Network for Software Vulnerability Identification

Security issues in shipped code can lead to unforeseen device malfunctio...
research
04/03/2020

A "Final" Security Bug

This article discusses a fixed critical security bug in Google Tink's Ed...
research
01/02/2023

Honeypot Implementation in a Cloud Environment

In this age of digitalization, Internet services face more attacks than ...
research
01/24/2020

Learning to Catch Security Patches

Timely patching is paramount to safeguard users and maintainers against ...
research
09/06/2018

End-to-End Analysis of In-Browser Cryptojacking

In-browser cryptojacking involves hijacking the CPU power of a website's...

Please sign up or login with your details

Forgot password? Click here to reset