Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Governance & Risk Management

Log4Shell Among Chinese Hackers' Fave Vulns, Say Feds

CISA, FBI and NSA List 20 Common Vulnerabilities Used by Beijing
Log4Shell Among Chinese Hackers' Fave Vulns, Say Feds
Entry gate to the Forbidden City in Beijing (Image: Dyroc/CC-BY-2.0)

There's no reason not to take the obvious route: Log4Shell remains a top vulnerability exploited by Chinese hackers, says the U.S. government.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

A roundup by the FBI, National Security Agency and Cybersecurity and Infrastructure Security Agency of the 20 most actively exploited vulnerabilities favored by Beijing's coterie of state-sponsored threat actors over the past two years puts CVE-2021-44228 - better known as Log4Shell - smack at the top.

Chinese state-sponsored hacking continues to be "one of the largest and most dynamic threats to U.S. government and civilian networks," the agencies collectively warn.

China has a decadeslong history of state-sponsored hacking for commercial gain and national security purposes. The United States, joined by the European Union, the United Kingdom and NATO, in 2021 denounced China for a "pattern of irresponsible behavior in cyberspace." More recently, FBI Director Christopher Wray and Ken McCallum, director general of the U.K.'s MI5, jointly warned business and academic leaders about Chinese intellectual property theft.

Log4Shell burst into view late last year as a high-impact flaw in open-source Java utility Log4j maintained by the Apache Software Foundation and often deployed as a software library in other applications, including other Apache applications and VMWare products.

Researchers from the Alibaba Cloud Security Team in late 2021 discovered a flaw allowing attackers to inject malicious messages through the Lightweight Directory Access Protocol. The Cyber Safety Review Board, a federally run committee, earlier this year characterized Log4Shell as an "endemic vulnerability" likely to cause problems for up to a decade and possibly even longer (see: Log4j Flaw Is 'Endemic,' Says Cyber Safety Review Board).

Brian Fox, CTO of software supply chain management firm Sonatype, tells Information Security Media Group that seeing Log4j listed as a key vulnerability comes as no surprise: Log4j is widespread and Log4Shell is relatively easy to exploit.

"Our data shows that outdated, vulnerable versions of the Log4j dependency are still being downloaded 38%-40% of the time," Fox says. He recommends software bills of materials as a means to track those dependencies.*

Other vulnerabilities popular among Chinese hackers include remote code execution bugs in Atlassian software and, inevitably, a handful of Microsoft flaws.

Among the Microsoft vulnerabilities is an Exchange bug, CVE-2021-26855, which the White House says China's Ministry of State Security exploited to conduct cyberespionage.

Mitigations

The joint cybersecurity advisory urged organizations to apply the following recommendations:

  • Update and patch systems and prioritize patching vulnerabilities identified in this advisory and other known exploited vulnerabilities.
  • Implement phishing-resistant multifactor authentication and require strong password logins.
  • Block obsolete or unused protocols at the network edge.
  • Upgrade or replace end-of-life devices.
  • Adopt the zero trust security model.
  • Enable robust logging of internet-facing systems and monitoring the logs for anomalous activity.

*Update Oct. 8, 2022 15:26 UTC: Adds comments from Brian Fox.


About the Author

Prajeet Nair

Prajeet Nair

Principal Correspondent, ISMG

Nair is principal correspondent for Information Security Media Group's global news desk. He has previously worked at TechCircle, IDG, Times Group and other publications where he reported on developments in enterprise technology, digital transformation and other issues.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.