Log4Shell Targeted by Email Attackers in Two Campaigns

""

The 秋葵视频色 | AppRiver team spotted two campaigns in which email attackers attempted to exploit a on susceptible systems.

A Bit of Background on Log4j

As explained by the (CISA), the Log4j vulnerability (detected as and dubbed 鈥淟og4Shell鈥) is a critical remote code execution flaw that affects versions 2.0-beta9 to 2.14.1 of Log4j, Apache鈥檚 Log4j software library which services can use to log security and performance information. Those services include background modules that that help to process email header information as well as perform analytics and reporting.

CVE-2021-44228 affects Log4j鈥檚 Java Naming and Directory Interface (JNDI) insofar as some of its features 鈥渄o not protect against adversary-controlled LDAP [Lightweight Directory Access Protocol] and other JNDI related endpoints.鈥 Malicious actors can use a specially crafted request to exploit the flaw and execute arbitrary code for the purpose of infecting the system, exfiltrating information, and/or deploying ransomware. For the purposes of this article, they can launch an email attack where Log4j parses a string, executes malicious code, and compromises a system that attempts to log information about the email.

Campaign #1: A Slack Workplace Invitation

As soon as it learned of the Log4j vulnerability鈥檚 disclosure on December 10, 2021, the 秋葵视频色 | AppRiver team prepared itself for attack attempts to begin spreading over organizations鈥 email systems. It was just four days later when the team detected the first such attempt. In the weeks that followed, those attacks grew in frequency and creativity.

Which brings us to one campaign flagged by the 秋葵视频色 | AppRiver team in the beginning of January. For this attack, someone by the name of 鈥淪mith John鈥 invited a recipient to join a Slack workplace. The invite came with a unique workplace name crafted to exploit CVE-2021-44228.

Screenshot of the Slack workplace invitation. (Source: 秋葵视频色 | AppRiver)
Screenshot of the Slack workplace invitation. (Source: 秋葵视频色 | AppRiver)

鈥淚 assume the attacker is hoping that the attempt would be logged by a vulnerable system and trigger the exploit,鈥 noted Troy Gill, senior manager of threat intelligence at 秋葵视频色 | AppRiver. 鈥淲e don鈥檛 know for sure if that was strictly intended as an email attempt or if the attacker was trying to send the exploit via Slack and that action triggered an email. Or both maybe?鈥

Campaign #2: An AWS Attack

It was around that same time when the 秋葵视频色 | AppRiver team came across another attack that attempted toe exploit the Log4j vulnerability. Whoever designed this attempt dispensed with concealing their efforts behind a well-known brand like Slack. Instead, they sent out an email with the exploit code for Log4Shell included not only in the subject line but also in the body of the attack email.

Screenshot of the attack email. (Source: 秋葵视频色 | AppRiver)
Screenshot of the attack email. (Source: 秋葵视频色 | AppRiver)

Gill and his team analyzed the email and found that its sender had data theft on their mind.

鈥淚t was trying to retrieve multiple AWS items along with java and virtual machine information,鈥 he pointed out. 鈥淭his AWS attack tried to retrieve the secret access key, session token, shared credentials file, web identity token file, profile, config file, and access key ID. I鈥檓 not sure about the efficacy of this attack, but it is certainly being attempted.

Screenshot of some of the AWS items targeted by the attack email. (Source: 秋葵视频色 | AppRiver)
Screenshot of some of the AWS items targeted by the attack email. (Source: 秋葵视频色 | AppRiver)

How to Defend Against Email Attacks Targeting CVE-2021-44228

The campaigns described above highlight the need for organizations to defend themselves against attack attempts that seek to exploit CVE-2021-44228. One of the ways they can do that is by using an email security solution that can analyze incoming messages for known vulnerabilities and other malicious indicators. Simultaneously, organizations should seek to patch Log4Shell using their vulnerability management programs.