There’s been a lot of Log4j news over the past few days, the most important being the report that the email system at the Belgian Ministry of Defense (Defence) was down for several days because of an attack that apparently took place last week.The incident in Belgium was the first actual attack on an organization since the Apache Log4j vulnerability became public. In a prepared statement, the ministry said they discovered the attack last Thursday, looked to quarantine the “affected parts,” and would not release any details on the nature of the attack.Public disclosures of Log4J intrusions have always been a matter of "when, not if," said Rick Holland, vice president of strategy and CISO at Digital Shadows. Since the initial discovery, Holland said there have been three Log4j patches (2.17.0 being the latest), which have lengthened remediation efforts, leaving attack windows open for both nation-state and cybercriminal adversaries."The Belgian Defense Ministry's disclosure is just the tip of the iceberg,” Holland said. “Sadly, we will never know the full scope of intrusions leveraging this vulnerability as most organizations don't have breach disclosure requirements. This widely-used, vulnerable Log4j open-source software has created a perfect storm with implications measured in years, not months.” Casey Ellis, founder and CTO at Bugcrowd, said the criminal use of Log4Shell kicked off almost immediately after it was released, largely owing to the vast attack surface provided by Log4j. The industry quickly got reports of it being paired with coinminers (Kinseng) and botnets (Mirai), followed by pairing of the vulnerability with ransomware and other malicious payloads. Alongside this, we’ve seen considerable R&D work done of improving the exploit itself: Evading web application firewalls and improving the reliability of payload execution.“So, hearing that the first reports of Log4j being detected in-use against a government agency so soon after the release of the exploit isn’t a huge surprise,” Ellis said. “The Belgian government’s response around 'quarantine' suggests that they build the targeted environments using a defense-in-depth approach, allowing them to selectively isolate network segments and systems to prevent lateral movement from an intrusion.”
Cloud Security, Threat Management, Vulnerability Management
Log4j exploit takes down Ministry of Defense email servers in Belgium

The Belgian and EU flags fly on a building. (
Sollebrunnarn
,
CC BY-SA 4.0
, via Wikimedia Commons)
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds