This variant will quickly get modified and used and repurposed to exploit other hardware and devices.
Welcome to the age of the log4j worms everyone.
🪵🪱
Impact of this worm is unknown, I have no idea how many devices this will compromise but it could set up quite a large botnet for launching DDoS and other services in order to gain money.
My guess: Expect DDoS attempts to escalate around Xmas
Expect other variants soon
As someone who used to be a VXer and wrote several worms in early 2000s there is some developmental time frames for these pieces of malware.
- Research propagation method
- Add it to base viral code
- Test in a limited environment
- Rewrite and retest
- release into wild later
The time for release is never immediately after development
Releasing into the wild requires window of opportunity, removal of evidence of meta data and author, destroying hardware that created it on, and deploying it in a fashion that can't be traced back to you.
Huge shout out to @1ZRR4H who discovered this in the wild and posted it to @vxunderground who continue to be the best source for malware research on the internet bar none.
Also if possible please make sure you donate, subscribe, and give samples to VXU to support their services
#log4j theoretical worm depending on propegation speed might just blend in with the noise for a while.
Ideally right now reducing attack surface should be everyone's top priority
Unfortunately we are dealing with a bug with unprecedented vectors.
Everyone right now shouldn't even focus on worm capabilities because exploitation is so wide spread right now it doesn't even increase your risk level, attackers are doing nearly identical to what worm activity would be like.
Traffic congestion and network bottlenecking tho...
Historically if we look at worm activity it took roughly a week to 14 days for them to be widespread & developed
However those in the past didn't use logic flaws & required memory corruption exploits which are less reliable & complex payloads.
#Log4J based on what I've seen, there is evidence that a worm will be developed for this in the next 24 to 48 hours.
Self propagating with the ability to stand up a self hosted server on compromised endpoints.
In addition to spraying traffic, dropping files, it will have c2c
Biggest hurdle appears to be implementing a JDK gadget to enable code execution on limited env.
That is currently being researched by several groups.
Honestly I'm kinda surprised it isn't finished yet, but I have seen at least 3 groups (Eastern euro, .ru and .cn) that are investigating options to do this.
Goals appear varied: financial gain via extortion as well as selling access to compromised hosts to RaaS groups
So when you see the "You just got RCE and you use it to info dump" people, please kindly remind them that RCE isn't always as fancy as they would love to think