Kaspersky blocks 30.562 Log4Shell attack attempts

1500

Kaspersky disclosed today(16) that its products “blocked 30.562” attempts to attack users through methods that targeted the Log4Shell vulnerability.

In an official statement, the cybersecurity company says that, “discovered in December, Log4Shell quickly became famous as the vulnerability of the year“, where despite the Apache Foundation having released a 'patch' (a program aimed at correcting errors and 'bugs' in the 'software') shortly after the discovery, the cybersecurity specialist points out that this vulnerability continues “pose a huge threat” for companies and users.

"In fact, during the first three weeks of January, Kaspersky products blocked 30.562 attempts to attack users using methods that targeted the Log4Shell vulnerability.“, reveals the Kaspersky note.

"CVE-2021-44228 or Log4Shell is a Remote Code Execution (RCE) class vulnerability, which means that if exploited on a vulnerable server, cybercriminals gain the ability to execute arbitrary code and potentially take complete control over the system“, adds the company.

BUT: What is Log4Shell, who does it affect and how to fix it?

"The vulnerability is extremely attractive to cybercriminals as it allows them to gain full control over the victim's system and is easy to exploit.“, warns the technology.

Since it was identified, “Kaspersky products detected and prevented 154.098 attempts to scan and attack devices through the Log4Shell vulnerability target".

Most of the systems that were the target of attack are located in Russia (13%), Brazil (8,97%) and United States (7,36%).

LEAVE AN ANSWER

Please enter your comment!
Please enter your name here