Monday, April 20, 2026
HomeCyber SecurityChinese language APT Hackers Used Log4Shell Exploit to Goal Tutorial Establishment

Chinese language APT Hackers Used Log4Shell Exploit to Goal Tutorial Establishment

[ad_1]

Chinese language APT Hackers Used Log4Shell Exploit to Goal Tutorial Establishment

A never-before-seen China-based focused intrusion adversary dubbed Aquatic Panda has been noticed leveraging essential flaws within the Apache Log4j logging library as an entry vector to carry out varied post-exploitation operations, together with reconnaissance and credential harvesting on focused techniques.

Cybersecurity agency CrowdStrike mentioned the infiltration, which was finally foiled, was aimed toward an unnamed “massive tutorial establishment.” The state-sponsored group is believed to have been working since mid-2020 in pursuit of intelligence assortment and industrial espionage, with its assaults primarily directed in opposition to firms within the telecommunications, expertise, and authorities sectors.

Automatic GitHub Backups

The tried intrusion exploited the newly found Log4Shell flaw (CVE-2021-44228, CVSS rating: 10.0) to achieve entry to a weak occasion of the VMware Horizon desktop and app virtualization product, adopted by working a sequence of malicious instructions orchestrated to fetch menace actor payloads hosted on a distant server.

Log4Shell Exploit

“A modified model of the Log4j exploit was doubtless used throughout the course of the menace actor’s operations,” the researchers famous, including it concerned the usage of an exploit that was printed in GitHub on December 13, 2021.

Aquatic Panda’s malicious conduct went past conducting reconnaissance of the compromised host, beginning with making an effort to cease a third-party endpoint detection and response (EDR) service, earlier than continuing to retrieve next-stage payloads designed to acquire a reverse shell and harvest credentials.

Prevent Data Breaches

However after the sufferer group was alerted to the incident, the entity “was capable of shortly implement their incident response protocol, finally patching the weak software and stopping additional menace actor exercise on the host.” In gentle of the assault’s profitable disruption, the precise intent stays unknown.



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments