Conti ransomware group targets vulnerable VMware vCenter servers using Log4Shell exploit
It is only a matter of time until Conti and possibly other groups will begin exploiting the Log4j flaw to the fullest, the researchers warned.
It is only a matter of time until Conti and possibly other groups will begin exploiting the Log4j flaw to the fullest, the researchers warned.
The data was reportedly obtained during a phishing attack on an IT firm Dacoll, which provides a 'critical' service for the UK's police forces.
The new bug impacts all Log4j versions from 2.0-beta9 to 2.16.0.
While HelloKitty has been in operation since January 2021, details about the group’s likely location were not previously disclosed.
The malicious actor’s activity started in 2019 and targeted an unnamed Asian airline.
Threat actors linked to the Log4Shell attacks include the Iran-linked APT group PHOSPHORUS, and China-linked HAFNIUM APT.
The company said it has no evidence that safety or security of any customer or other personal data has been compromised.
The new vulnerability affects all versions of Log4j from 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0.
Volvo said it has no evidence that the incident affected "the safety or security of its customers' cars or their personal data."
Microsoft's December 2021 Patch Tuesday addresses nearly 70 vulnerabilities across a vide range of the company's products.
Showing elements 2701 - 2710