Romanian antivirus maker Bitdefender says it has spotted the first ransomware group that is abusing the recently disclosed Log4Shell vulnerability to infect and encrypt unpatched systems.
First attacks have been spotted on Sunday, December 11, and have been carried out using a new strain of ransomware named Khonsari, Bitdefender researcher Martin Zugec said in a report on Monday.
The ransomware is coded in .NET and can only target Windows systems.
Security researchers MalwareHunterTeam and Michael Gillespie have described it as a low-effort “skidware” assembled from public code; however, despite its low-quality code, the ransomware is functional and can successfully encrypt systems if a Log4Shell attack succeeds.
Furthermore, the ransomware also uses a secure encryption method, and no flaw has been discovered in it (for the time being), meaning that once encrypted, victims will either need to restore from backups or pay the attackers to recover their files.
Luckily, the attacks pushing this threat right now are small in number, and this doesn’t appear to be a virulent issue.
Systems that have been hit can recognize a Khonsari attack by the .khonsari extension added to most of their files and the text file placed on their desktop that contains a ransom note like the one below. [Formatted for readability.]
Your files have been encrypted and stolen by the Khonsari family. If you wish to decrypt, call [redacted] or [redacted]. If you do not know how to buy btc, use a search engine to find exchanges. DO NOT MODIFY OR DELETE THIS FILE OR ANY ENCRYPTED FILES. IF YOU DO, YOUR FILES MAY BE UNRECOVERABLE.
The phone number listed in the ransom note appears to belong to a Louisiana business, and we don’t recommend calling it.
Besides the threat from Khonsari, Bitdefender also reported on other malware gangs abusing the same Log4Shell vulnerability to spread across the internet, such as DDoS and cryptomining botnets.
Chinese security firm Qihoo 360 said in a similar report on Monday that they’ve been tracking at least ten different groups abusing this vulnerability as well.
Israeli security firm Check Point also added that it has seen at least 60 variations of the Log4Shell exploit so far, many as a result of threat actors trying to evade detections and mitigations put in place since last week.
While an initial patch was released last week, yesterday, the Apache Software Foundation released Log4j version 2.16.0 that adds additional hardening against Log4Shell attacks, including disabling the JNDI component that is at the root of the vulnerability.
Log4j 2.16.0 is out and completely disables JNDI by default. https://t.co/WbrHCpkbjd— Chris Wysopal (@WeldPond) December 13, 2021
The post First Log4Shell attacks spreading ransomware have been spotted appeared first on The Record by Recorded Future.