Cyber Playbook: How to Reverse an in-the-wild Log4J Java Class
Contributed by Cody Craig, Cyber Investigator, CYDERES Threat actors have been observed dropping malicious Java Class files during Log4Shell exploitation. The sample reviewed in this post showed indication that it came from an attack that exploited the Log4Shell vulnerability via Apache in VMware Horizon. A deeper look into the capabilities and use of the malicious Java Class file observed is... Read More
February 28, 2022
Thought Leadership, Cybersecurity Conversations, From the HG Cyber Playbook