Vulnerable network, attacks focused on cryptocurrency minting

Ansa Live at 9 pm (ANSA)

At the moment, most of the attacks that exploit the Log4j vulnerability, on which the Italian Cybersecurity Agency raised an alarm yesterday, focus on the use of cryptomining, the abusive fabrication of digital currencies, but “the most advanced attackers they can act against high-level objectives “: is the opinion of the security company Check Point Software Technologies which explains that it has seen the appearance of new variants of the original flaw since Friday,” over 60 in less than 24 hours “.

On December 9, the vulnerability was reported in Apache, the popular Java library embedded in almost many Internet services or applications we know of, including Twitter, Amazon, Microsoft, Minecraft. “It can be exploited on both HTTP and HTTPS, that is the encrypted version of Internet browsing – the experts explain – The number of combinations of how to exploit it gives many alternatives to the attacker to bypass the protections. This means that a ‘layer’ of protection that’s not enough, and only a multi-layered security framework would provide resilient protection. Exploiting this vulnerability is simple – they add – and allows hackers to control Java-based web servers and remotely launch malicious code execution attacks. Al currently, most attacks focus on the use of cryptomining at the expense of the victims. ” Cryptominers are viruses that are installed on users’ computers without their knowledge, “stealing” the computing power needed to mint digital currencies such as bitcoins.

“We can only confirm the seriousness of this threat. On the surface, it is aimed at cryptominers, but we believe it is the harbinger of a hacker attack against a number of high-value targets such as banks, state security and critical infrastructure, “explains Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies.

.

Source From: Ansa

Share this article:

Leave a Reply

most popular