Friday, February 7, 2025
HomeCyber Security NewsIranian state-sponsored Actors Exploiting Log4j 2 Flaws in Unpatched Systems

Iranian state-sponsored Actors Exploiting Log4j 2 Flaws in Unpatched Systems

Published on

SIEM as a Service

Follow Us on Google News

As far as exploiting unpatched Log4j systems to target Israeli entities are concerned, the Iranian state-sponsored threat actors leave no stone unturned to exploit these vulnerabilities, indicating that there is still a long tail for fixing this vulnerability.

It is believed that the group behind the latest set of activities has been identified as MuddyWater, an umbrella threat group. The organization has connections with Iran’s intelligence apparatus, MOIS.

As a distinctive aspect of the attacks, the SysAid Server instances used in the initial attack remained unsecured against the Log4Shell vulnerability. In this regard, the actors have departed from their traditional pattern of compromising target environments by leveraging VMware applications.

Mercury uses both custom and well-known hacking tools, as well as integrated operating system tools, to set up a hands-on keyboard attack, once it has gained access to the target organization. 

Once the malware begins to establish persistence, it dumps credentials and moves throughout the organization using both custom and well-known hacking tools.

MERCURY Techniques & Tooling

These are some of the most common techniques used by Mercury:-

  • Adversary-in-the-mailbox phishing
  • Use of cloud file-sharing services
  • Use of commercial remote access applications
  • Tooling
  • Targeting

During the period from July 23 to July 25, 2022, Microsoft’s threat intelligence team observed a number of attacks conducted by foreign entities.

Reconnaissance is the primary function of most commands. This is done by downloading the actor’s tool for lateral movement and persistence through one encoded PowerShell script.

In the aftermath of the successful compromise, it is said that web shells were deployed to allow commands to be executed through the web. A lateral movement would then be possible, which would assist the actor in the process of reconnaissance, persistence, credential theft, etc.

A remote monitoring and management tool called eHorus is also used for C2 communications during intrusions, along with a reverse-tunneling tool called Ligolo, which is the tool of choice for adversaries for reverse tunneling communications.

Commands Executed

Here below we have mentioned the commands that are executed:-

  • cmd.exe /C whoami
  • cmd.exe /C powershell -exec bypass -w 1 -enc UwB….
  • cmd.exe /C hostname
  • cmd.exe /C ipconfig /all
  • cmd.exe /C net user
  • cmd.exe /C net localgroup administrators
  • cmd.exe /C net user admin * /add
  • cmd.exe /C net localgroup Administrators admin /add
  • cmd.exe /C quser

Recommendation

Here below we have mentioned all the mitigations provided by the security experts:-

  • It would be a good idea to check if your network uses SysAid.
  • For guidance on how to prevent, detect, and hunt for the exploitation of the Log4j 2 vulnerability, please refer to the detailed Guidance.
  • Assess your environment for possible intrusions using the included indicators of compromise.
  • Inbound traffic from IP addresses listed in the indicator of the compromise table should be blocked. 
  • Verify authenticity and investigate any anomalous behavior for remote access infrastructure, including single-factor authentication accounts. 
  • MFA mitigates potential credential compromise and ensures all remote connections are MFA enabled.

Secure Azure AD Conditional Access – Download Free White Paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a...

Dell Update Manager Plugin Flaw Exposes Sensitive Data

Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...

Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution

Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Former Google Engineer Charged for Allegedly Stealing AI Secrets for China

A federal grand jury has indicted Linwei Ding, also known as Leon Ding, a...

Dell Update Manager Plugin Flaw Exposes Sensitive Data

Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update...

DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption

DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app...