What We Do
How we do it
Resources
Company
ABOUT ESENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Nov 07, 2022
Global Cybersecurity Leader eSentire Partners with InfoTrust to Deliver 24/7 Multi-Signal MDR and IR Services Across Australia
Waterloo, ON and Sydney, Australia – November 9, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has expanded its presence in Australia via a strategic partnership with InfoTrust. InfoTrust is a leading specialized cybersecurity provider that combines next-generation security controls, with the InfoTrust “Connective Tissue” of customer success,…
Read More
Partners
PARTNER PROGRAM
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
ECOSYSTEM PARTNER RESOURCES
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Blog — Jan 12, 2022

What You Need to Know About Log4j

3 minutes read
Speak With A Security Expert Now

Apache Log4j is a Java logging framework, highly prevalent in commercial and open-source software. Log4j is ubiquitous in commercial and open-source software and the vulnerability is relatively easy to exploit making it a significant challenge to defend.

The Log4j vulnerability is now associated with two Common Vulnerabilities and Exposures (CVE): CVE-2021-44228 & CVE-2021-45046. CVE-2021-45046 has been elevated from low severity (3.7) to critical (9.0).

eSentire’s Threat Response Unit (TRU) has observed scanning for the vulnerability, Cobalt Strike activity and crypto mining payloads. TRU has also observed the targeted of webservers. There have also been reports in the wild of the Log4j exploitation resulting in ransomware deployments. We recommend organizations scan their networks regularly, on an ad hoc basis, outside of standard cadences, to identify vulnerable assets and prioritize their patching.

Full Log4j Timeline

On December 9th, security researchers released details and a Proof-of-Concept (PoC) exploit code for CVE-2021-44228 (CVSS: 10), impacting the Apache Log4j Java-based logging library. If exploited successfully, a threat actor would have Remote Code Execution abilities, which would allow a remote and unauthenticated threat actor to take control of systems with vulnerable versions of Apache Log4j.

By December 10th, eSentire’s TRU team had observed exploitation attempts. We developed and deployed rules for our MDR for Network, Endpoint and Log services to identify exploitation activity. We began global threat hunts for exploit patterns and indicators of compromise.

On December 17th, Apache updated their advisory stating that “the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations.” CVE-2021-45046 was initially considered to be a Denial of Service (DoS) vulnerability. New research suggests that exploitation may allow a remote threat actor to achieve Remote Code Execution and steal sensitive data from vulnerable systems under certain conditions.

On December 28th, Apache released additional updates to their advisory related to CVE-2021-44832 indicating that an “attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.” There remains some debate in the community as to whether this additional fix warrants a CVE. However, it is recommended that organizations ensure applications running Log4j are updated to the most recent release (2.17.1).

Recommendations from our Threat Response Unit (TRU)

How eSentire secures our customer environments 24/7

Additional Resources from eSentire:

To learn how eSentire’s Managed Vulnerability Service can help secure your environment against vulnerabilities like Log4j, connect with a security specialist today.

View Most Recent Blogs
eSentire
eSentire

eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.