Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join Tim Segato, Director, Product Management and Ryan Westman, Manager,…
Join us for a live security brefing with (ISC)2 members.
Ask questions and hear from Cybersecurity experts from eSentire,…
Apache Log4j is a Java logging framework, highly prevalent in commercial and open-source software. Log4j is ubiquitous in commercial and open-source software and the vulnerability is relatively easy to exploit making it a significant challenge to defend.
The Log4j vulnerability is now associated with two Common Vulnerabilities and Exposures (CVE): CVE-2021-44228 & CVE-2021-45046. CVE-2021-45046 has been elevated from low severity (3.7) to critical (9.0).
eSentire’s Threat Response Unit (TRU) has observed scanning for the vulnerability, Cobalt Strike activity and crypto mining payloads. TRU has also observed the targeted of webservers. There have also been reports in the wild of the Log4j exploitation resulting in ransomware deployments. We recommend organizations scan their networks regularly, on an ad hoc basis, outside of standard cadences, to identify vulnerable assets and prioritize their patching.
On December 9th, security researchers released details and a Proof-of-Concept (PoC) exploit code for CVE-2021-44228 (CVSS: 10), impacting the Apache Log4j Java-based logging library. If exploited successfully, a threat actor would have Remote Code Execution abilities, which would allow a remote and unauthenticated threat actor to take control of systems with vulnerable versions of Apache Log4j.
By December 10th, eSentire’s TRU team had observed exploitation attempts. We developed and deployed rules for our MDR for Network, Endpoint and Log services to identify exploitation activity. We began global threat hunts for exploit patterns and indicators of compromise.
On December 17th, Apache updated their advisory stating that “the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations.” CVE-2021-45046 was initially considered to be a Denial of Service (DoS) vulnerability. New research suggests that exploitation may allow a remote threat actor to achieve Remote Code Execution and steal sensitive data from vulnerable systems under certain conditions.
On December 28th, Apache released additional updates to their advisory related to CVE-2021-44832 indicating that an “attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.” There remains some debate in the community as to whether this additional fix warrants a CVE. However, it is recommended that organizations ensure applications running Log4j are updated to the most recent release (2.17.1).
To learn how eSentire’s Managed Vulnerability Service can help secure your environment against vulnerabilities like Log4j, connect with a security specialist today.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.