Feb. 1, 2024, 8:05 p.m. |

The Record by Recorded Future therecord.media



A variant of a long-running botnet is now abusing the Log4Shell vulnerability but is going beyond internet-facing applications and is targeting all hosts in a victim’s internal network. Researchers at Akamai explain the shift in the FritzFrog botnet — which has existed since 2020 — in a report released Thursday. The botnet typically uses brute-force

abusing akamai applications beyond botnet bug experts exploiting facing fritzfrog internal internal network internet log4shell log4shell vulnerability network report researchers running targeting victim vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC