Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks

computer security Exploit Hacks

Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks

The cybersecurity firm, CrowdStrike has warned that Chinese hackers are using the Log4Shell exploit tools to perform various post-exploitation operations.  The hacker group behind these malicious operations, Aquatic Panda was seen using the Log4Shell vulnerability, with the help of a large academic institution. In early December the Log4Shell and LogJam vulnerability, which were tracked as […]

The post Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks appeared first on GBHackers On Security.

Source: GB Hackers