FritzFrog Returns with Log4Shell and PwnKit Spreading Malware Inside Your Network

The threat actor responsible for the FritzFrog peer-to-peer (P2P) botnet has reappeared with a new version that uses the Log4Shell vulnerability to spread internally within a network that has already been infiltrated.

Web infrastructure and security provider Akamai stated in a study shared with The Hacker News that “the vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible.”

The Golang-based virus known as FritzFrog was initially discovered in August 2020 by Guardicore, which is now a part of Akamai. Its main target is internet-facing servers that have weak SSH passwords read more FritzFrog Returns with Log4Shell and PwnKit Spreading Malware Inside Your Network.

Get up to date on the latest cybersecurity news and enhance your knowledge of cybersecurity with our thorough coverage of the dangers, breaches, and solutions.

Leave a Reply

Your email address will not be published. Required fields are marked *