![]() ![]() You still need to verify whether this was a scan from a benign actor or an actual attack, by verifying whether a malicious payload was retrieved to the application’s host. The targeted application is vulnerable and has contacted the remote server to download a payload.See here for more information about the log-writing behavior of vulnerable Log4J instances.Identify the source IP of the attack and determine if the IP is known to present a malicious payload to execute code or if the IP has been used to scan for vulnerabilities to obtain risk context. ![]()
0 Comments
Leave a Reply. |