CRN
  • Home
  • News
  • Security

Log4j threat affecting VMware Horizon servers ‘could escalate’: Huntress

By C.J. Fairfield on Jan 21, 2022 11:25AM
Log4j threat affecting VMware Horizon servers ‘could escalate’: Huntress

In The Spotlight

Introducing the CRN State of the MSP report

IoT Explained: What is the Internet of Things in Australia (June 2022)

Come to CRN's CyberSecurity Live Event!

See who was at Channel Meets: UC in Sydney

MSPs should remain on high alert after a Log4j vulnerability was found on VMware Horizon servers last week.

“People should definitely be concerned about it and should be reacting to it,” Roger Koehler, VP of threat operations at threat hunting firm Huntress, told CRN. “Tomorrow it could escalate. A lot of times these things go for sale on the black market and then people will buy it, confirm that it’s still valid and sell it again.”

The original flaw in the Java logging library Apache Log4j sat undiscovered for years and was identified in early December, sparking panic among vendors and solution providers about what data could be compromised and how fast it could be stolen from them.

Last week, Huntress discovered a Log4j threat to VMware Horizon, a virtual desktop application, that was being hit with Cobalt Strike, a commercial adversary simulation software that is widely stolen and used by threat actors.

On January 5, the UK’s National Health Service alerted that hackers were targeting Log4Shell vulnerabilities in VMware Horizon servers in an effort to establish persistent access via web shells, according to a Huntress blog. Web shells allow attackers to remotely execute commands.

“All of the hits so far were just of the web shells, so an attacker basically edited the file [in hopes] to come back later,” Koehler told CRN. “We realized that they actually did that back around December 25 to December 29, so it was almost like using one holiday to stage to then maybe come back to another holiday to do more activities.”

There are more than 25,000 VMware Horizon servers publicly accessible to the internet, according to search engine Shodan. Huntress covers 180 of those servers and found web shells on 18 systems as far back as Christmas day.

CRN US has reached out to VMware for comment.

As the Huntress team was looking at some antivirus detections that got caught by Cobalt Strike, they found that the attacker was escalating what they were working on.

“And as we started digging into it, we realized that there‘s a lot more going on and this was affecting VMware Horizon,” he said.

He said the threat advisory has a “tremendous” economic impact on MSPs as 10 per cent of the servers Huntress monitors were compromised.

Antivirus is protecting against a lot of the threats, he said, but this latest threat shows crypto miners being dropped and other activity happening.

“So far there‘s been no huge impact because we’re catching it and preventing it from our MSPs,” he said. “But they could laterally move and really get into their entire environment, or if they end up ransoming these hosts, it can be devastating. It can prevent us from actually logging in and doing our job.”

It’s hard to see the full impact, he said, until after the threat is gone. And it can be a hard fix.

Something like this threat where an administrator has to manually go in, update and patch it can be timely.

“That‘s why it’s really important for a lot of these MSPs, and other midmarket enterprises, to often talk about security in-depth, putting layers where you shouldn‘t just rely on one simple thing,” he said. “There’s always going to be something out there and you really need to have that layer of security.”

Patching is also crucial, he added.

In light of the vulnerability, Huntress has reached out to MSPs they work with to let them know they’re monitoring it 24/7. In response, some MSPs installed Huntress platforms on their VMware Horizon servers.

Although there is evidence that this started around Christmas, Koehler said the threat is very much ongoing.

Huntress continues to dig into the vulnerability and found a few other attack methods in doing so.

“We‘re constantly finding new things. We’re reporting those to the partners and just urging more and more people to patch it and get this mitigated as quickly as possible before it escalates into something more,” he said.

 

 

 

 

This article originally appeared at crn.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © 2018 The Channel Company, LLC. All rights reserved.
Tags:
horizon log4j security vmware

Partner Content

Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Promoted Content
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Why rock-solid MSPs services require unified infrastructure monitoring
Promoted Content
Why rock-solid MSPs services require unified infrastructure monitoring
Tradewinds has turned unified communications into an easier upsell
Promoted Content
Tradewinds has turned unified communications into an easier upsell
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Promoted Content
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
How to prepare for the increasing demand for cloud-ready partners
Promoted Content
How to prepare for the increasing demand for cloud-ready partners

Sponsored Whitepapers

How vulnerability scans identify & protect against cyberthreats before criminals locate them
How vulnerability scans identify & protect against cyberthreats before criminals locate them
Monitoring & automation: A primer for MSPs
Monitoring & automation: A primer for MSPs
Endpoint Detection and Response
Endpoint Detection and Response
How to put your infrastructure into overdrive
How to put your infrastructure into overdrive
MSPs: Stack your solutions
MSPs: Stack your solutions
By C.J. Fairfield
Jan 21 2022
11:25AM
0 Comments

Related Articles

  • 10 vendors affected by the log4j vulnerability
  • US says unpatched VMware products pose ‘unacceptable risk'
  • Nation-state, ransomware groups using Log4j flaw
  • Log4j flaw repercussions will last years: experts
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Great people are the key to meeting customer and staff demands for flexibility

Great people are the key to meeting customer and staff demands for flexibility

Atturra acquires MOQ Limited for $15.5 million

Atturra acquires MOQ Limited for $15.5 million

Strong password management is a business essential

Strong password management is a business essential

Microsoft delays NCE subscription shift indefinitely

Microsoft delays NCE subscription shift indefinitely

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.