Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
The FritzFrog botnet, known for its persistent and sophisticated attacks, has returned with a new arsenal, leveraging the Log4Shell vulnerability (CVE-2021-44228) alongside PwnKit (CVE-2021-4034) to infiltrate networks.
Recently, we learned that Log4Shell is being exploited in a brute-force manner, targeting vulnerable Java applications within compromised networks. This marks a significant shift in FritzFrog's tactics, as it now focuses on internal hosts rather than solely targeting externally accessible assets. By exploiting Log4Shell, FritzFrog can potentially breach systems that may have been overlooked during initial vulnerability patching efforts. Also, FritzFrog’s use of the PwnKit flaw allows them to achieve local privilege escalation, enhancing its persistence and allowing for deeper infiltration into compromised networks.
Originally identified in January 2020, FritzFrog has evolved, expanding its targets beyond internet-facing servers with weak SSH credentials to include various sectors such as healthcare, education, and government. Also, the botnet has enhanced its SSH brute-forcing capabilities to identify specific targets and evade traditional security measures.
If organizations have not already done so, Avertium strongly recommends patching the Log4Shell and PwnKit vulnerabilities across all endpoints, including internal systems.
INDICATORS OF COMPROMISE (IoCs)
File Hashes
SUPPORTING DOCUMENTATION
Apache Log4j Core: CVE-2021-44832: Apache Log4j2 Remote Code Execution (rapid7.com)
Sophisticated FritzFrog P2P Botnet Returns After Long Break - SecurityWeek
FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities - Help Net Security
LIVEcommunity - Ubuntu Patch for CVE-2021-4034 - LIVEcommunity - 461834 (paloaltonetworks.com)
USN-5252-2: PolicyKit vulnerability | Ubuntu security notices | Ubuntu
USN-5252-1: PolicyKit vulnerability | Ubuntu security notices | Ubuntu