Security researchers at Trend Micro have observed an active exploitation of the Spring4Shell vulnerability where threat actors were able to weaponize and execute the Mirai botnet malware on vulnerable servers in the Singapore region.
Trend Micro says most of the vulnerable setups were configured with the following features:
- Spring Framework versions before 5.2.20, 5.3.18, and Java Development Kit (JDK) version 9 or higher
- Apache Tomcat
- Spring-webmvc or spring-webflux dependency
- Using Spring parameter binding that is configured to use a non-basic parameter type, such as Plain Old Java Objects (POJOs)
- Deployable, packaged as a web application archive (WAR)
- Writable file system, such as web apps or ROOT
This of course is a major problem as if one group of threat actors taking advantage of this vulnerability, other threat actors are doing the same thing. Or will be doing the same thing soon enough.
I have sourced a pair of comments on this starting with Saryu Nayyar, CEO and Founder, Gurucul:
“This is another example of a known set of malware being leveraged to exploit a newly discovered set of vulnerabilities. Mirai is indeed a long standing and dangerous piece of malware that can deliver multiple destructive outcomes to organizations. Until vulnerabilities such as these can be patched, which can take weeks or months, organizations need to augment their threat detection, investigation and response programs to determine if they are already under attack and certainly find any signs of an attack early in the kill chain. This can allow them to perform emergency patching on systems if threatened. However, this requires a solution not only with advanced analytics and non-rule-based machine learning models to detect any variations employed when Mirai is executed, but also threat intelligence combined with risk analytics to prioritize and escalate to security teams once the attack is potentially found. These capabilities are critical for accelerating response and rallying security teams to identify and focus efforts on a serious active threat. Unfortunately, most current SIEM and XDR solutions lack this combination of features to be enough to stop this attack so organizations must look at more advanced solutions to better enable security teams. “
Chris Olson, CEO, The Media Trust is next:
“In the face of Log4Shell, many organizations rolled out patches to protect their internal systems and consumer-facing services. But the emergence of Spring4Shell reminds us that patching is only a temporary fix: as long as organizations are depending on third-party assets for website, app and backend development, they must exercise continual vigilance and monitoring to protect their users.”
This is likely the start of larger campaigns using this exploit. This sysadmins and security professionals should take this time to make sure that they aren’t vulnerable to being pwned by this exploit.

ESET Canada Sets Up New HQ In Thornhill
Posted in Commentary with tags ESET on April 11, 2022 by itnerdAmidst the work-from-home mandates throughout the past two years of the COVID-19 pandemic, ESET moved its Canadian headquarters from downtown Toronto to Commerce Valley Drive West in Thornhill. As staff begin returning to in-office work, ESET Canada will mark the official opening of its new location on April 11th with a private event for team members from across the country.
The new location is part of the second-largest tech hub in Canada, offers more square footage to accommodate a growing ESET Canada team and is accessible with both public transit and major arterial roads.
Regardless of its physical location, ESET remains committed to providing the expertise and products that help people and organizations stay safe in the cyberworld.
The move also coincides with a brand refresh for ESET, which represents the role it has played in the progress that digital technology has enabled – in short, a force for progress.
For more than 30 years, ESET has been providing digital protection as technology has advanced and progressed to change people’s lives, day-to-day activities and the way we do business. Progress in technology means the potential for a better world and society, but it is not without risk. As technology progresses, so too do those with malicious intentions; with every innovation comes someone who wants to exploit it for nefarious means.
Leave a comment »