Why Haven't We Seen a Devastating Log4j Worm Yet?

  Рет қаралды 12,811

Marcus Hutchins

Marcus Hutchins

Күн бұрын

Пікірлер: 36
@sandwich2473
@sandwich2473 2 жыл бұрын
it's always nice to see very knowledgeable people shine light on a topic to get rid of some unnecessary fear
@stoff1980
@stoff1980 2 жыл бұрын
Yup always good to see a banking malware author talk about malware and vulns etc
@ko-Daegu
@ko-Daegu 2 жыл бұрын
@@stoff1980 didn't fbi kidnapped him and said they didn't until later said it's cuz they are investigating so why not lied once lie again
@itsme7570
@itsme7570 2 жыл бұрын
@@stoff1980 what banking malware did he write?
@eldiablopotato
@eldiablopotato 2 жыл бұрын
Thank you for sharing your insights regarding a log4j worm.
@malwareanonymous6282
@malwareanonymous6282 2 жыл бұрын
Thanks marcus I always learn new things from you! You are the best!
@atsurao
@atsurao 2 жыл бұрын
Great video! Amazing explanation to be able to explain things like these so clearly!
@adamsnetiker
@adamsnetiker 10 ай бұрын
Great explanation! I just stumbled upon this and love how you makie it so easy to understand.
@ThePurpleTux
@ThePurpleTux 2 жыл бұрын
That's actually a really good explanation. Kudos to you
@terranovatech8672
@terranovatech8672 2 жыл бұрын
Not sure what you are using for noise reduction, but I'd turn it off or toggle it down. It makes your pauses completely silent and it makes it seem choppy. But aside from that, awesome Vid as always! Much love!
@MalwareTechBlog
@MalwareTechBlog 2 жыл бұрын
Dunno, will have to look through my settings to see if I can find what's doing that
@chauh8401
@chauh8401 2 жыл бұрын
marcus is there anything you can't do?!! these vids are brilliant!
@tonybutt2864
@tonybutt2864 2 жыл бұрын
Thanks, that's helpful. My thinking on this, much of which you already covered, is that the target space is too heterogenous for a worm to be effective, and there are not enough of any particular target to be useful. As well, most vulnerable servers do not use priveleged accounts. Some environments that expose (for instance) a vulnerable Splunk server could then have their internal Splunk servers compromised, which has concerned some security teams. Mostly compromises would ve for 'positional access' - a stepping stone to the rest of the environment. Limiting this is that most vulnerable software should not be running in a privileged account, so local privilege escalation is not a given. That hopefully sets the bar too high for many ransomware access brokers, but not nation states or similar. Perhaps it's plausible that this might be used to wipe logging systems after an event?
@robertandrewww
@robertandrewww 2 жыл бұрын
Great explanation as always Bellerophon
@berndeckenfels
@berndeckenfels 2 жыл бұрын
Also lot of the exploits (like the one you analyzed) use a poor exploit chain (class factory which does not work on newer java runtime or does depend on specific gadget chains)
@raghvendramishr
@raghvendramishr 2 жыл бұрын
Perfect explanation.
@adambrown3918
@adambrown3918 2 жыл бұрын
Great video! Thank you so much. 😀👍
@himashhimash6017
@himashhimash6017 2 жыл бұрын
Good one .... it is good have you on youtube and active
@amberrose6978
@amberrose6978 2 жыл бұрын
When are you guys gonna do another zoom chat? I miss you all. Hope all is well
@alex_lamarche
@alex_lamarche 2 жыл бұрын
thanks for the info marcus
@fwiii1831
@fwiii1831 2 жыл бұрын
Great video. What do I need to do with my custom exe to bypass most AV softwares possible? I am ready for your instructions :)
@calebbenson7293
@calebbenson7293 2 жыл бұрын
What a great video! 👍
@atlasfenix6995
@atlasfenix6995 2 жыл бұрын
Awesome informative video!! 👍👍👍
@chauh8401
@chauh8401 2 жыл бұрын
you should look into getting an agent and doing like a netflix show!
@th30c0der3
@th30c0der3 2 жыл бұрын
ty are you back to post reverse engineering vids pleas ?
@graemepennell
@graemepennell 2 жыл бұрын
Unfortunately the human psyche wants to do things because it can, to see its results, not always because it may or may not be effective.
@Versuffe
@Versuffe 2 жыл бұрын
Thank you. I can make the ultimate worm now!
@nagi603
@nagi603 2 жыл бұрын
I would like to upvote, but it's az 69, which describes the video perfectly. :D Great explainer.
@polonia66
@polonia66 2 жыл бұрын
Thanks
@pauljones9150
@pauljones9150 2 жыл бұрын
The thumbnail needs bolder text. Very nice video tho
@pauljones9150
@pauljones9150 2 жыл бұрын
And the text shouldn't double the video title.
@liamowen
@liamowen 2 жыл бұрын
A vun for the script kiddies, to deface websites like it was the 00s W.O.H style.
@MrHappy-hs6sn
@MrHappy-hs6sn 2 жыл бұрын
nice
@oa9842
@oa9842 2 жыл бұрын
the worm doesn't need to be there for the state agencies to take severe mitigation measures, and those measures themselves would cause the problem
@hyperboy9672
@hyperboy9672 2 жыл бұрын
Happe..
Why Microsoft Is To Blame For The Crowdstrike Outage (Not The EU)
17:37
Why I'm Never Concerned About New Technologies (Or Being Replaced)
7:30
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 5 МЛН
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 39 МЛН
Players push long pins through a cardboard box attempting to pop the balloon!
00:31
Getting a Tech Job With No Qualifications
9:57
Marcus Hutchins
Рет қаралды 22 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 2,2 МЛН
Log4J & JNDI Exploit: Why So Bad? - Computerphile
26:31
Computerphile
Рет қаралды 500 М.
Why VPNs are a WASTE of Your Money (usually…)
14:40
Cyberspatial
Рет қаралды 1,5 МЛН
how is this hacking tool legal?
11:42
Low Level
Рет қаралды 403 М.
Log4j Lookups in Depth // Log4Shell CVE-2021-44228 - Part 2
16:07
LiveOverflow
Рет қаралды 69 М.
Why Cybersecurity Training is a SCAM
10:37
Technical Institute of America
Рет қаралды 239 М.
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 806 М.
Is ChatGPT a Better Hacker Than Me?
11:37
Marcus Hutchins
Рет қаралды 28 М.
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 5 МЛН