Log4j: exploit attempts from all angles, including DMARC reports

If you’ve been online at all in the last week you’ll most likely have come across several articles about the log4j vulnerability. Companies around the world are still scrambling to assess whether they are vulnerable, and patching up their systems in an attempt to stay secure.

What is the log4j vulnerability?

Every software application produces logs that are used for various purposes including auditing, alerting about errors, checking that the system is working, etc. Making sense of this output and funneling parts of it to different systems can become quite complex, especially if there’s a requirement to change these rules dynamically. 

In 2013 a change was added to log4j, a popular logging library for Java systems, that allowed external systems to dynamically alter its behaviour. The side effect of this change was that this interface was now too permissive, allowing external systems to run any arbitrary code into the vulnerable system.

At first glance, it might seem that this is a network or web-based attack that could be trivially patched by a WAF (Web Application Firewall) rule. But the reality is that in today’s complex and interconnected systems there may well be several ways hackers can use to get to a vulnerable system. 

Security analysts are finding attempts to exploit via filename, metadata and contents, usernames, cookies, and more. In summary, any type of input that could potentially be read and executed by a machine could leave your systems vulnerable.

DMARC reports as another exploit attempt

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is the modern email authentication standard used by all major email servers (Office 365, Google Workspace, and commercial secure email gateways) to authenticate outbound and inbound email. When implemented by an organization at the strongest policy of p=reject, it stops bad actors from impersonating its domain to send malicious emails. It’s an open standard and is used by organizations around the world to protect employees, customers, and supply chains from phishing attacks, and brand reputations from exploitation. 

As part of auditing our own systems to ensure that we were not affected by this vulnerability, we at Red Sift spotted another creative exploit attempt. Given the nature of the DMARC protocol, the email address of the reports’ processor for a given domain is public knowledge, and there is also a standard describing the format of such a report. And for this reason, our processing of DMARC reports includes careful validation of the various input fields to make sure they conform to the standard. 

Last week our validation engine flagged a few non-compliant reports and upon further investigation, we identified them to be attempts to exploit the log4j vulnerability. A malicious actor tried to compose a DMARC report that contained the JNDI exploit string as part of one of the fields:

Here, the hackers were hoping that one of our systems would somehow execute the <source_ip> line and trigger the exploit. However, in our case, we don’t use log4j as part of our software stack and have strong validation in place that would capture this attack even if we did. So, this record was rejected and this was an unsuccessful attempt.

Final considerations

The log4j vulnerability will still be around for some time and security teams will have a busy holiday season patching up systems. But our advice for organizations is to be thorough in their assessment. Don’t only look internally but also at your supply chain, given the number of ways this vulnerability can be exploited.

Ultimately this is another stark reminder that hackers will try all channels as a way to infiltrate a system, not only the obvious ones. But in light of such a serious issue, we’ll leave you with some (appropriate) humour about the nature of what we’re facing. Thank you internet creative hive.


To start protecting your business, brand, customers, and supply chain from impersonation attacks, why not sign up for a free trial of our award-winning product OnDMARC?

PUBLISHED BY

Randal Pinto

20 Dec. 2021

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more
Certificates

Never miss an expiring certificate again with Red Sift Certificates Lite

Francesca Rünger-Field

SSL/TLS certificates are the backbone of secure, uninterrupted digital experiences—but managing them effectively to prevent downtime remains a persistent challenge. With browser and certificate authorities looking to reduce certificate durations to as little as 90 or even 47 days, keeping track of renewals has never been more critical. That’s why we’re excited to introduce…

Read more
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more