Log4j: How hackers are using the flaw to deliver this new ‘modular’ backdoor

Iran-backed hackers, known as APT35 or Phosphorous, are exploiting the Log4j vulnerability to create a new toolkit, warns security firm Check Point. The group is using the vulnerability to exploit public-facing Java applications with compromised versions of the Log4j error-logging component, enabling them to persistently communicate with command and control servers, and execute commands for further module deployment. Check Point has claimed APT35’s work on Log4j as sloppy and easily detectable.