‘Proxyjacking’ Cybercriminals Exploit Log4j in Emerging, Lucrative Cloud Attacks

Cybersecurity experts at Sysdig have discovered a significant new cyber attack vector that hijacks legitimate proxyware services. Dubbed “proxyjacking,” this method allows hackers to exploit cloud-based systems to make a large passive income. The hackers can compromise a system’s Log4j vulnerability without the owner’s knowledge, enabling them to sell the IP to a proxyware service and collect the generated profit. Proxyjacking leaves a minimal CPU footprint, making it difficult to detect, and experts expect its use to continue to grow.