Exploitation of Vulnerable VMware Horizon to LOG4J

Detecting initial exploitation attempt against VMware Horizon deployments running vulnerable versions of Log4j.

Sigma rule (View on GitHub)

 1title: Exploitation of Vulnerable VMware Horizon to LOG4J 
 2id: 3eb91f0a-0060-424a-a676-59f5fdd75610
 3description: Detecting initial exploitation attempt against VMware Horizon deployments running vulnerable versions of Log4j.
 4status: experimental
 5date: 2022/01/14
 6author: \@kostastsale
 7references:
 8    - https://portswigger.net/daily-swig/vmware-horizon-under-attack-as-china-based-ransomware-group-targets-log4j-vulnerability
 9    - https://twitter.com/TheDFIRReport/status/1482078434327244805
10    - https://www.pwndefend.com/2022/01/07/log4shell-exploitation-and-hunting-on-vmware-horizon-cve-2021-44228/
11logsource:
12    category: process_creation
13    product: windows
14detection:
15    selection1:
16        ParentImage|endswith:
17            - '\ws_TomcatService.exe'
18    filter:
19        Image|endswith:
20            - '\cmd.exe'
21            - '\powershell.exe'
22    condition: selection1 and filter
23falsepositives:
24    - Unlikely
25level: high
26tags:
27   - attack.initial_access
28   - attack.t1190```

References

Related rules

to-top