Security researchers have observed attackers exploiting the Spring4Shell Java-related flaw to install malware on target systems.
Researchers at security firms Trend Micro and Qihoo 360 watched the attacks emerge almost as soon as the bug become public.
While Spring4Shell isn’t quite as dire as Log4Shell, most security firms, the US Cybersecurity and Infrastructure Security Agency (CISA), and Microsoft are urging developers to patch it if they’re using Java Development Kit (JDK) from version 9.0 and upwards if the system is also using Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19, and earlier versions.
“After March 30, we started to see more attempts such as various webshells, and today, 2022-04-01 11:33:09(GMT+8), less than one day after the vendor released the advisory, a variant of Mirai, has won the race as the first botnet that adopted this vulnerability,” Qihoo 360 researchers noted.
Trend Micro researchers have also seen something similar.
“We observed active exploitation of Spring4Shell wherein malicious actors were able to weaponize and execute the Mirai botnet malware on vulnerable servers, specifically in the Singapore region,” said Trend Micro’s researchers.
“We also found