TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tell HN: AWS warns us about irregular activity related to Log4shell

143 点作者 stunt超过 3 年前
We received a few emails from AWS about irregular activity related to Log4shell. I asked a few friends, and they got similar messages as well.<p>AWS provided a list of EC2 instances where they saw DNS queries which are typically used when targeting the log4j vulnerability, but they did not provide further information.<p>Have you received similar notification? What have you done about suspicious instances?<p>The ironic part is that AWS did that on Friday while half of the internet was making memes about the fact that the Log4j vulnerability was disclosed on Friday.

9 条评论

pwarner超过 3 年前
I think this is what AWS GuardDuty is supposed to do?<p>Edit: <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;security&#x2F;using-aws-security-services-to-protect-against-detect-and-respond-to-the-log4j-vulnerability&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;security&#x2F;using-aws-security-ser...</a><p>GuardDuty In addition to finding the presence of this vulnerability through Inspector, the Amazon GuardDuty team has also begun adding indicators of compromise associated with exploiting the Log4j vulnerability, and will continue to do so. GuardDuty will monitor for attempts to reach known-bad IP addresses or DNS entries, and can also find post-exploit activity through anomaly-based behavioral findings. For example, if an Amazon EC2 instance starts communicating on unusual ports, GuardDuty would detect this activity and create the finding Behavior:EC2&#x2F;NetworkPortUnusual. This activity is not limited to the NetworkPortUnusual finding, though. GuardDuty has a number of different findings associated with post exploit activity that might be seen in response to a compromised AWS resource. For a list of GuardDuty findings, please refer to this GuardDuty documentation.
taf2超过 3 年前
We received this as well except<p>1. We don’t use Java 2. The instances in the email are not in our accounts<p>We later received another email providing some vague reasons for this…<p>On a Friday evening I was not very happy spending time trying to hunt down the invalid instances
评论 #29608712 未加载
评论 #29610428 未加载
评论 #29612833 未加载
评论 #29608522 未加载
ruffrey超过 3 年前
We received this. We have no Java.<p>The notification from AWS referenced an instance we don’t have.<p>Some clarification from AWS would be nice. It made me wonder if it was related to an ELB or something.
评论 #29610928 未加载
评论 #29610442 未加载
jeppesen-io超过 3 年前
If I got the same (I have not seen the same for my AWS accounts), I would start capturing DNS traffic ASAP. Either at the VPC or host level. Cheap and easy to do most of the time<p>If not running Java (including agents), it may indicate some other type of compromise. Not something you should really ignore. Look at logs, cpu, disk, port usage just to start
评论 #29609342 未加载
neximo64超过 3 年前
Just a theory but it might be from an ssh user where the log4j string somehow resolves in a reverse dns lookup from the originating ip. Even when the login fails the lookup will be done.
sugarkjube超过 3 年前
I&#x27;m under the impression AWS in general proactively scans&#x2F;monitors for (some) vulnerabilites on its infrastructure and notifies it customers.<p>Years ago I once received a warning regarding a potential exposure. I don&#x27;t think it is very extensive, and in our case it wasn&#x27;t a big deal, but I considered that notification back then a pretty &quot;high level of service&quot;. Yes, such a notification can be scary, but better a little scare than having your systems compromised. This post on HN is reassurig that AWS tries to keep it that way. (We didn&#x27;t get the Log4Shell warning as we&#x27;re not vulnerable afaict)
Datagenerator超过 3 年前
Maybe it&#x27;s just advertising using this period to point at products like GuardDuty. These are golden times for most vendors and suppliers of anything Security related.
ldoughty超过 3 年前
Being a new and highly visible Target, maybe AWS sent out for positive emails when it saw an attempt on your VM? Or maybe one of AWS&#x27;s DNS servers was listed by AWS as being used by hackers, and your own VM happened to use AWS DNS resolution?<p>Just some thoughts. Sucks to lose time, but the notices probably helped more than it hurt? Part of the price of modern defense to get false positives...<p>If I get a suspicious instance, I usually snapshot the disk and blow it away. We don&#x27;t have a lot of resources for investigation, but we&#x27;d probably look at what we can get from logs, check scope of damage, and likely move on... We only run instances when we have no other choice, so they generally are pushed data, with no real pull access.
slenk超过 3 年前
Yeah, we got one saying our ECR images MAY be vulnerable. But everything else in the email made it sound quite urgent.
评论 #29610495 未加载