IoC Extractor
This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.
Exploiting Log4Shell – How Log4J Applications Were HackedDATE : 2025-03-20T15:04:19
SOURCE : infosecwriteups.comFILE_HASH_SHA256:6f88430688108e512f7405ac3c73d47f5c370780b94182854ea2cddc6bd59929
Domain:hurricanelabs.com
medium.com
javarush.com
csoonline.com
malicious-server.com
logger.info
attacker.com
ghcr.io
Url:https://hurricanelabs.com/blog/log4j-letting-the-jndi-out-of-the-bottle
https://medium.com/satyendra.jaiswal/demystifying-jndi-simplifying-database-connectivity-in-java-applications-7132f59d01be
https://javarush.com/en/groups/posts/en.2650.using-jndi-in-java
https://www.csoonline.com/article/571789/how-to-properly-mitigate-the-log4j-vulnerabilities.html