Although Spring Cloud Functions are not as widespread as the Log4j library, and should provide a good separation from the hosting server, some draw the line between the two, due to the ease of exploitation over HTTP/s. This new vulnerability will definitely result in many threat actors launching campaigns for crypto-mining, ddos, ransomware, and as a golden ticket to break into organizations for the next years to come.
When Spring, the Java-based application, fell victim to cyberattacks, Akamai's Adaptive Security Engine detected zero-day attacks and protected customers against them.
Summary
***UPDATED March 30, 2022***
The Lapsus$ group is ramping up its already breakneck pace of infiltration, exfiltration, and extortion campaigns against several high profile companies including Microsoft, NVIDIA, Samsung, and others.
Threat Type
Threat Group
Overview
***UPDATE #4, March 30, 2022***
Lapsus$ returns from its self-imposed hiatus to compromise Globant, a software services company. Images of data extracted as well as credentials for the DevOps structure were posted on the group's Telegram