![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJPr81DASLMYFC5az8KlOL0TnT171kAV2s_Cfve7t5W3bb9FzzB9MDTru7ykbpM3uelGLtlCKkkhdR1oNiYpNRK-g-YpN7OLKZ_z5bOijTHda9do0YT7U80AOhC3bbqgCT_yFmi88-qIE4_LulCP0m7x2aW4OWl0LTipYEkbsupnKSjA8cLcIiQjZNbrvI/s1600/botnet.jpg)
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network.
“The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible,” web infrastructure and security
Source:: The Hackers News