{"id":10462,"date":"2023-03-30T09:00:31","date_gmt":"2023-03-30T05:00:31","guid":{"rendered":"https:\/\/me.kaspersky.com\/blog\/?p=10462"},"modified":"2023-03-28T01:27:59","modified_gmt":"2023-03-27T21:27:59","slug":"log4shell-still-active-2022","status":"publish","type":"post","link":"https:\/\/me.kaspersky.com\/blog\/log4shell-still-active-2022\/10462\/","title":{"rendered":"Log4Shell a year on"},"content":{"rendered":"<p>\u0642\u0628\u0644 \u0639\u0627\u0645\u060c \u0628\u0627\u0644\u062a\u062d\u062f\u064a\u062f \u0641\u064a \u062f\u064a\u0633\u0645\u0628\u0631 2021\u060c \u062a\u0633\u0628\u0628\u062a \u062b\u063a\u0631\u0629 Log4Shell (CVE-2021-44228) \u0641\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j \u0641\u064a \u0625\u062d\u062f\u0627\u062b \u0636\u062c\u0629 \u0643\u0628\u064a\u0631\u0629. \u0648\u0639\u0644\u0649 \u0627\u0644\u0631\u063a\u0645 \u0645\u0646 \u0623\u0646\u0647 \u0628\u062d\u0644\u0648\u0644 \u0627\u0644\u0631\u0628\u064a\u0639\u060c \u0644\u0645 \u062a\u0639\u062f \u0639\u0644\u0649 \u0627\u0644\u0635\u0641\u062d\u0627\u062a \u0627\u0644\u0623\u0648\u0644\u0649 \u0644\u0648\u0633\u0627\u0626\u0644 \u0627\u0644\u0625\u0639\u0644\u0627\u0645 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u0625\u0644\u0627 \u0623\u0646\u0647\u0627 \u0638\u0647\u0631\u062a \u0645\u0631\u0629 \u0623\u062e\u0631\u0649 \u0641\u064a \u0646\u0648\u0641\u0645\u0628\u0631 2022 \u0639\u0646\u062f\u0645\u0627 \u0648\u0631\u062f \u0623\u0646 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cpomagazine.com\/cyber-security\/iranian-hackers-installed-crypto-miner-in-federal-agency-after-exploiting-unpatched-log4shell-vulnerability\/\">\u0645\u062c\u0631\u0645\u064a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0642\u062f \u0627\u0633\u062a\u063a\u0644\u0648\u0627<\/a> \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0644\u0645\u0647\u0627\u062c\u0645\u0629 \u0648\u0643\u0627\u0644\u0629 \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0648\u062a\u062b\u0628\u064a\u062a \u0639\u0627\u0645\u0644 \u062a\u0639\u062f\u064a\u0646 \u0627\u0644\u0639\u0645\u0644\u0627\u062a \u0627\u0644\u0645\u0634\u0641\u0631\u0629 \u0641\u064a \u0623\u0646\u0638\u0645\u062a\u0647\u0627. \u0648\u0647\u0630\u0627 \u0641\u064a \u0627\u0644\u0648\u0627\u0642\u0639 \u0633\u0628\u0628 \u0648\u062c\u064a\u0647 \u0644\u0634\u0631\u062d \u0645\u0627\u0647\u064a\u0629 Log4Shell\u060c \u0648\u0644\u0645\u0627\u0630\u0627 \u0645\u0646 \u0627\u0644\u0633\u0627\u0628\u0642 \u0644\u0623\u0648\u0627\u0646\u0647 \u0634\u0637\u0628\u0647\u0627\u060c \u0648\u0643\u064a\u0641\u064a\u0629 \u062d\u0645\u0627\u064a\u0629 \u0628\u0646\u064a\u062a\u0643 \u0627\u0644\u062a\u062d\u062a\u064a\u0629.<\/p>\n<h2>\u0645\u0627 \u0647\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j\u061f<\/h2>\n<p>\u0646\u0638\u0631\u064b\u0627 \u0644\u0623\u0646 Java SDK \u0644\u0645 \u064a\u062f\u0639\u0645 \u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u062f\u062e\u0648\u0644 \u0641\u064a \u0627\u0644\u0628\u062f\u0627\u064a\u0629\u060c \u0643\u0627\u0646 \u0639\u0644\u0649 \u0627\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0643\u062a\u0627\u0628\u0629 \u062d\u0644\u0648\u0644\u0647\u0645 \u0627\u0644\u062e\u0627\u0635\u0629\u060c \u0648\u0628\u062d\u0644\u0648\u0644 \u0627\u0644\u0648\u0642\u062a \u0627\u0644\u0630\u064a \u0638\u0647\u0631\u062a \u0641\u064a\u0647 \u0627\u0644\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0644\u0644\u062a\u0637\u0628\u064a\u0642 Java Logging \u0627\u0644\u0631\u0633\u0645\u064a\u0629\u060c \u0643\u0627\u0646 \u0647\u0646\u0627\u0643 \u0628\u0627\u0644\u0641\u0639\u0644 \u0627\u0644\u0642\u0644\u064a\u0644 \u0645\u0646\u0647\u0627. \u0625\u062d\u062f\u0627\u0647\u0627 Apache Log4j\u060c \u0648\u0647\u064a \u0645\u0643\u062a\u0628\u0629 Java \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 \u0634\u0647\u064a\u0631\u0629 \u0642\u064a\u062f \u0627\u0644\u062a\u0637\u0648\u064a\u0631 \u0645\u0646\u0630 \u0639\u0627\u0645 2001. \u0648\u0647\u064a \u0628\u0637\u0628\u064a\u0639\u0629 \u0627\u0644\u062d\u0627\u0644 \u0644\u064a\u0633\u062a \u0627\u0644\u062d\u0644 \u0627\u0644\u0648\u062d\u064a\u062f \u0644\u0644\u062a\u0633\u062c\u064a\u0644 \u0641\u064a Java\u060c \u0648\u0644\u0643\u0646\u0647\u0627 \u0628\u0627\u0644\u062a\u0623\u0643\u064a\u062f \u0623\u062d\u062f \u0623\u0643\u062b\u0631 \u0627\u0644\u062d\u0644\u0648\u0644 \u0634\u064a\u0648\u0639\u064b\u0627. \u0648\u0647\u0646\u0627\u0643 \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u0628\u062f\u064a\u0644\u0629 \u0627\u0644\u062a\u064a \u062a\u064f\u0639\u062f \u0641\u064a \u0627\u0644\u0623\u0633\u0627\u0633 \u0641\u0631\u0648\u0639\u064b\u0627 \u0645\u0646 Log4j \u0638\u0647\u0631\u062a \u0641\u064a \u0645\u0631\u0627\u062d\u0644 \u0645\u062e\u062a\u0644\u0641\u0629 \u0645\u0646 \u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u0645\u0643\u062a\u0628\u0629.<\/p>\n<h2>\u0645\u0627 \u0647\u064a \u062b\u063a\u0631\u0629 Log4Shell\u061f<\/h2>\n<p>\u062a\u0633\u0645\u062d \u0645\u0643\u062a\u0628\u0629 Log4j \u0628\u062a\u0633\u062c\u064a\u0644 \u062c\u0645\u064a\u0639 \u0623\u062d\u062f\u0627\u062b \u0627\u0644\u0646\u0638\u0627\u0645 \u062a\u0644\u0642\u0627\u0626\u064a\u064b\u0627. \u0648\u062a\u0633\u062a\u062e\u062f\u0645 \u0645\u062c\u0645\u0648\u0639\u0629 \u0642\u064a\u0627\u0633\u064a\u0629 \u0645\u0646 \u0627\u0644\u0648\u0627\u062c\u0647\u0627\u062a \u0644\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0628\u064a\u0627\u0646\u0627\u062a \u062a\u0633\u0645\u064a\u0629 \u0648\u0648\u0627\u062c\u0647\u0629 \u062f\u0644\u064a\u0644 Java\u200f (JNDI). \u0641\u064a \u0646\u0648\u0641\u0645\u0628\u0631 2021\u060c \u0627\u062a\u0636\u062d \u0623\u0646\u0647 \u0623\u062b\u0646\u0627\u0621 \u0627\u0644\u062a\u0633\u062c\u064a\u0644\u060c \u064a\u0645\u0643\u0646\u0647\u0627 \u062a\u0634\u063a\u064a\u0644 \u0623\u0648\u0627\u0645\u0631 JNDI \u0627\u0644\u062a\u064a \u062a\u0645 \u062a\u0645\u0631\u064a\u0631\u0647\u0627 \u0625\u0644\u064a\u0647\u0627 \u0628\u0648\u0627\u0633\u0637\u0629 \u062d\u062f\u062b\u060c \u0639\u0644\u0649 \u0633\u0628\u064a\u0644 \u0627\u0644\u0645\u062b\u0627\u0644\u060c \u0641\u064a \u062d\u0642\u0644 \u0631\u0623\u0633 \u0627\u0644\u0637\u0644\u0628\u060c \u0623\u0648 \u0641\u064a \u0631\u0633\u0627\u0644\u0629 \u062f\u0631\u062f\u0634\u0629\u060c \u0623\u0648 \u0641\u064a \u0648\u0635\u0641 \u062e\u0637\u0623 404 \u0639\u0644\u0649 \u0635\u0641\u062d\u0629 \u0648\u064a\u0628.<\/p>\n<p>\u0627\u0644\u062b\u063a\u0631\u0629 <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/log4shell-critical-vulnerability-in-apache-log4j\/43124\/\" rel=\"noopener nofollow\">\u062a\u0633\u0645\u062d<\/a> \u0644\u0645\u062c\u0631\u0645\u064a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a\u060c \u0645\u0646 \u0627\u0644\u0646\u0627\u062d\u064a\u0629 \u0627\u0644\u0646\u0638\u0631\u064a\u0629 \u0639\u0644\u0649 \u0627\u0644\u0623\u0642\u0644\u060c \u0628\u0641\u0639\u0644 \u0645\u0627 \u064a\u0631\u063a\u0628\u0648\u0646 \u0628\u0647 \u0639\u0644\u0649 \u0646\u0638\u0627\u0645 \u0627\u0644\u0636\u062d\u064a\u0629 (\u0625\u0630\u0627 \u0644\u0645 \u064a\u062a\u0645 \u062a\u0637\u0628\u064a\u0642 \u0625\u062c\u0631\u0627\u0621\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u0625\u0636\u0627\u0641\u064a\u0629). \u0648\u0645\u0646 \u0627\u0644\u0646\u0627\u062d\u064a\u0629 \u0627\u0644\u0639\u0645\u0644\u064a\u0629\u060c \u0627\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0641\u064a \u0623\u063a\u0644\u0628 \u0627\u0644\u0623\u062d\u064a\u0627\u0646 Log4Shell \u0644\u062a\u062b\u0628\u064a\u062a \u0639\u0648\u0627\u0645\u0644 \u062a\u0639\u062f\u064a\u0646 \u063a\u064a\u0631 \u0642\u0627\u0646\u0648\u0646\u064a\u0629 \u0648\u062a\u0646\u0641\u064a\u0630 \u0647\u062c\u0645\u0627\u062a \u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629. \u063a\u064a\u0631 \u0623\u0646\u0647 \u0643\u0627\u0646\u062a \u0647\u0646\u0627\u0643 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.zdnet.com\/article\/log4shell-flaw-still-being-used-for-crypto-mining-botnet-building-and-rick-rolls\/\">\u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0627\u062a \u0623\u0643\u062b\u0631 \u063a\u0631\u0627\u0628\u0629<\/a> \u0623\u064a\u0636\u064b\u0627\u060c \u0645\u0646\u0647\u0627 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u0647\u062f\u0641\u0629\u060c \u0648\u0646\u0634\u0631 \u0634\u0628\u0643\u0629 Mirai \u0627\u0644\u0631\u0648\u0628\u0648\u062a\u064a\u0629\u060c \u0648\u062d\u062a\u0649 RickRolling \u2013 \u062a\u0634\u063a\u064a\u0644 \u0623\u063a\u0646\u064a\u0629 \u201cNever Gonna Give You Up\u201d (\u0627\u0644\u0625\u062f\u0645\u0627\u0646\u064a\u0629 \u0628\u0634\u0643\u0644 \u0645\u0632\u0639\u062c) \u0644\u0645\u063a\u0646\u064a \u0627\u0644\u062b\u0645\u0627\u0646\u064a\u0646\u064a\u0627\u062a \u0631\u064a\u0643 \u0623\u0633\u062a\u0644\u064a.<\/p>\n<h2>\u0644\u0645\u0627\u0630\u0627 \u062a\u064f\u0639\u062f \u062e\u0637\u064a\u0631\u0629 \u062c\u062f\u0627 \u0648\u0644\u0627 \u062a\u0632\u0627\u0644 \u062a\u064f\u0634\u0643\u0650\u0644 \u062a\u0647\u062f\u064a\u062f\u064b\u0627\u061f<\/h2>\n<p>Java \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0644\u063a\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629\u061b \u0648\u062a\u064f\u0633\u062a\u062e\u062f\u0645 \u0644\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u062e\u0644\u0641\u064a\u0629 \u2013 \u0645\u0646 \u062e\u0648\u0627\u062f\u0645 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0635\u063a\u064a\u0631\u0629 \u0625\u0644\u0649 \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0623\u062a\u0645\u062a\u0629 \u0627\u0644\u0635\u0646\u0627\u0639\u064a\u0629 \u0648\u0623\u062c\u0647\u0632\u0629 \u0625\u0646\u062a\u0631\u0646\u062a \u0627\u0644\u0623\u0634\u064a\u0627\u0621. \u0648\u0645\u0639\u0638\u0645 \u0647\u0630\u0647 \u0627\u0644\u0623\u0646\u0638\u0645\u0629 \u062a\u064f\u0646\u0641\u0630 \u0627\u0644\u062a\u0633\u062c\u064a\u0644 \u0628\u0637\u0631\u064a\u0642\u0629 \u0623\u0648 \u0628\u0623\u062e\u0631\u0649. \u0648\u0639\u0644\u0649 \u0645\u062f\u0649 \u0633\u0646\u0648\u0627\u062a\u060c \u0643\u0627\u0646\u062a \u0623\u0633\u0647\u0644 \u0637\u0631\u064a\u0642\u0629 \u0644\u0644\u0642\u064a\u0627\u0645 \u0628\u0630\u0644\u0643 \u0647\u064a \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0645\u0643\u062a\u0628\u0629 Log4j. \u0648\u0639\u0646\u062f\u0645\u0627 \u062a\u0645 \u0627\u0644\u0625\u0628\u0644\u0627\u063a \u0639\u0646 \u0648\u062c\u0648\u062f \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u062f\u064a\u0633\u0645\u0628\u0631 2021\u060c \u0623\u0639\u0644\u0646 \u0627\u0644\u062e\u0628\u0631\u0627\u0621 \u0623\u0646\u0647\u0627 \u0633\u062a\u0643\u0648\u0646 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-why-it-will-still-be-causing-problems-a-decade-from-now\/\">\u0645\u0634\u0643\u0644\u0629 \u062c\u0633\u064a\u0645\u0629 \u0644\u0633\u0646\u0648\u0627\u062a \u0639\u062f\u064a\u062f\u0629 \u0642\u0627\u062f\u0645\u0629<\/a>. \u0648\u0625\u0644\u064a\u0643\u0645 \u0627\u0644\u0633\u0628\u0628:<\/p>\n<ul>\n<li>\u062a\u064f\u0633\u062a\u062e\u062f\u0645 Log4j \u0641\u064a \u0645\u062c\u0645\u0648\u0639\u0629 \u0643\u0628\u064a\u0631\u0629 \u0645\u0646 \u062a\u0637\u0628\u064a\u0642\u0627\u062a Java. \u0641\u064a \u0648\u0642\u062a \u0627\u0644\u0627\u0643\u062a\u0634\u0627\u0641\u060c \u0643\u0627\u0646\u062a \u0627\u0644\u062b\u063a\u0631\u0629 \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0623\u0643\u062b\u0631 \u0645\u0646 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/security.googleblog.com\/2021\/12\/understanding-impact-of-apache-log4j.html\">35000 \u062d\u0632\u0645\u0629 (\u0623\u062f\u0648\u0627\u062a) \u0641\u064a Maven Central<\/a> (\u0623\u0643\u0628\u0631 \u0645\u0633\u062a\u0648\u062f\u0639 \u0644\u062d\u0632\u0645 Java)\u060c \u0648\u0647\u0648 \u0645\u0627 \u064a\u064f\u0645\u062b\u0644 8% \u0645\u0646 \u0625\u062c\u0645\u0627\u0644\u064a \u0639\u062f\u062f\u0647\u0627. \u0648\u0641\u0642\u064b\u0627 \u0644\u0644\u062e\u0628\u0631\u0627\u0621\u060c \u0641\u0625\u0646 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.itpro.co.uk\/security\/zero-day-exploit\/361847\/log4shell-zero-day-vulnerability-numbers-revealed\">\u062d\u0648\u0627\u0644\u064a 40% \u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0641\u064a \u062c\u0645\u064a\u0639 \u0623\u0646\u062d\u0627\u0621 \u0627\u0644\u0639\u0627\u0644\u0645<\/a> \u0643\u0627\u0646\u062a \u0645\u064f\u0639\u0631\u0636\u0629 \u0644\u0644\u062e\u0637\u0631 \u0645\u0646 Log4Shell.<\/li>\n<li>\u0625\u0644\u0649 \u062c\u0627\u0646\u0628 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0643\u0645\u0628\u064a\u0648\u062a\u0631 \u0648\u0627\u0644\u062e\u0648\u0627\u062f\u0645 \u0627\u0644\u062a\u0642\u0644\u064a\u062f\u064a\u0629\u060c \u062a\u064f\u0633\u062a\u062e\u062f\u0645 Java \u0623\u064a\u0636\u064b\u0627 \u0641\u064a \u0627\u0644\u0645\u0639\u062f\u0627\u062a \u0627\u0644\u0635\u0646\u0627\u0639\u064a\u0629 \u0648\u0627\u0644\u0637\u0628\u064a\u0629 \u0648\u0627\u0644\u0645\u062a\u062e\u0635\u0635\u0629 \u0627\u0644\u0623\u062e\u0631\u0649. \u0648\u0645\u0646 \u0627\u0644\u0645\u0639\u0631\u0648\u0641 \u0623\u064a\u0636\u064b\u0627 \u0623\u0646 \u0647\u0630\u0647 \u0627\u0644\u0645\u0639\u062f\u0627\u062a \u062a\u0633\u062a\u0641\u064a\u062f \u0645\u0646 \u0645\u0643\u062a\u0628\u0629 Log4j.<\/li>\n<li>\u0642\u062f \u064a\u0642\u0648\u0645 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0648\u0646 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u0648\u0646 \u0644\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 Log4j \u062f\u0627\u062e\u0644\u064a\u064b\u0627 \u0628\u062a\u0623\u062c\u064a\u0644 \u062a\u062d\u062f\u064a\u062b\u0647\u0627\u060c \u0625\u0630\u0627 \u0644\u0645 \u064a\u0643\u0648\u0646\u0648\u0627 \u0639\u0644\u0649 \u062f\u0631\u0627\u064a\u0629 \u0628\u0623\u0646 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629.<\/li>\n<li>\u0643\u0627\u0646 \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0623\u0646 \u064a\u062a\u0639\u0631\u0636 \u0645\u0637\u0648\u0631\u0648 \u0627\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u062a\u064a \u062a\u0633\u062a\u062e\u062f\u0645 \u0645\u0643\u062a\u0628\u0629 Log4j \u0644\u0644\u0625\u0641\u0644\u0627\u0633 \u0645\u0646\u0630 \u0641\u062a\u0631\u0629 \u0637\u0648\u064a\u0644\u0629\u060c \u0623\u0648 \u0645\u063a\u0627\u062f\u0631\u0629 \u0627\u0644\u0633\u0648\u0642\u060c \u0623\u0648 \u0633\u062d\u0628 \u0627\u0644\u062f\u0639\u0645 \u0627\u0644\u0645\u062e\u0635\u0635 \u0644\u0628\u0631\u0627\u0645\u062c\u0647\u0645. \u062d\u062a\u0649 \u0625\u0630\u0627 \u0623\u0631\u0627\u062f \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0648\u0646 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u0648\u0646 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u060c \u0641\u0642\u062f \u0644\u0627 \u064a\u0643\u0648\u0646 \u0647\u0630\u0627 \u0627\u0644\u062e\u064a\u0627\u0631 \u0645\u062a\u0627\u062d\u064b\u0627\u060c \u0628\u064a\u0646\u0645\u0627 \u0642\u062f \u0644\u0627 \u064a\u0643\u0648\u0646 \u0627\u0644\u062a\u0628\u062f\u064a\u0644 \u0625\u0644\u0649 \u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0623\u062e\u0631\u0649 \u0628\u0647\u0630\u0647 \u0627\u0644\u0633\u0647\u0648\u0644\u0629.<\/li>\n<li>Log4j \u0647\u064a \u0645\u0643\u062a\u0628\u0629 \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0623\u0646 \u0627\u0644\u0645\u0628\u0631\u0645\u062c\u064a\u0646 \u064a\u0645\u0643\u0646\u0647\u0645 \u0646\u0633\u062e\u0647\u0627 \u0648\u062a\u0639\u062f\u064a\u0644\u0647\u0627 \u0648\u0627\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0641\u064a \u0645\u0634\u0627\u0631\u064a\u0639\u0647\u0645. \u0648\u0644\u0633\u0648\u0621 \u0627\u0644\u062d\u0638\u060c \u0644\u0627 \u064a\u0644\u062a\u0632\u0645 \u062c\u0645\u064a\u0639 \u0627\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0628\u0634\u0643\u0644 \u0635\u0627\u0631\u0645 \u0628\u0642\u0648\u0627\u0639\u062f \u0627\u0644\u062a\u0631\u062e\u064a\u0635\u060c \u0648\u0644\u0627 \u064a\u0634\u064a\u0631\u0648\u0646 \u062f\u0627\u0626\u0645\u064b\u0627 \u0625\u0644\u0649 \u062a\u0623\u0644\u064a\u0641 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629. \u0644\u0630\u0627\u060c \u0645\u0646 \u0627\u0644\u0646\u0627\u062d\u064a\u0629 \u0627\u0644\u0646\u0638\u0631\u064a\u0629\u060c \u064a\u0645\u0643\u0646 \u0627\u0644\u0639\u062b\u0648\u0631 \u0639\u0644\u0649 \u0646\u0641\u0633 \u0627\u0644\u062b\u063a\u0631\u0629 \u0641\u064a \u0645\u0634\u0631\u0648\u0639 \u062c\u0647\u0629 \u062e\u0627\u0631\u062c\u064a\u0629\u060c \u062d\u064a\u062b \u0644\u0627 \u062a\u0648\u062c\u062f Log4j \u0628\u0634\u0643\u0644 \u0631\u0633\u0645\u064a.<\/li>\n<li>\u0643\u0627\u0646\u062a Log4Shell \u062b\u063a\u0631\u0629 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0623\u0646 \u0645\u062c\u0631\u0645\u064a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0627\u0633\u062a\u063a\u0644\u0648\u0647\u0627 \u0642\u0628\u0644 \u0646\u0634\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0639\u0646\u0647\u0627. \u0648\u0647\u0646\u0627\u0643 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.zdnet.com\/article\/log4j-rce-activity-began-on-december-1-as-botnets-start-using-vulnerability\/\">\u0623\u062f\u0644\u0629<\/a> \u062a\u0634\u064a\u0631 \u0625\u0644\u0649 \u0623\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u062c\u0631\u0628\u0648\u0647\u0627 \u0644\u0623\u0648\u0644 \u0645\u0631\u0629 \u0642\u0628\u0644 \u062a\u0633\u0639\u0629 \u0623\u064a\u0627\u0645 \u0639\u0644\u0649 \u0627\u0644\u0623\u0642\u0644 \u0645\u0646 \u0627\u0644\u0625\u0639\u0644\u0627\u0646 \u0639\u0646\u0647\u0627.<\/li>\n<li>\u0648\u0645\u0646 \u0628\u064a\u0646 \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0645\u062a\u0623\u062b\u0631\u0629 \u0645\u0646\u062a\u062c\u0627\u062a VMware\u060c \u0648\u0644\u0627 \u0633\u064a\u0645\u0627 \u062d\u0644 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0644\u0633\u0637\u062d \u0627\u0644\u0645\u0643\u062a\u0628 \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a VMware Horizon \u0627\u0644\u0634\u0647\u064a\u0631. \u062d\u064a\u062b \u0627\u062e\u062a\u0631\u0642\u062a \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0645\u0633\u062c\u0644\u0629 \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u062a\u062d\u062f\u064a\u062f\u064b\u0627.<\/li>\n<li>\u0644\u0646 \u064a\u0643\u0648\u0646 \u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u062a\u0623\u062b\u064a\u0631 \u064a\u064f\u0630\u0643\u0631 \u0641\u064a \u062d\u0627\u0644\u0629 \u0648\u062c\u0648\u062f \u062f\u062e\u0644\u0627\u0621 \u0628\u0627\u0644\u0641\u0639\u0644 \u062f\u0627\u062e\u0644 \u0627\u0644\u0646\u0638\u0627\u0645. \u0648\u0644\u0627 \u062a\u0628\u062f\u0623 \u062c\u0645\u064a\u0639 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0628\u0623\u064a \u062d\u0627\u0644 \u0645\u0646 \u0627\u0644\u0623\u062d\u0648\u0627\u0644 \u0641\u0648\u0631 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642\u060c \u0648\u0645\u0646 \u0627\u0644\u0648\u0627\u0631\u062f \u062a\u0645\u0627\u0645\u064b\u0627 \u0623\u0646 \u062a\u062d\u062a\u0648\u064a \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0623\u0646\u0638\u0645\u0629 \u0639\u0644\u0649 \u0645\u062f\u0627\u062e\u0644 \u0633\u0631\u064a\u0629 \u062d\u062a\u0649 \u064a\u0648\u0645\u0646\u0627 \u0647\u0630\u0627.<\/li>\n<\/ul>\n<h2>\u0627\u0644\u0636\u0631\u0631 \u0627\u0644\u0641\u0639\u0644\u064a<\/h2>\n<p>\u0645\u0646 \u0627\u0644\u0625\u0646\u0635\u0627\u0641\u060c \u064a\u062c\u0628 \u0623\u0646 \u0646\u0644\u0627\u062d\u0638 \u0623\u0646\u0647 \u0648\u062d\u062a\u0649 \u0627\u0644\u0622\u0646 \u0644\u0645 \u064a\u062a\u0645 \u062a\u0633\u062c\u064a\u0644 \u0623\u064a \u0646\u062a\u0627\u0626\u062c \u0643\u0627\u0631\u062b\u064a\u0629 \u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 Log4Shell \u2013 \u0623\u0648 \u0639\u0644\u0649 \u0627\u0644\u0623\u0642\u0644 \u0644\u0645 \u064a\u062a\u0645 \u0625\u062e\u0637\u0627\u0631 \u0639\u0627\u0645\u0629 \u0627\u0644\u0646\u0627\u0633 \u0628\u0647\u0627. \u0648\u0645\u0639 \u0630\u0644\u0643\u060c \u062a\u0633\u0628\u0628\u062a \u0627\u0644\u062b\u063a\u0631\u0629 \u0641\u064a \u0635\u062f\u0627\u0639 \u062d\u0642\u064a\u0642\u064a \u0644\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0648\u062e\u0628\u0631\u0627\u0621 \u0627\u0644\u0623\u0645\u0646\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0639\u0637\u0644\u0627\u062a \u0639\u064a\u062f \u0627\u0644\u0645\u064a\u0644\u0627\u062f \u0627\u0644\u0645\u062f\u0645\u0631\u0629 \u0644\u0622\u0644\u0627\u0641 \u0645\u0648\u0638\u0641\u064a \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0641\u064a \u062c\u0645\u064a\u0639 \u0623\u0646\u062d\u0627\u0621 \u0627\u0644\u0639\u0627\u0644\u0645. \u0648\u0627\u0636\u0637\u0631\u062a \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u062c\u0627\u062f\u0629 \u0628\u0634\u0623\u0646 \u0627\u0644\u0623\u0645\u0646 (\u0633\u0648\u0627\u0621 \u0643\u0627\u0646\u062a \u0634\u0631\u0643\u0627\u062a\u0647\u0627 \u0623\u0648 \u0634\u0631\u0643\u0627\u062a \u0639\u0645\u0644\u0627\u0626\u0647\u0627) \u0625\u0644\u0649 \u062f\u0641\u0639 \u0645\u0628\u0627\u0644\u063a \u0636\u062e\u0645\u0629 \u0644\u062a\u062d\u062f\u064a\u062f \u0645\u0648\u0642\u0639 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0623\u0646\u0638\u0645\u062a\u0647\u0627 \u0648\u0628\u0631\u0645\u062c\u064a\u0627\u062a\u0647\u0627\u060c \u0648\u0627\u0644\u0642\u0636\u0627\u0621 \u0639\u0644\u064a\u0647\u0627.<\/p>\n<p>\u0648\u0641\u064a\u0645\u0627 \u064a\u0644\u064a \u0646\u064f\u0633\u0644\u0637 \u0627\u0644\u0636\u0648\u0621 \u0639\u0644\u0649 \u0628\u0639\u0636 \u0623\u0628\u0631\u0632 \u062d\u0648\u0627\u062f\u062b Log4Shell \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629:<\/p>\n<ul>\n<li>\u0641\u064a 20 \u062f\u064a\u0633\u0645\u0628\u0631 2021\u060c <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.zdnet.com\/article\/belgian-defense-ministry-confirms-cyberattack-through-log4j-exploitation\/\">\u0623\u0643\u062f\u062a<\/a> \u0648\u0632\u0627\u0631\u0629 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0628\u0644\u062c\u064a\u0643\u064a\u0629 \u062d\u062f\u0648\u062b \u0647\u062c\u0648\u0645 \u0639\u0644\u0649 \u0628\u0646\u064a\u062a\u0647\u0627 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629.\u0648\u0645\u0646 \u0627\u0644\u0645\u0641\u0647\u0648\u0645 \u0623\u0646\u0647 \u0644\u0645 \u064a\u062a\u0645 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644.<\/li>\n<li>\u0641\u064a 29 \u062f\u064a\u0633\u0645\u0628\u0631 2021\u060c \u0630\u0643\u0631\u062a \u062a\u0642\u0627\u0631\u064a\u0631 \u0625\u0639\u0644\u0627\u0645\u064a\u0629 \u0623\u0646 \u0645\u0624\u0633\u0633\u0629 \u0639\u0644\u0645\u064a\u0629 \u0645\u0639\u064a\u0646\u0629 \u0641\u064a \u0627\u0644\u0648\u0644\u0627\u064a\u0627\u062a \u0627\u0644\u0645\u062a\u062d\u062f\u0629 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.securityweek.com\/chinese-spies-exploit-log4shell-hack-major-academic-institution\">\u062a\u0639\u0631\u0636\u062a \u0644\u0644\u0647\u062c\u0648\u0645 \u0645\u0646 \u062e\u0644\u0627\u0644 Log4Shell<\/a>.\u0648\u0648\u0641\u0642\u064b\u0627 \u0644\u0645\u0624\u0633\u0633\u0629 CrowdStrike\u060c \u0627\u0633\u062a\u063a\u0644\u062a \u0645\u062c\u0645\u0648\u0639\u0629 APT\u200f\u060c Aquatic Panda \u0628\u0631\u0646\u0627\u0645\u062c VMware Horizon \u063a\u064a\u0631 \u0627\u0644\u0645\u062b\u0628\u062a. \u0648\u062a\u0645 \u0625\u064a\u0642\u0627\u0641 \u0627\u0644\u0646\u0634\u0627\u0637 \u0627\u0644\u0645\u0634\u0628\u0648\u0647 \u0641\u064a \u0627\u0644\u0648\u0642\u062a \u0627\u0644\u0645\u0646\u0627\u0633\u0628\u060c \u0644\u0643\u0646 \u0627\u0644\u062d\u0627\u062f\u062b\u0629 \u0646\u0641\u0633\u0647\u0627 \u062a\u0634\u064a\u0631 \u0625\u0644\u0649 \u0623\u0646 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0642\u0631\u0627\u0635\u0646\u0629 \u062e\u0637\u064a\u0631\u0629 \u0642\u062f \u062a\u0628\u0646\u062a \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629.<\/li>\n<li>\u0641\u064a \u062f\u064a\u0633\u0645\u0628\u0631 2021 \u0623\u064a\u0636\u064b\u0627\u060c \u0627\u0646\u062a\u0634\u0631\u062a \u0623\u062e\u0628\u0627\u0631 \u0639\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 Log4Shell \u0639\u0644\u0649 \u062e\u0648\u0627\u062f\u0645 Minecraft: \u0625\u0635\u062f\u0627\u0631 Java\u060c \u0627\u0644\u0630\u064a \u0644\u0627 \u064a\u0633\u062a\u0636\u064a\u0641\u0647 \u0646\u0627\u0634\u0631 \u0627\u0644\u0644\u0639\u0628\u0629 (Microsoft). <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\">\u0623\u0643\u062f\u062a<\/a> \u0627\u0644\u0634\u0631\u0643\u0629 \u0648\u0644\u0641\u062a\u062a \u0627\u0644\u0627\u0646\u062a\u0628\u0627\u0647 \u0625\u0644\u0649 \u0628\u0633\u0627\u0637\u0629 \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0647\u062c\u0648\u0645: \u062d\u064a\u062b \u0646\u0642\u0644 \u0627\u0644\u0645\u062c\u0631\u0645\u0648\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u0648\u0646 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u0641\u064a \u062f\u0631\u062f\u0634\u0629 \u0639\u0627\u062f\u064a\u0629 \u062f\u0627\u062e\u0644 \u0627\u0644\u0644\u0639\u0628\u0629\u060c \u0648\u0627\u0644\u062a\u064a \u0643\u0627\u0646\u062a \u0643\u0627\u0641\u064a\u0629 \u0644\u062a\u0634\u063a\u064a\u0644\u0647\u0627 \u0639\u0644\u0649 \u062c\u0627\u0646\u0628 \u0627\u0644\u062e\u0627\u062f\u0645 \u0648\u0639\u0644\u0649 \u0627\u0644\u0639\u0645\u064a\u0644 \u0627\u0644\u0645\u0639\u0631\u0636 \u0644\u0644\u062e\u0637\u0631. \u0648\u0647\u0630\u0647 \u0627\u0644\u0645\u0633\u0623\u0644\u0629 \u0623\u0642\u0644 \u0623\u0647\u0645\u064a\u0629 \u0645\u0646 \u0648\u062c\u0647\u0629 \u0646\u0638\u0631 \u0627\u0644\u0636\u062d\u0627\u064a\u0627 \u0648\u0623\u0643\u062b\u0631 \u0645\u0646 \u062d\u064a\u062b \u0627\u0644\u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u062a\u0642\u0646\u064a: \u0641\u064a \u0638\u0644 \u0638\u0631\u0648\u0641 \u0645\u0639\u064a\u0646\u0629\u060c \u064a\u0645\u0643\u0646 \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0647\u062c\u0648\u0645 \u0628\u0628\u0633\u0627\u0637\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u062f\u0631\u062f\u0634\u0629 \u062f\u0627\u062e\u0644\u064a\u0629. \u0648\u0647\u0630\u0627 \u0623\u0645\u0631 \u0645\u0642\u0644\u0642\u060c \u0646\u0638\u0631\u064b\u0627 \u0644\u0623\u0646 \u0627\u0644\u062f\u0631\u062f\u0634\u0627\u062a \u0627\u0644\u0622\u0646 \u062a\u0635\u0644 \u0625\u0644\u0649 \u0645\u0627 \u0647\u0648 \u0623\u0628\u0639\u062f \u0645\u0646 \u0639\u0627\u0644\u0645 \u0627\u0644\u0623\u0644\u0639\u0627\u0628: \u0628\u0627\u0644\u0646\u0633\u0628\u0629 \u0644\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0634\u0631\u0643\u0627\u062a\u060c \u0641\u0647\u064a \u0627\u0644\u0637\u0631\u064a\u0642\u0629 \u0627\u0644\u0645\u0641\u0636\u0644\u0629 \u0644\u0644\u062a\u0648\u0627\u0635\u0644 \u0645\u0639 \u0627\u0644\u0639\u0645\u0644\u0627\u0621. \u0648\u0641\u064a \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0627\u0644\u064a\u0629 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0623\u062e\u0631\u0649\u060c \u0647\u0630\u0647 \u0647\u064a \u0627\u0644\u0637\u0631\u064a\u0642\u0629 \u0627\u0644\u062a\u064a \u064a\u064f\u0642\u062f\u0645 \u0628\u0647\u0627 \u062f\u0639\u0645 \u0627\u0644\u0639\u0645\u0644\u0627\u0621.<\/li>\n<li>\u0641\u064a \u064a\u0648\u0646\u064a\u0648 2022\u060c <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-174a\">\u0623\u0635\u062f\u0631\u062a<\/a> \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 (CISA) \u0648\u0627\u0644\u0642\u064a\u0627\u062f\u0629 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0644\u062e\u0641\u0631 \u0627\u0644\u0633\u0648\u0627\u062d\u0644 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 (CGCYBER) \u062a\u0646\u0628\u064a\u0647\u064b\u0627 \u0628\u0623\u0646 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0627 \u062a\u0632\u0627\u0644 \u0642\u064a\u062f \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u0646\u0634\u0637. \u0648\u0630\u0643\u0631 \u0627\u0644\u062a\u0642\u0631\u064a\u0631 \u0627\u0644\u0627\u0633\u062a\u0634\u0627\u0631\u064a \u0623\u0646 \u0645\u062c\u0631\u0645\u064a \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0627\u0633\u062a\u062e\u062f\u0645\u0648\u0627 \u062b\u063a\u0631\u0629 \u0641\u064a \u0646\u0641\u0633 \u0628\u0631\u0646\u0627\u0645\u062c VMware Horizon \u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062f\u0627\u062e\u0644\u064a\u0629 \u0644\u0648\u0643\u0627\u0644\u062a\u064a\u0646 \u062d\u0643\u0648\u0645\u064a\u062a\u064a\u0646 \u0645\u062c\u0647\u0648\u0644\u062a\u064e\u064a \u0627\u0644\u0627\u0633\u0645. \u0639\u0644\u0627\u0648\u0629 \u0639\u0644\u0649 \u0630\u0644\u0643\u060c \u0630\u064f\u0643\u0631 \u0623\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u062a\u0645\u0643\u0646\u0648\u0627 \u0645\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 130 \u062c\u064a\u062c\u0627\u0628\u0627\u064a\u062a \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0627\u0644\u0645\u062a\u0639\u0644\u0642\u0629 \u0628\u0625\u0646\u0641\u0627\u0630 \u0627\u0644\u0642\u0627\u0646\u0648\u0646.<\/li>\n<li>\u0641\u064a \u0646\u0648\u0641\u0645\u0628\u0631 2022\u060c <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-320a\">\u0635\u062f\u0631 \u062a\u0642\u0631\u064a\u0631 \u0627\u0633\u062a\u0634\u0627\u0631\u064a \u0622\u062e\u0631<\/a> \u0645\u0646 \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 CISA\u060c \u0628\u0627\u0644\u0627\u0634\u062a\u0631\u0627\u0643 \u0645\u0639 \u0645\u0643\u062a\u0628 \u0627\u0644\u062a\u062d\u0642\u064a\u0642\u0627\u062a \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a\u060c \u062d\u0648\u0644 \u0647\u062c\u0648\u0645 Log4Shell \u0639\u0644\u0649 \u0648\u0643\u0627\u0644\u0629 \u062d\u0643\u0648\u0645\u064a\u0629 \u0623\u062e\u0631\u0649. \u0648\u0627\u062e\u062a\u0631\u0642 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u0631\u0629 \u0623\u062e\u0631\u0649 \u0641\u064a \u0641\u0628\u0631\u0627\u064a\u0631\u060c \u0648\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0645 \u0641\u064a \u0623\u0628\u0631\u064a\u0644\u060c \u0648\u0638\u0644\u0648\u0627 \u0646\u0634\u0637\u064a\u0646 \u0641\u064a \u064a\u0648\u0646\u064a\u0648 \u0648\u064a\u0648\u0644\u064a\u0648. \u0648\u062e\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u0641\u062a\u0631\u0629\u060c \u0623\u0646\u0634\u0623\u0648\u0627 \u062d\u0633\u0627\u0628\u064b\u0627 \u064a\u062a\u0645\u062a\u0639 \u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u060c \u0648\u0642\u0627\u0645\u0648\u0627 \u0628\u062a\u063a\u064a\u064a\u0631 \u0643\u0644\u0645\u0629 \u0645\u0631\u0648\u0631 \u0627\u0644\u0645\u0633\u0624\u0648\u0644 \u0627\u0644\u0634\u0631\u0639\u064a\u0629 \u0648\u062a\u062d\u0645\u064a\u0644 \u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062a\u0639\u062f\u064a\u0646 \u0639\u0644\u0649 \u0627\u0644\u062e\u0627\u062f\u0645. \u0648\u064a\u064f\u0639\u062a\u0642\u062f \u0623\u0646 \u0627\u0644\u0647\u062c\u0648\u0645 \u0645\u0646 \u0639\u0645\u0644 \u0642\u0631\u0627\u0635\u0646\u0629 \u062a\u0631\u0639\u0627\u0647\u0645 \u0627\u0644\u062d\u0643\u0648\u0645\u0629 \u0627\u0644\u0625\u064a\u0631\u0627\u0646\u064a\u0629\u060c \u0644\u0630\u0644\u0643 \u064a\u0639\u062a\u0628\u0631 \u0628\u0639\u0636 \u0627\u0644\u062e\u0628\u0631\u0627\u0621 \u0623\u0646 \u0627\u0644\u062a\u0639\u062f\u064a\u0646 \u0645\u062c\u0631\u062f \u0633\u0627\u062a\u0631 \u0644\u0625\u062e\u0641\u0627\u0621 \u062f\u0648\u0627\u0641\u0639\u0647\u0645 \u0627\u0644\u062d\u0642\u064a\u0642\u064a\u0629.<\/li>\n<\/ul>\n<h2>\u0643\u064a\u0641\u064a\u0629 \u062d\u0645\u0627\u064a\u0629 \u0628\u0646\u064a\u062a\u0643 \u0627\u0644\u062a\u062d\u062a\u064a\u0629<\/h2>\n<p>\u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0642\u0639 \u0623\u064a \u0634\u0631\u0643\u0629 \u0636\u062d\u064a\u0629 \u0644\u062b\u063a\u0631\u0629 Log4Shell\u060c \u0648\u063a\u0627\u0644\u0628\u064b\u0627 \u0628\u0633\u0628\u0628 \u0639\u062f\u0645 \u0645\u0639\u0631\u0641\u062a\u0647\u0627 \u0628\u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0623\u0646\u0638\u0645\u062a\u0647\u0627 \u0648\u0628\u0631\u0645\u062c\u064a\u0627\u062a\u0647\u0627. \u0648\u0625\u0630\u0627 \u0644\u0645 \u062a\u0643\u0646 \u0645\u062a\u0623\u0643\u062f\u064b\u0627 \u0645\u0645\u0627 \u0625\u0630\u0627 \u0643\u0627\u0646\u062a \u0623\u0646\u0638\u0645\u062a\u0643 \u0623\u0648 \u0623\u062f\u0648\u0627\u062a\u0643 \u0623\u0648 \u0645\u0646\u062a\u062c\u0627\u062a\u0643 \u0623\u0648 \u062e\u062f\u0645\u0627\u062a\u0643 \u062a\u0633\u062a\u062e\u062f\u0645 \u0645\u0643\u062a\u0628\u0629 Log4j \u0623\u0645 \u0644\u0627\u060c \u0641\u0645\u0646 \u0627\u0644\u0645\u0646\u0637\u0642\u064a \u0625\u062c\u0631\u0627\u0621 \u062a\u062f\u0642\u064a\u0642 \u0623\u0645\u0646\u064a \u0634\u0627\u0645\u0644 <a href=\"https:\/\/me.kaspersky.com\/enterprise-security\/cybersecurity-services?icid=me-ar_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Assessment Services<\/a>. \u0628\u062e\u0644\u0627\u0641 \u0630\u0644\u0643\u060c \u0627\u062a\u0628\u0639 \u0647\u0630\u0647 \u0627\u0644\u0646\u0635\u0627\u0626\u062d \u0645\u0646 \u062e\u0628\u0631\u0627\u0626\u0646\u0627 \u0644\u0644\u0628\u0642\u0627\u0621 \u0622\u0645\u0646\u064b\u0627.<\/p>\n<ul>\n<li>\u0625\u0630\u0627 \u0643\u0627\u0646\u062a \u0645\u064a\u0632\u0627\u062a Log4j \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0642\u0648\u0645 \u0628\u0625\u0646\u0634\u0627\u0626\u0647\u0627\u060c \u0641\u0627\u0633\u062a\u062e\u062f\u0645 \u0623\u062d\u062f\u062b \u0625\u0635\u062f\u0627\u0631 \u0645\u0646 \u0627\u0644\u0645\u0643\u062a\u0628\u0629 \u0627\u0644\u0645\u062a\u0648\u0641\u0631\u0629 \u0639\u0644\u0649 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/logging.apache.org\/log4j\/2.x\/download.html\">\u0635\u0641\u062d\u0629 \u0627\u0644\u0645\u0634\u0631\u0648\u0639<\/a>.<\/li>\n<li>\u0627\u0642\u0631\u0623 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/logging.apache.org\/log4j\/2.x\/\">\u0627\u0644\u062f\u0644\u064a\u0644<\/a> \u0627\u0644\u0631\u0633\u0645\u064a \u0627\u0644\u0635\u0627\u062f\u0631 \u0639\u0646 \u062e\u062f\u0645\u0627\u062a \u062a\u0633\u062c\u064a\u0644 Apache \u0648\u0627\u062a\u0628\u0639\u0647 \u0639\u0646\u062f \u0627\u0644\u0636\u0631\u0648\u0631\u0629.<\/li>\n<li>\u0625\u0630\u0627 \u062a\u0645 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 Log4j \u0641\u064a \u0645\u0646\u062a\u062c\u0627\u062a \u0627\u0644\u062c\u0647\u0627\u062a \u0627\u0644\u062e\u0627\u0631\u062c\u064a\u0629\u060c \u0641\u0642\u0645 \u0628\u062a\u062d\u062f\u064a\u062b \u062c\u0645\u064a\u0639 \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0645\u0639\u0631\u0636\u0629 \u0644\u0644\u062e\u0637\u0631.<\/li>\n<li>\u0627\u0633\u062a\u062e\u062f\u0645 <a href=\"https:\/\/me.kaspersky.com\/small-to-medium-business-security?icid=me-ar_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">\u062d\u0644\u0648\u0644 \u0623\u0645\u0627\u0646<\/a> \u0642\u0648\u064a\u0629 \u0642\u0627\u062f\u0631\u0629 \u0639\u0644\u0649 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0639\u0644\u0649 \u0627\u0644\u062e\u0648\u0627\u062f\u0645 \u0648\u0645\u062d\u0637\u0627\u062a \u0627\u0644\u0639\u0645\u0644.<\/li>\n<li>\u0631\u0627\u0642\u0628 \u0627\u0644\u0646\u0634\u0627\u0637 \u0627\u0644\u0645\u0634\u0628\u0648\u0647 \u062f\u0627\u062e\u0644 \u0645\u062d\u064a\u0637 \u0627\u0644\u0634\u0631\u0643\u0629 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062d\u0644\u0648\u0644 <a href=\"https:\/\/me.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-ar_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">\u0645\u0646 \u0627\u0644\u0641\u0626\u0629 EDR<\/a> \u0623\u0648 \u0627\u0644\u062e\u062f\u0645\u0627\u062a \u0627\u0644\u062e\u0627\u0631\u062c\u064a\u0629 \u0645\u062b\u0644 \u0627\u0644\u0643\u0634\u0641 \u0627\u0644\u0645\u064f\u062f\u0627\u0631 \u0648\u0627\u0644\u0627\u0633\u062a\u062c\u0627\u0628\u0629.<a href=\"https:\/\/me.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-ar_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Managed Detection and Responce<\/a> \u0648\u0647\u0630\u0627 \u0633\u064a\u064f\u062a\u064a\u062d \u0644\u0643 \u0627\u0644\u0639\u062b\u0648\u0631 \u0639\u0644\u0649 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0648\u0627\u0644\u062a\u062e\u0644\u0635 \u0645\u0646\u0647\u0627 \u0641\u064a \u0627\u0644\u0645\u0631\u0627\u062d\u0644 \u0627\u0644\u0645\u0628\u0643\u0631\u0629.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-top3\">\n","protected":false},"excerpt":{"rendered":"<p>\u0628\u0639\u062f \u0639\u0627\u0645 \u0645\u0646 \u0627\u0644\u0627\u0643\u062a\u0634\u0627\u0641\u060c \u0644\u0627 \u062a\u0632\u0627\u0644 \u062b\u063a\u0631\u0627\u062a Log4Shell \u062a\u064f\u0644\u0642\u064a \u0628\u0638\u0644\u0627\u0644\u0647\u0627.<\/p>\n","protected":false},"author":2484,"featured_media":10466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[892,893,631],"tags":[1792,1737,1738,1285],"class_list":{"0":"post-10462","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-smb","9":"category-business","10":"tag-1792","11":"tag-apache","12":"tag-log4j","13":"tag-1285"},"hreflang":[{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/log4shell-still-active-2022\/10462\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/log4shell-still-active-2022\/24965\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/log4shell-still-active-2022\/20461\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/log4shell-still-active-2022\/27531\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/log4shell-still-active-2022\/25295\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/log4shell-still-active-2022\/25614\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/log4shell-still-active-2022\/28172\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/log4shell-still-active-2022\/34362\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/log4shell-still-active-2022\/46545\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/log4shell-still-active-2022\/19881\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/log4shell-still-active-2022\/20467\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/log4shell-still-active-2022\/29588\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/log4shell-still-active-2022\/33272\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/log4shell-still-active-2022\/25653\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/log4shell-still-active-2022\/31342\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/log4shell-still-active-2022\/31051\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me.kaspersky.com\/blog\/tag\/%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa\/","name":"\u0627\u0644\u062b\u063a\u0631\u0627\u062a"},"_links":{"self":[{"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10462"}],"version-history":[{"count":2,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10462\/revisions"}],"predecessor-version":[{"id":10468,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10462\/revisions\/10468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10466"}],"wp:attachment":[{"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}