Log4j/“Log4Shell” Vulnerability Learning Center
CrowdStrike continues to track and monitor the evolution of the Log4j vulnerabilities – collectively being referred to as “Log4Shell.” CrowdStrike will update this webpage and our customer Knowledge Base on the Log4j vulnerabilities, exploitation attempts and mitigation guidance.
Bookmark this page or sign up below to stay up-to-date on the Log4Shell vulnerability.
Log4Shell Resources
A curation of CrowdStrike's Log4Shell updates and resources including guides, tools, blog, and CrowdCasts.
Blog
OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion AttemptLearn how CrowdStrike Falcon® OverWatch's™ Rapid Notification Process disrupted AQUATIC PANDA.
Read NowBlog
Baselining and Hunting Log4Shell with the CrowdStrike Falcon® PlatformInsight into what incident responders can do to help mitigate some threat surface as patching marches on.
Read NowBlog
CrowdStrike Services Launches Log4j Quick Reference GuideThe CrowdStrike Services Log4j Quick Reference Guide (QRG) distills down the key insights that security teams need to respond effectively.
Read NowOn-demand CrowdCast
Threat Hunting Log4j Exploits with Falcon OverWatchGain insights you can use to kickstart your own threat hunting efforts.
Speakers: Michael Wylie, Senior Manager, Threat Response
Jessica Lee, Threat Response Analyst
Watch NowWhat is Log4Shell? What Do You Need to Know?
CrowdStrike Intelligence shares the latest facts about Log4Shell and the ongoing attempts to exploit this vulnerability.
Learn how CrowdStrike protects against threats delivered via Log4Shell
CrowdStrike uses a multi-layered approach to protect our customers. Learn more about how the CrowdStrike Falcon® platform and the elite threat hunting of CrowdStrike Falcon® OverWatch provide powerful protection against threats delivered via this vulnerability to stop breaches.
"25 minutes. That's how long it took from an Overwatch alert to eradicating a Log4j exploit."
- Cybersecurity Leader of Specialty Retailer
BLOG
How CrowdStrike Protects Customers from Threats Delivered via Log4ShellLearn how CrowdStrike continues to track and monitor the evolution of Log4Shell to deploy countermeasures and protect customers.
Read BlogOn-Demand CrowdCast
Log4j: A View from the Front LinesLearn how CrowdStrike Services is helping solve challenges posed by the Log4j vulnerability
Watch Now
Free Targeted Log4j
Search Tool
Search Tool
All Log4Shell Resources
Learn how CrowdStrike Falcon® OverWatch's™ Rapid Notification Process disrupted AQUATIC PANDA, a China-based targeted intrusion adversary.
Insight into what incident responders can do to help mitigate some threat surface as patching marches on.
Log4j Search Tool
Learn more about CrowdStrike's new community tool that can be used to quickly scan file systems looking for versions of the Log4j code libraries.
Learn more about our Quick Reference Guide and the key insights that security teams need to respond effectively to Log4j.
Learn how CrowdStrike continues to track and monitor the evolution of Log4Shell to deploy countermeasures and protect customers.
Version 7, updated December 29
The “CrowdStrike Services Log4j Quick Reference Guide” summarizes the latest key information about the Log4j vulnerability, based on insights gained from responding to real-world incidents.
(CrowdStrike Archive Scanning Tool)
CAST is a free community tool developed by CrowdStrike Services that performs a targeted search for Log4j libraries.
On-Demand
Get a real-world view from the experts on the front lines and gain insights you can use to kickstart your own Log4j threat hunting efforts.
On-Demand
CrowdStrike Services' James Perry and Matt Harvey share observations directly from the front lines of incident response and share information about how they are helping to solve some of the key challenges surrounding Log4j.
On-Demand
CrowdStrike's SVP of Intelligence Adam Meyers examines the facts behind Log4Shell and discusses the actions you can take to protect yourself and your company.