Malicious actors have already targeted nearly one in six organizations around the world that have been affected by the Spring4Shell zero-day
remote code execution flaw, tracked as CVE-2022-22965, BleepingComputer reports.
Detected Spring4Shell attacks
totaled 37,000 during the past weekend alone, with software vendors being the most hit industry likely due to their potential to be leveraged in supply chain attacks, according to a Check Point report.
Europe was most targeted by Spring4Shell attacks, accounting for 20% of detections, while North America accounted for 11% of detections.
The report comes after the Cybersecurity and Infrastructure Security Agency added Spring4Shell and three other security flaws in its vulnerability catalog, with CISA noting that Spring4Shell attacks have been launched to target VMware systems.
VMware has already issued security updates and advisories for Spring4Shell remediation. Microsoft has also unveiled Spring4Shell detection and protection guidance.
"Since the Spring Core vulnerability was announced, we have been tracking a low volume of exploit attempts across our cloud services for Spring Cloud and Spring Core vulnerabilities," said Microsoft.