Log4Shell exploits are used for DDoS botnets and cryptominers installation

From en.secnews.gr

cryptominers

Vulnerability Log4Shell in widely used software log4j continues to be used by cyber criminals to develop various malware payloads, as well as to device recruitment in DDoS botnets and for installing cryptominers.

Read more…