I got a report from my system's ESET endpoint security software today:
NEW NOTIFICATION | | An Event Log notification has occurred with the following parameters:
Category: Firewall detection Monitored static group: All Attempt was made to reach 67.217.69.93 on port 80 by a machine at (internal address) and blocked 1 per minute were noticed Firewall detection . Event is one of {Security vulnerability exploitation} |
|
The official detection was cited as JAVA/Exploit.CVE-2021-44228 . The destination given up there is an IP address in LogMeIn's block. The program ESET claims made this exploitation attempt is C:\Program Files (x86)\GoToMyPC\g2comm.exe. Prior to this, one of our other security/IPS systems claimed that other machines also attempted Log4j exploitations against several IP addresses. All of the target IPs were LogMeIn addresses. Is there something in the Gotomypc agent that causes security systems to believe that a log4j attack is being made?