{"id":44649,"date":"2021-12-29T17:08:00","date_gmt":"2021-12-29T17:08:00","guid":{"rendered":"http:\/\/ffbbd0ea-e992-412c-92e6-e69ac5b9015b"},"modified":"2021-12-29T17:08:00","modified_gmt":"2021-12-29T17:08:00","slug":"aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/","title":{"rendered":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity company CrowdStrike has discovered an attempt by a China-based group to infiltrate an academic institution through the <a href=\"https:\/\/www.zdnet.com\/article\/log4j-zero-day-flaw-what-you-need-to-know-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">Log4j vulnerability<\/a>.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">more Log4j<\/span> <\/h3>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.crowdstrike.com\/blog\/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CrowdStrike called the group<\/a> &#8220;Aquatic Panda&#8221; and said it is an &#8220;intrusion adversary with a dual mission of intelligence collection and industrial espionage&#8221; that has operated since at least May 2020.&nbsp;<\/p>\n<p>The group&#8217;s exact intent is unknown because the attack was disrupted. CrowdStrike told ZDNet, however, that Aquatic Panda is known to maintain persistence in environments to gain access to intellectual property and other industrial trade secrets.<\/p>\n<p>&#8220;Aquatic Panda operations have primarily focused on entities in the telecommunications, technology, and government sectors,&#8221; CrowdStrike&nbsp;<a href=\"https:\/\/www.crowdstrike.com\/blog\/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">explained in a report<\/a>.<\/p>\n<p>According to CrowdStrike, their system uncovered &#8220;suspicious activity stemming from a Tomcat process running under a vulnerable VMWare Horizon instance at a large academic institution, leading to the disruption of an active hands-on intrusion.&#8221;<\/p>\n<p>After watching the group operate and examining the telemetry available, CrowdStrike said it believes that a modified version of the Log4j exploit was likely used during the course of the threat actor&#8217;s operations.<\/p>\n<p>The team at CrowdStrike discovered that Aquatic Panda used a public GitHub project from Dec.13, 2021 in order to gain access to the vulnerable instance of VMWare Horizon.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>&#8220;Aquatic Panda continued their reconnaissance from the host, using native OS binaries to understand current privilege levels as well as system and domain details. OverWatch threat hunters also observed an attempt to discover and stop a third-party endpoint detection and response (EDR) service,&#8221; the company explained.<\/p>\n<p>&#8220;Throughout the intrusion, OverWatch tracked the threat actor&#8217;s activity closely in order to provide continuous updates to the victim organization. Based on the actionable intelligence provided by OverWatch, the victim organization was able to quickly implement their incident response protocol, eventually patching the vulnerable application and preventing further threat actor activity on the host.&#8221;<\/p>\n<p>CrowdStrike officials told ZDNet that they are seeing various threat actors both inside and outside of China leveraging the Log4J vulnerability, with adversaries ranging from advanced threat actors to eCrime actors.&nbsp;<\/p>\n<p>&#8220;In the end, the viability of this exploit is well-proven with a substantial attack surface still present. We will continue to see threat actors making use of this vulnerability until all recommended mitigations are put into place,&#8221; CrowdStrike said in an interview.<\/p>\n<p>Last week, the US, UK, Australia and other countries&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/\" target=\"_blank\" rel=\"noopener\">issued a Log4j advisory<\/a> in response to &#8220;active, worldwide exploitation by numerous threat actors, including malicious cyber threat actors.&#8221;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-now-state-backed-hackers-are-using-bug-as-part-of-attacks-warns-microsoft\/\" target=\"_blank\" rel=\"noopener\">Numerous groups<\/a>&nbsp;from North Korea, Iran, Turkey and China have been seen exploiting the vulnerability alongside a slate of&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/khonsari-ransomware-iranian-group-nemesis-kitten-seen-exploiting-log4j\/\" target=\"_blank\" rel=\"noopener\">groups<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-this-new-threat-is-going-to-affect-cybersecurity-for-a-long-time\/\" target=\"_blank\" rel=\"noopener\">cybercriminal organizations<\/a>.&nbsp;<\/p>\n<p>CISA Director Jen Easterly said Log4j vulnerabilities present a severe and ongoing threat to organizations and governments around the world<\/p>\n<p>&#8220;We implore all entities to take immediate action to implement the latest mitigation guidance to protect their networks,&#8221; Easterly said. &#8220;These vulnerabilities are the most severe that I&#8217;ve seen in my career, and it&#8217;s imperative that we work together to keep our networks safe.&#8221;&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/apt-group-seen-attacking-academic-institution-through-log4j-vulnerability-crowdstrike\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CrowdStrike said in a new report that they&#8217;ve seen a China-based group searching for intellectual property through Log4Shell.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44649","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-29T17:08:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike\",\"datePublished\":\"2021-12-29T17:08:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/\"},\"wordCount\":530,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0eaacf821edc35b3721186b6d2527871e8969a89\\\/2021\\\/12\\\/15\\\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\\\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/\",\"name\":\"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0eaacf821edc35b3721186b6d2527871e8969a89\\\/2021\\\/12\\\/15\\\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\\\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-12-29T17:08:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0eaacf821edc35b3721186b6d2527871e8969a89\\\/2021\\\/12\\\/15\\\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\\\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/0eaacf821edc35b3721186b6d2527871e8969a89\\\/2021\\\/12\\\/15\\\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\\\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/","og_locale":"en_US","og_type":"article","og_title":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-29T17:08:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike","datePublished":"2021-12-29T17:08:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/"},"wordCount":530,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/","url":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/","name":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-12-29T17:08:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/0eaacf821edc35b3721186b6d2527871e8969a89\/2021\/12\/15\/c5cb69c3-3eb8-4611-8b47-8a7595c4f340\/hacking-campaign.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/aquatic-panda-infiltrated-academic-institution-through-log4j-vulnerability-says-crowdstrike\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Aquatic Panda infiltrated academic institution through Log4j vulnerability, says CrowdStrike"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44649"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44649\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}