A Longitudinal Measurement Study of Log4Shell Exploitation from an Active Network Telescope
By: Aakash Singh , Kuldeep Singh Yadav , V. Anil Kumar and more
Potential Business Impact:
Fixes computer bugs for years after they're found.
The disclosure of the Log4Shell vulnerability in December 2021 led to an unprecedented wave of global scanning and exploitation activity. A recent study provided important initial insights, but was largely limited in duration and geography, focusing primarily on European and U.S. network telescope deployments and covering the immediate aftermath of disclosure. As a result, the longer-term evolution of exploitation behavior and its regional characteristics has remained insufficiently understood. In this paper, we present a longitudinal measurement study of Log4Shell-related traffic observed between December 2021 and October 2025 by an active network telescope deployed in India. This vantage point enables examination of sustained exploitation dynamics beyond the initial outbreak phase, including changes in scanning breadth, infrastructure reuse, payload construction, and destination targeting. Our analysis reveals that Log4Shell exploitation persists for several years after disclosure, with activity gradually concentrating around a smaller set of recurring scanner and callback infrastructures, accompanied by an increase in payload obfuscation and shifts in protocol and port usage. A comparative analysis and observations with the benchmark study validate both correlated temporal trends and systematic differences attributable to vantage point placement and coverage. Subsequently, these results demonstrate that Log4Shell remains active well beyond its initial disclosure period, underscoring the value of long-term, geographically diverse measurement for understanding the full lifecycle of critical software vulnerabilities.
Similar Papers
Unraveling Log4Shell: Analyzing the Impact and Response to the Log4j Vulnerabil
Cryptography and Security
Fixes a computer bug that lets hackers take over devices.
Advanced Vulnerability Scanning for Open Source Software: Detection and Mitigation of Log4j Vulnerabilities
Software Engineering
Finds hidden computer bugs that hackers can use.
Mining for Lags in Updating Critical Security Threats: A Case Study of Log4j Library
Software Engineering
Fixes software bugs faster, especially security ones.