Ransomware encrypts data files with a specific program and calls for a ransom for their decryption. Attackers obtain Handle by RCE, initiate the ransomware attack, and request a ransom payment.In December 2021, several RCE vulnerabilities have been found out in Log4j that permitted attackers to use susceptible applications to execute cryptojackers