This website collects cookies to deliver better user experience. Cookie Policy
Accept
Sign In
The Wall Street Publication
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Reading: What Is the Log4j Vulnerability?
Share
The Wall Street PublicationThe Wall Street Publication
Font ResizerAa
Search
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Have an existing account? Sign In
Follow US
© 2024 The Wall Street Publication. All Rights Reserved.
The Wall Street Publication > Blog > Tech > What Is the Log4j Vulnerability?
Tech

What Is the Log4j Vulnerability?

Editorial Board Published December 14, 2021
Share
What Is the Log4j Vulnerability?
SHARE

A flaw in widely used internet software has left companies and government officials scrambling to respond to a potentially glaring cybersecurity threat to global computer networks.

Contents
What is Log4j?How can hackers take advantage of Log4j’s vulnerability?More From WSJ Pro CybersecurityHow widespread is the Log4j flaw?Which technology suppliers are affected by the Log4j vulnerability?How can companies fix the Log4j problem?

The previously undiscovered bug, hidden inside software known as Log4j, could prove to be a boon for criminal and nation-state hackers, cybersecurity experts say. U.S. officials on Monday held an emergency call with companies that operate critical infrastructure and have urged businesses to update their networks and be on the lookout for attacks.

Here’s what we know about the Log4j flaw:

What is Log4j?

Software developers use the Log4j framework to record user activity and the behavior of applications for subsequent review. Distributed for free by the nonprofit Apache Software Foundation, Log4j has been downloaded millions of times and is among the most widely used tools to collect information across corporate computer networks, websites and applications.

How can hackers take advantage of Log4j’s vulnerability?

The Log4j flaw, disclosed by Apache last week, allows attackers to execute code remotely on a target computer, meaning that they can steal data, install malware or take control. Some cybercriminals have installed software that uses a hacked system to mine cryptocurrency, while others have developed malware that allows attackers to hijack computers for large-scale assaults on internet infrastructure.

More From WSJ Pro Cybersecurity

Security experts are particularly concerned that the vulnerability may give hackers enough of a foothold within a system to install ransomware, a type of computer virus that locks up data and systems until the attackers are paid by victims. For larger companies, these ransoms can total millions of dollars. The attacks can also cause widespread disruption, such as the infection of systems at Colonial Pipeline Co. in May that forced a six-day shutdown of the largest fuel pipeline on the East Coast.

“To be clear, this vulnerability poses a severe risk,” said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, in a statement issued Sunday.

How widespread is the Log4j flaw?

Internet-facing systems as well as backend systems could contain the vulnerability. Log4j software is widely used in business software development. “Likely millions of servers are at risk,” said Lou Steinberg, founder of CTM Insights LLC, a tech incubator. An Apache spokeswoman said the nature of how Log4j is inserted into different pieces of software makes it impossible to track the tool’s reach.

CISA has created an information page with recommendations.

Which technology suppliers are affected by the Log4j vulnerability?

Many, and the list is growing. Among them are Apple Inc., Amazon.com Inc., Cloudflare Inc., IBM, Microsoft Corp.’s Minecraft, Palo Alto Networks Inc. and Twitter Inc. Several technology companies have issued alerts and guidance to customers about how to decrease their risk.

How can companies fix the Log4j problem?

Some patches and technical guidance are available. The Apache organization has released multiple updates in recent days and advised upgrading to the latest version of the Log4j tool. Oracle Corp. released its own patches on Friday. Microsoft recommended a series of steps to mitigate the risk of exploitation, including contacting your software application providers to be sure they are using the most up-to-date version of Java, which would include patches.

In lieu of available patches, Teresa Walsh, global head of intelligence at the Financial Services Information Sharing and Analysis Center, recommends that companies limit unnecessary outbound internet traffic, which would go some way to protecting vulnerable systems.

“Firms can reduce their risk by reducing their exposure,” she said.

—Catherine Stupp contributed to this article.

Write to David Uberti at [email protected],James Rundle at [email protected] and Kim S. Nash at [email protected]

Copyright ©2021 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

TAGGED:Tech NewsWall Street Publication
Share This Article
Twitter Email Copy Link Print
Previous Article Millennials Are Supercharging the Housing Market Millennials Are Supercharging the Housing Market
Next Article Toyota Keeps Its EV Options Open—Maybe Too Open Toyota Keeps Its EV Options Open—Maybe Too Open

Editor's Pick

Alyssa Farah Griffin: ‘The View’ Co-Host is Pregnant With Child #1!

Alyssa Farah Griffin: ‘The View’ Co-Host is Pregnant With Child #1!

Studying Time: 3 minutes The View co-host Alyssa Farah Griffin is pregnant! On ‘The View,’ Alyssa Farah Griffin breaks the…

By Editorial Board 3 Min Read
Melissa Rycroft Admits to Actually “Struggling” in Wake of DUI Arrest
Melissa Rycroft Admits to Actually “Struggling” in Wake of DUI Arrest

Studying Time: 3 minutes Melissa Rycroft is in a darkish place proper…

4 Min Read
Amy Duggar Describes Studying Grandfather Was a ‘Predator’
Amy Duggar Describes Studying Grandfather Was a ‘Predator’

Studying Time: 4 minutes Amy Duggar King grew up figuring out and…

6 Min Read

Oponion

Stocks Pare Losses After Fed Minutes

Stocks Pare Losses After Fed Minutes

U.S. stocks ended Wednesday’s session little changed, reversing an early…

February 16, 2022

Ronnie Spector of the Ronettes dies at 78

LOS ANGELES — Ronnie Spector, the…

January 12, 2022

Your Spring Dinners Concepts Are Right here—Contemporary Weeknight Recipes Infuse Your Season With Taste

Spring is coming—and for these of…

April 6, 2025

Trump denigrates Detroit whereas interesting for votes in a suburb of Michigan’s largest metropolis

By Michelle L. Value and Ali…

October 26, 2024

Peloton, Marathon Digital, Coinbase, Spirit Airlines: What to Watch in the Stock Market Today

By James Willhite Close James Willhite…

February 7, 2022

You Might Also Like

Your Cat In all probability Is not Ingesting Sufficient Water. A Fountain Can Assist.
Tech

Your Cat In all probability Is not Ingesting Sufficient Water. A Fountain Can Assist.

Evaluate Our PicksOthers We ExaminedCourtesy of PetkikPetkit Eversweet Max for $90: This techy computerized fountain will be both cordless or…

17 Min Read
Wish to Begin a Web site? These Are the Finest Web site Builders
Tech

Wish to Begin a Web site? These Are the Finest Web site Builders

Prime Web site BuildersFinest for Most IndividualsSquarespace CoreLearn ExtraFinest Low cost Web site BuilderHostinger Web site BuilderLearn ExtraFinest for Small…

5 Min Read
Specialised’s New Electrical Mountain Bike Is So Enjoyable I Forgot to Go House
Tech

Specialised’s New Electrical Mountain Bike Is So Enjoyable I Forgot to Go House

The following experience was on singletrack from my home to Spirit Mountain, Duluth’s downhill lift-accessed park with 24 trails starting…

4 Min Read
The Greatest Carpet Cleaners We have Discovered, Examined in Busy Households
Tech

The Greatest Carpet Cleaners We have Discovered, Examined in Busy Households

Evaluate Our PicksOthers Examined{Photograph}: Simon HillHoover HF4 Hydro for £199: For UK people in flats or small homes with a…

11 Min Read
The Wall Street Publication

About Us

The Wall Street Publication, a distinguished part of the Enspirers News Group, stands as a beacon of excellence in journalism. Committed to delivering unfiltered global news, we pride ourselves on our trusted coverage of Politics, Business, Technology, and more.

Company

  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • WP Creative Group
  • Accessibility Statement

Contact

  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability

Term of Use

  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices

© 2024 The Wall Street Publication. All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?