This website collects cookies to deliver better user experience. Cookie Policy
Accept
Sign In
The Wall Street Publication
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Reading: What Is the Log4j Vulnerability?
Share
The Wall Street PublicationThe Wall Street Publication
Font ResizerAa
Search
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Have an existing account? Sign In
Follow US
© 2024 The Wall Street Publication. All Rights Reserved.
The Wall Street Publication > Blog > Tech > What Is the Log4j Vulnerability?
Tech

What Is the Log4j Vulnerability?

Editorial Board Published December 14, 2021
Share
What Is the Log4j Vulnerability?
SHARE

A flaw in widely used internet software has left companies and government officials scrambling to respond to a potentially glaring cybersecurity threat to global computer networks.

Contents
What is Log4j?How can hackers take advantage of Log4j’s vulnerability?More From WSJ Pro CybersecurityHow widespread is the Log4j flaw?Which technology suppliers are affected by the Log4j vulnerability?How can companies fix the Log4j problem?

The previously undiscovered bug, hidden inside software known as Log4j, could prove to be a boon for criminal and nation-state hackers, cybersecurity experts say. U.S. officials on Monday held an emergency call with companies that operate critical infrastructure and have urged businesses to update their networks and be on the lookout for attacks.

Here’s what we know about the Log4j flaw:

What is Log4j?

Software developers use the Log4j framework to record user activity and the behavior of applications for subsequent review. Distributed for free by the nonprofit Apache Software Foundation, Log4j has been downloaded millions of times and is among the most widely used tools to collect information across corporate computer networks, websites and applications.

How can hackers take advantage of Log4j’s vulnerability?

The Log4j flaw, disclosed by Apache last week, allows attackers to execute code remotely on a target computer, meaning that they can steal data, install malware or take control. Some cybercriminals have installed software that uses a hacked system to mine cryptocurrency, while others have developed malware that allows attackers to hijack computers for large-scale assaults on internet infrastructure.

More From WSJ Pro Cybersecurity

Security experts are particularly concerned that the vulnerability may give hackers enough of a foothold within a system to install ransomware, a type of computer virus that locks up data and systems until the attackers are paid by victims. For larger companies, these ransoms can total millions of dollars. The attacks can also cause widespread disruption, such as the infection of systems at Colonial Pipeline Co. in May that forced a six-day shutdown of the largest fuel pipeline on the East Coast.

“To be clear, this vulnerability poses a severe risk,” said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, in a statement issued Sunday.

How widespread is the Log4j flaw?

Internet-facing systems as well as backend systems could contain the vulnerability. Log4j software is widely used in business software development. “Likely millions of servers are at risk,” said Lou Steinberg, founder of CTM Insights LLC, a tech incubator. An Apache spokeswoman said the nature of how Log4j is inserted into different pieces of software makes it impossible to track the tool’s reach.

CISA has created an information page with recommendations.

Which technology suppliers are affected by the Log4j vulnerability?

Many, and the list is growing. Among them are Apple Inc., Amazon.com Inc., Cloudflare Inc., IBM, Microsoft Corp.’s Minecraft, Palo Alto Networks Inc. and Twitter Inc. Several technology companies have issued alerts and guidance to customers about how to decrease their risk.

How can companies fix the Log4j problem?

Some patches and technical guidance are available. The Apache organization has released multiple updates in recent days and advised upgrading to the latest version of the Log4j tool. Oracle Corp. released its own patches on Friday. Microsoft recommended a series of steps to mitigate the risk of exploitation, including contacting your software application providers to be sure they are using the most up-to-date version of Java, which would include patches.

In lieu of available patches, Teresa Walsh, global head of intelligence at the Financial Services Information Sharing and Analysis Center, recommends that companies limit unnecessary outbound internet traffic, which would go some way to protecting vulnerable systems.

“Firms can reduce their risk by reducing their exposure,” she said.

—Catherine Stupp contributed to this article.

Write to David Uberti at [email protected],James Rundle at [email protected] and Kim S. Nash at [email protected]

Copyright ©2021 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

TAGGED:Tech NewsWall Street Publication
Share This Article
Twitter Email Copy Link Print
Previous Article Millennials Are Supercharging the Housing Market Millennials Are Supercharging the Housing Market
Next Article Toyota Keeps Its EV Options Open—Maybe Too Open Toyota Keeps Its EV Options Open—Maybe Too Open

Editor's Pick

AIIB loans 0m for Beijing coal-to-gas conversion

AIIB loans $250m for Beijing coal-to-gas conversion

A employee installs gasoline pineline at a village in Anping township of Xianghe county, Hebei province, Nov 2, 2017. [Photo/Xinhua]…

By Editorial Board 3 Min Read
Authorities borrowing third-highest file in October as individuals not spending – official figures | Cash Information
Authorities borrowing third-highest file in October as individuals not spending – official figures | Cash Information

Authorities borrowing was increased than anticipated and customers tightened their belts, spending…

3 Min Read
Ackman doubles down on viral relationship recommendation and shares an extra method
Ackman doubles down on viral relationship recommendation and shares an extra method

Pershing Sq. Capital Administration founder and CEO Invoice Ackman outlines a three-step…

3 Min Read

Oponion

Is Okra Water Protected for Pregnant Girls? » Wholesome Life-style

Is Okra Water Protected for Pregnant Girls? » Wholesome Life-style

Is okra water protected for pregnant ladies? Know its well…

April 8, 2025

Justice within the corridors of energy: What the Sarkozy verdict reveals about judicial independence

In a politically charged and deeply…

September 27, 2025

Roberts strongly rebukes Trump, GOP rhetoric about impeaching judges

By John Fritze | CNNChief Justice…

March 18, 2025

Harley-Davidson cuts income forecast on inflation, DEI backlash

Former Levi Strauss senior advertising and…

October 25, 2024

Nick Saban shares message for Auburn followers after Texas A&M loss

Nick Saban has a message for…

September 29, 2025

You Might Also Like

How one can Get the Good Encompass Sound Speaker Setup
Tech

How one can Get the Good Encompass Sound Speaker Setup

After all, promise will not be the identical as ship—and simply as with these soundbars that wish to replicate the…

5 Min Read
I’ve Examined All of the Newest Chromebooks. These 9 Are the Absolute Greatest
Tech

I’ve Examined All of the Newest Chromebooks. These 9 Are the Absolute Greatest

9 Greatest Chromebooks In contrastDifferent Good Chromebooks We have Examined{Photograph}: Daniel Thorp-LancasterAcer Chromebook Plus Spin 714 for $711: Acer’s Chromebook…

16 Min Read
Recreation Concept Explains How Algorithms Can Drive Up Costs
Tech

Recreation Concept Explains How Algorithms Can Drive Up Costs

The unique model of this story appeared in Quanta Journal.Think about a city with two widget retailers. Prospects desire cheaper…

4 Min Read
Give Your Hand a Relaxation. Strive One in all Our Favourite Intercourse Toys As an alternative
Tech

Give Your Hand a Relaxation. Strive One in all Our Favourite Intercourse Toys As an alternative

Different Intercourse Toys We LikeLovense Osci 3 {Photograph}: LovenseWe check numerous intercourse toys and equipment right here at WIRED, and…

14 Min Read
The Wall Street Publication

About Us

The Wall Street Publication, a distinguished part of the Enspirers News Group, stands as a beacon of excellence in journalism. Committed to delivering unfiltered global news, we pride ourselves on our trusted coverage of Politics, Business, Technology, and more.

Company

  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • WP Creative Group
  • Accessibility Statement

Contact

  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability

Term of Use

  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices

© 2024 The Wall Street Publication. All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?