This website collects cookies to deliver better user experience. Cookie Policy
Accept
Sign In
The Wall Street Publication
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Reading: What Is the Log4j Vulnerability? What to Know.
Share
The Wall Street PublicationThe Wall Street Publication
Font ResizerAa
Search
  • Home
  • Trending
  • U.S
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
    • Markets
    • Personal Finance
  • Tech
  • Lifestyle
    • Lifestyle
    • Style
    • Arts
  • Health
  • Sports
  • Entertainment
Have an existing account? Sign In
Follow US
© 2024 The Wall Street Publication. All Rights Reserved.
The Wall Street Publication > Blog > Tech > What Is the Log4j Vulnerability? What to Know.
Tech

What Is the Log4j Vulnerability? What to Know.

Editorial Board Published December 21, 2021
Share
What Is the Log4j Vulnerability? What to Know.
SHARE

A flaw in widely used internet software known as Log4j has left companies and government officials scrambling to respond to a glaring cybersecurity threat to global computer networks.

Contents
What is Log4j?How can hackers take advantage of Log4j’s vulnerability?Are foreign governments taking advantage of the flaw?How is the U.S. government responding?How is Europe responding?How widespread is the Log4j flaw?Which technology suppliers are affected by the Log4j vulnerability?How can companies fix the Log4j problem?

The bug could enable potentially devastating cyberattacks that span economic sectors and international borders, according to security experts.

U.S. officials said hundreds of millions of devices were at risk and issued an emergency directive ordering federal agencies to take steps to mitigate the threat by Christmas Eve. Researchers and major technology companies warned that hackers linked to foreign governments and criminal ransomware groups were probing how to exploit the vulnerability within targets’ computer systems.

The U.K.’s National Cyber Security Centre warned corporate boards that “the situation is fluid and changing regularly,” and provided guidance for overseeing company risk and response to Log4j.

What is Log4j?

Software developers use the Log4j framework to record user activity and the behavior of applications. Distributed free by the nonprofit Apache Software Foundation, Log4j has been downloaded millions of times and is among the most widely used tools to collect information across corporate computer networks, websites and applications. The software is maintained by Apache volunteers who have so far released three security updates. An Apache spokeswoman said the way Log4j is inserted into different pieces of software makes it impossible to track the tool’s reach.

How can hackers take advantage of Log4j’s vulnerability?

The Log4j flaw allows attackers to execute code remotely on a target computer, which could let them steal data, install malware or take control. Exploits discovered recently include hacking systems to mine cryptocurrency. Other hackers have built malware to hijack computers for large-scale assaults on internet infrastructure, cyber researchers have found.

The vulnerability might give hackers enough of a foothold within a system to install ransomware, a type of computer virus that locks up data and systems until the attackers are paid by victims. Security company F-Secure Oyj said its analysts have observed some ransomware variants being deployed via the Log4j flaw, along with malware that is often deployed as a precursor to a ransomware strike.

“To be clear, this vulnerability poses a severe risk,” said Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency. Internet-facing systems as well as back-end systems could contain the vulnerability.

Are foreign governments taking advantage of the flaw?

Security company Mandiant Inc. and Microsoft Corp. said they have traced attempted attacks that exploit the flaw to hackers with suspected links to China and Iran. Microsoft said one of the groups is the same one responsible for a hack of its Exchange Server email product earlier this year, which the U.S. attributed to China. Beijing denies involvement in the attack.

Microsoft said that it has also seen nation-backed hackers from North Korea and Turkey attempting to exploit Log4j.

Cybersecurity company SecurityScorecard Inc. said it has observed scans for the vulnerability linked to Russia-based hackers, including the group blamed for hacking the Democratic National Committee in 2016.

How is the U.S. government responding?

Officials say they have been in frequent contact with cybersecurity companies, cloud-service providers and telecommunications businesses to share information about the threat. The Biden administration ordered federal agencies to locate internet-connected software that uses Log4j and immediately update those tools, bolster their security measures or take them offline.

Eric Goldstein, executive assistant director of the Cybersecurity and Infrastructure Security Agency, said he wasn’t aware of any agency being breached using the Log4j flaw.

“But certainly we are deeply concerned about the prospect of adversaries using this vulnerability to cause real harm and even impacting national-critical functions,” he said.

CISA’s information page offers recommendations.

How is Europe responding?

Belgium’s Defense Ministry said it shut down parts of its computer network because attackers triggered the vulnerability.

Cybersecurity response teams for the 27 European Union countries are monitoring Log4j developments. Experts in national units across Europe are constantly exchanging technical information about what they see, said Gorazd Bozic, the chair of the network of incident response units from EU countries.

The network could move into a higher emergency-level status if a serious exploit occurs in Europe, Mr. Bozic said. So far, analysts have seen low-sophistication attempts to exploit Log4j, such as attackers seeking to install software for mining cryptocurrency, he said.

Belgium’s Centre for Cyber Security has been in contact with local companies after issuing a report on how to identify whether the vulnerability is being compromised, said Kevin Holvoet, a cyber threat intelligence analyst at the agency. Analysts have seen continuing scanning attempts to trigger the bug as well as reconnaissance efforts, he said.

The U.K.’s National Cyber Security Centre published steps to help companies identify the vulnerability in their IT infrastructure. The Dutch National Cyber Security Centre is maintaining a list of software that is and isn’t affected by the vulnerability.

In Romania, the National Cyber Security Directorate sent individual alerts to companies and critical infrastructure operators, said Dan Cimpean, the organization’s director. Mr. Cimpean said he has seen no sign of a serious incident in Romania. If a Romanian company is compromised, cyber experts from the agency could help, he said. “We have tools to escalate a very fast response if needed,” he said.

How widespread is the Log4j flaw?

Cybersecurity company Akamai Technologies Inc. has tracked 10 million attempts to exploit the Log4j vulnerability per hour in the U.S. Hackers are using the vulnerability to target the retail sector more than any other, Akamai said. The technology, financial-services and manufacturing industries have also been frequent targets.

Which technology suppliers are affected by the Log4j vulnerability?

Many, and the list is growing. Among them are Apple Inc., Amazon.com Inc., Cloudflare Inc., IBM, Microsoft’s Minecraft, Palo Alto Networks Inc. and Twitter Inc. Several technology companies have issued alerts and guidance to customers about how to decrease their risk.

How can companies fix the Log4j problem?

CISA suggests immediately identifying internet-facing devices that have Log4j and ensuring your security team responds to alerts related to these devices. Also, install a web application firewall with rules that automatically update so that your team can concentrate on fewer alerts.

Microsoft recommended a series of steps to mitigate the risk of exploitation, including contacting your software application providers to be sure they are using the most up-to-date version of the Java programming language, which would include patches.

In lieu of available patches, Teresa Walsh, global head of intelligence at the Financial Services Information Sharing and Analysis Center, recommends that companies limit unnecessary outbound internet traffic, which would go some way to protecting vulnerable systems.

“Firms can reduce their risk by reducing their exposure,” she said.

Write to David Uberti at [email protected], James Rundle at [email protected] and Catherine Stupp at [email protected]

Copyright ©2021 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

TAGGED:Tech NewsWall Street Publication
Share This Article
Twitter Email Copy Link Print
Previous Article Well-Preserved Embryo Found Inside Fossilized Dinosaur Egg Well-Preserved Embryo Found Inside Fossilized Dinosaur Egg
Next Article OnlyFans Names Its Marketing Chief as CEO OnlyFans Names Its Marketing Chief as CEO

Editor's Pick

The Math Behind the Magic: How FlyJuggler Turns “Siteswap” Theory Into Mesmerizing Art

The Math Behind the Magic: How FlyJuggler Turns “Siteswap” Theory Into Mesmerizing Art

Juggling is often seen as pure performance — a seamless blur of motion, rhythm, and flair. But for Bennett “FlyJuggler”…

By Editorial Board 3 Min Read
Authorities borrowing third-highest file in October as individuals not spending – official figures | Cash Information
Authorities borrowing third-highest file in October as individuals not spending – official figures | Cash Information

Authorities borrowing was increased than anticipated and customers tightened their belts, spending…

3 Min Read
Studs and Duds: The 49ers’ massive three — Purdy, Kittle, McCaffrey — dominate in blowout win over Cardinals
Studs and Duds: The 49ers’ massive three — Purdy, Kittle, McCaffrey — dominate in blowout win over Cardinals

Up and down the 49ers’ season goes. The lows? They’ve been fairly…

6 Min Read

Oponion

Will Smith Practically Kisses India Martínez, Calls Marriage Into Query Once more

Will Smith Practically Kisses India Martínez, Calls Marriage Into Query Once more

Studying Time: 3 minutes First, it was the Slap Heard…

February 26, 2025

Veteran Alabama receiver to overlook Missouri sport

Alabama soccer launched its Friday availability…

October 11, 2025

Fetterman could be keen to vote for Dr. Oz — on one situation

Sen. John Fetterman, D-Pa., mentioned he…

November 20, 2024

Bessent says authorities shutdown ‘beginning to reduce into muscle’ and economic system could also be shedding billions per day

 Sen. James Lankford, R-Okla., joins ‘Varney…

October 16, 2025

Democratic senator anxious Netanyahu making an attempt to ‘affect’ U.S. election

Sen. Chris Murphy (D-Conn.) says he’s…

October 3, 2024

You Might Also Like

Gear Information of the Week: Matter 1.5 Provides Sensible House Digicam Assist, and Gemini Involves Android Auto
Tech

Gear Information of the Week: Matter 1.5 Provides Sensible House Digicam Assist, and Gemini Involves Android Auto

The promise of interoperability on your good dwelling devices that Matter was presupposed to carry has been a sluggish course…

4 Min Read
The Ninja Slushi Is as Low cost as It is Been for Black Friday
Tech

The Ninja Slushi Is as Low cost as It is Been for Black Friday

For the primary yr of its life, the Ninja Slushi did not go on sale a lot. Principally what it…

4 Min Read
We have Spent Months Testing and Retesting to Discover You the Finest TV Antennas for Free TV
Tech

We have Spent Months Testing and Retesting to Discover You the Finest TV Antennas for Free TV

Different Antennas Value Contemplating{Photograph}: Ryan WaniataMohu Leaf (Passive) for $40-$45: After a number of scans and changes, I used to…

4 Min Read
I’m a Persistent Sloucher. These Posture Correctors Modified That
Tech

I’m a Persistent Sloucher. These Posture Correctors Modified That

Evaluate High 5 Posture CorrectorsExtra Equipment to StriveCourtesy of DepartmentDepartment Adjustable Laptop computer Stand for $65: Should you work at…

10 Min Read
The Wall Street Publication

About Us

The Wall Street Publication, a distinguished part of the Enspirers News Group, stands as a beacon of excellence in journalism. Committed to delivering unfiltered global news, we pride ourselves on our trusted coverage of Politics, Business, Technology, and more.

Company

  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • WP Creative Group
  • Accessibility Statement

Contact

  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability

Term of Use

  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices

© 2024 The Wall Street Publication. All Rights Reserved.

Welcome Back!

Sign in to your account

Lost your password?