Update on the High-Profile Security Vulnerability |

Vulnerability (CVE-2021-44228, also known as Log4Shell or LogJam) in the Java-based Log4j registry tool caused widespread panic on the Internet when security experts rushed to fix the flaw.

Log4j is an open source registration framework created by Apache systems, used by developers to record activity – usually error messages – within applications. Due to the nature of the exposure, which is indicated as a RCE (Remote Code Registration) vulnerability, any device exposed to the Internet while running versions 2.0 to 2.14.1 of Apache Log4j can be attacked relatively easily. Several national cyber security agencies have issued warnings about the Apache Log4j vulnerability, and there is clear evidence that hackers are developing targeted strategies to exploit the flaw. For example, the Mirai bot, targeting IoTconnected devices, has already created a exploit to target the flaw.

Most people have never heard of Log4j before, but it is the most popular Java registry library in the world and is embedded in a variety of applications, services and websites, including Apple, Amazon, Twitter and Microsoft’s Minecraft game. While Java programming language is not as widespread everywhere as it used to be, it is still widely used in all Internet sectors. Security experts have stressed that any device that is not properly protected can be compromised by hackers exploiting the flaw in Log4j. Apache himself labeled the vulnerability at the critical level of “critical”. Also the National Database for Vulnerability in the US Gives a base score of 10.0, “Critical”. AWS, IBM, Oracle and others have been actively working on patch fixes, but people are advised to take steps (see below) to ensure their devices are secure.

How to exploit the flaw in Log4j

To exploit the flaw, all hackers need to do is create a simple line of malicious code. This code will soon be registered by Log4j, and will give hackers an entry point to the affected device. Hackers then have the means to gain control, and they can run arbitrary code to take over the entire system, including encrypting files (and holding them for ransom). In an effort to illustrate how easy it is to exploit the flaw of Log4j, Wired report That some Twitter users change their name to code strings that can be used to trigger exploitation. Screenshots from the game Minecraft also showed players taking advantage of the flaw from the game’s chat function.

How to secure your devices against Log4j defect

First, it is important to recognize that the flaw is in Log4j versions 2.14.1 and below. Apache has called on all developers to install the latest version of the library, Log4j 2.15.0. In addition, it is highly recommended to install security solutions on your devices and servers. Check Point Infinity platform powered by Check Point’s Threat Cloud and artificial intelligence based protection provides protection against Log4j vulnerability. You can read more about how to stay protected in Check Point website.

Regional alarm The products are not affected by the vulnerability because the Log4j utility is not used. ZoneAlarm’s cyber threat team continues to investigate and monitor the situation in what is considered an ongoing critical threat.

Source

Vulnerability (CVE-2021-44228, also known as Log4Shell or LogJam) in the Java-based Log4j registry tool caused widespread panic on the Internet when security experts rushed to fix the flaw.

Log4j is an open source registration framework created by Apache systems, used by developers to record activity – usually error messages – within applications. Due to the nature of the exposure, which is indicated as a RCE (Remote Code Registration) vulnerability, any device exposed to the Internet while running versions 2.0 to 2.14.1 of Apache Log4j can be attacked relatively easily. Several national cyber security agencies have issued warnings about the Apache Log4j vulnerability, and there is clear evidence that hackers are developing targeted strategies to exploit the flaw. For example, the Mirai bot, targeting IoTconnected devices, has already created a exploit to target the flaw.

Most people have never heard of Log4j before, but it is the most popular Java registry library in the world and is embedded in a variety of applications, services and websites, including Apple, Amazon, Twitter and Microsoft’s Minecraft game. While Java programming language is not as widespread everywhere as it used to be, it is still widely used in all Internet sectors. Security experts have stressed that any device that is not properly protected can be compromised by hackers exploiting the flaw in Log4j. Apache himself labeled the vulnerability at the critical level of “critical”. Also the National Database for Vulnerability in the US Gives a base score of 10.0, “Critical”. AWS, IBM, Oracle and others have been actively working on patch fixes, but people are advised to take steps (see below) to ensure their devices are secure.

How to exploit the flaw in Log4j

To exploit the flaw, all hackers need to do is create a simple line of malicious code. This code will soon be registered by Log4j, and will give hackers an entry point to the affected device. Hackers then have the means to gain control, and they can run arbitrary code to take over the entire system, including encrypting files (and holding them for ransom). In an effort to illustrate how easy it is to exploit the flaw of Log4j, Wired report That some Twitter users change their name to code strings that can be used to trigger exploitation. Screenshots from the game Minecraft also showed players taking advantage of the flaw from the game’s chat function.

How to secure your devices against Log4j defect

First, it is important to recognize that the flaw is in Log4j versions 2.14.1 and below. Apache has called on all developers to install the latest version of the library, Log4j 2.15.0. In addition, it is highly recommended to install security solutions on your devices and servers. Check Point Infinity platform powered by Check Point’s Threat Cloud and artificial intelligence based protection provides protection against Log4j vulnerability. You can read more about how to stay protected in Check Point website.

Regional alarm The products are not affected by the vulnerability because the Log4j utility is not used. ZoneAlarm’s cyber threat team continues to investigate and monitor the situation in what is considered an ongoing critical threat.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

Security For Want of a Nail

Do not Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless bunch. They continue to evolve their...

Threat Intelligence Services Are Universally Valued by IT Staff

Almost all IT professionals believe that threat intelligence services and feeds will help their company get ready for and repulse malware attacks. Only...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!