{"id":214464,"date":"2021-12-17T10:50:58","date_gmt":"2021-12-17T02:50:58","guid":{"rendered":"https:\/\/techwireasia.com\/?p=214464"},"modified":"2021-12-17T11:14:56","modified_gmt":"2021-12-17T03:14:56","slug":"new-log4j-vulnerability-most-serious-ever-chinese-hackers-already-exploiting-it","status":"publish","type":"post","link":"https:\/\/techwireasia.com\/2021\/12\/new-log4j-vulnerability-most-serious-ever-chinese-hackers-already-exploiting-it\/","title":{"rendered":"New Log4J vulnerability ‘most serious ever’, Chinese hackers already exploiting it"},"content":{"rendered":"
A critical new vulnerability called Log4j (or, Log4Shell) was disclosed last week — and at risk are hundreds of millions of devices around the world. The Log4j flaw was found to be on an open-source library used by millions of web servers. The bug leaves them all vulnerable to attack so organizations around the world are left scrambling to patch affected systems before <\/span>hackers<\/span><\/a> can exploit them.<\/span><\/p>\n The US Cybersecurity and Infrastructure Security Agency\u2019s (CISA) director Jen Easterly <\/span>told <\/span><\/a>CNN <\/span><\/i>that \u201cthe vulnerability is one of the most serious that I have seen in my entire career, if not the most serious.\u201d <\/span>CNN <\/span><\/i>was briefed after the US officials held a call with industry executives, warning that hackers are actively exploiting the vulnerability.<\/span><\/p>\n According to researchers from <\/span>Cisco<\/span><\/a> and <\/span>Cloudflare<\/span><\/a>, hackers have been exploiting the bug since the beginning of the month. However, attacks ramped up dramatically following Apache’s disclosure last Thursday. <\/span>Jen also emphasized that the <\/span>security flaw poses a \u201csevere risk\u201d<\/span><\/a> to the internet. \u201cThis vulnerability, which is being widely exploited by a <\/span>growing set of threat<\/span><\/a> actors, presents an urgent challenge to network defenders given its broad use,\u201d she added.<\/span><\/p>\n The news on the software flaw broke last week, with an initial <\/span>alert by CERT New Zealand<\/span><\/a>. Followed by the <\/span>CISA<\/span><\/a> and the UK’s National Cyber Security Center. For context, the vulnerability is in Java-based software known as “Log4j” and large organizations including some of the world’s biggest tech firms use it to log information in their applications.<\/span><\/p>\n In short, the flaw affects millions of pieces of software, running on a large number of machines that many systems interact with. So far, there have been various hacker orgs including Chinese state-backed groups, <\/span>per the <\/span>Financial Times<\/span><\/i><\/a>, that have launched more than 1.2 million attacks on companies globally since last Friday. Quoting cybersecurity group Check Point, FT<\/em> said the attacks relating to the vulnerability had accelerated since then and that at some points researchers were seeing more than 100 attacks a minute.\u00a0<\/span><\/p>\n In fact, the Dutch National Cyber Security Center <\/span>released<\/span><\/a> a lengthy list of software that is affected by the vulnerability. A map showing where Log4j exploitation attempts have been made was released by international security company ESET. It indicates the highest volumes occurring in the US, UK, Turkey, Germany, and the Netherlands.<\/span><\/p>\n Log4j exploitation attempts. Source: ESET<\/p><\/div>\n Not too long after the flaw was detected, Apache <\/span>gave the vulnerability a \u201ccritical\u201d ranking<\/span><\/a> and rushed to develop a solution. IT teams will have to update Log4j to version 2.15.0, which was <\/span>released before the vulnerability was made public<\/span><\/a> and it mostly fixes the issue. At the time of writing, tech giants like<\/span> Amazon Web Services<\/span> and <\/span>IBM<\/span> have addressed the bug in their products.<\/span><\/p>\n Even <\/span>Microsoft<\/span>, <\/span>Cisco<\/span>, and <\/span>Google Cloud<\/span>, have all found that at least some of their services were vulnerable and have been rushing to issue fixes and advise customers about how best to proceed. Unfortunately, <\/span>a Wired<\/i> article<\/span><\/a> stated that the Log4Shell will continue to wreak havoc across the internet for years to come, as many organizations won’t even realize that they have systems at risk. In the meantime, attackers will continue to look for creative new ways to discover and continue exploiting as many vulnerable systems as possible.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" Hundreds of millions of devices around the world are at risk of a newly revealed software vulnerability — the Log4j\u00a0 Attackers had over a week’s headstart on exploiting the software flaw before it was publicly disclosed, and the fallout could continue for days and weeks as organizations race to address the issue Tech giants like… Read more »<\/a><\/p>\n","protected":false},"author":607,"featured_media":214472,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,4381,2372,10449,10],"tags":[2949,2701,10503],"yoast_head":"\nWhat is Log4j and why is it so severe?<\/b><\/h3>\n
<\/div>
CAN QUANTUM KEY DISTRIBUTION IMPROVE CYBERSECURITY IN SEA?<\/h4>