Home TECHNOLOGY Log4 Shell - The Zero-Day Vulnerability That Scares The Internet

Log4 Shell – The Zero-Day Vulnerability That Scares The Internet

On December 10, the news was disclosed of a severe vulnerability in the Apache Log4J library, Log4 Shell, which puts almost all applications and software using Java at risk. The risk for cyber security is high, so much so that it receives a score of 10 out of 10 on the CVSS scale that evaluates this type of vulnerability and involves many realities, both public and private. Let’s try to understand how the famous Apache open-source library works and why this bug risked doing severe damage.

What Is Log4J?

Log4J is a library written in Java code, allowing developers to create logs that record all the operations carried out by anyone who accesses and uses the software. In other words: ” its purpose is simply to keep track of everything that happens on the servers, noting every operation performed in a text file.” Log4J allows application developers to store a large amount of data, valid for monitoring the behavior of the software, both in the development phase and once it is sent online.

This makes it much easier for technicians to spot errors, malfunctions, and bugs.

It is the best-known and most popular open-source library used by many companies worldwide. For example, it is built into all Microsoft products, Twitter, Amazon, Minecraft, Steam, and iCloud, to name a few. And there is a zero-day vulnerability inside it, which has been called Log4 Shell.

Log4 Shell

Immediately defined as the “single largest and most critical vulnerability of the last decade,” Log4 Shell is a zero-day bug, a vulnerability unknown even to the developers who created the system.

This bug allows hackers who exploit it to take control of all servers running Java anonymously. Which, in practice, translates into illegal activities such as the creation of cryptocurrencies, the installation of malware to steal (and resell) log-in credentials, ransomware, and spying activities.

The cybersecurity threat is grave due to a few factors.

First of all, the Log4 Shell vulnerability seems to be very easy to exploit and, as already mentioned, involves a vast amount of software, devices, and companies. Suffice it to say that just 12 hours after the announcement of the discovery, over 40 thousand attacks have been recorded, with over 90 countries involved in the world. Furthermore, the seriousness of the situation also derives from the fact that, due to the very nature of the bug, it is tough to understand from where and, above all, from whom these attacks start.

Although most of the threats pass through servers located in Russia, this does not necessarily involve the Russian government being involved in the matter: “The Log4 Shell attack consists of two parts: the first is to send a written web request to a server or a vulnerable device to exploit the vulnerability; the second is to make malware available somewhere that will be downloaded by the target hit by the first action “. Not to mention that many attacks use a VPN connection to hide their origin. As soon as the security flaw was disclosed, although hackers were already exploiting it, many cyber-attacks started, some state-sponsored, i.e., connected to the governments of different countries such as China, Iran, and North Korea. And Turkey.

Run For Cover

Apache is, of course, not standing by. The American company immediately released two patches to solve the problem. However, both were not effective, showing similar vulnerabilities.

Only the third patch, particularly the 2.17.0 version of Log4J, seems immune to the Log4J Shell flaw. So far, all the actors involved who have implemented this version of the library have not reported any security problems. To reach this solution, however, took more than 2 weeks.

Precious time, which has cost over 4 million cyber attacks, with 43% of companies affected, and damages for a figure that will be challenging to establish. However, the announcement of the definitive closure of the flaw does not mean that we can let our guard down. The new version of Log4J focuses its attention on the CVE-2021-44832 vulnerability, which could execute lines of code from someone already inside the system, previously penetrated. While this is considered a minor threat, upgrading remains of paramount importance.

Tech Cults
Tech Cults is a global technology news platform that provides the trending updates related to the upcoming technology trends, latest business strategies, trending gadgets in the market, latest marketing strategies, telecom sectors, and many other categories.


Cloud ERP: Greater Efficiency And Savings For Your Business

Cloud ERP is yet another novelty that has been improving organizations' routine, which is increasingly dynamic and needs savings and agility.In short, it is...

Is AnyWebP A Trusted Website To Convert WebP Images To JPG?

File conversion is necessary because it allows users to share and store their files in various formats. This will enable people with different devices...

5 Reasons Why GST Payments Are Critical For Businesses

Goods and Services Tax (GST) was a bold move by the central government to simplify indirect taxes and offer a multitude of advantages for...

The Design That The Galaxy S23 Series Will Have Has Been Filtered

Mobile phone designs have been leaked, which will undergo minor changes from last year.SAMSUNG It is just weeks away from unveiling the new version...

6 Ways To Find Real-World Entrepreneurs Online

Hearing successful entrepreneurs' stories can inspire and educate aspiring business owners. Often, people who are successful in implementing their ideas can provide helpful tips...

Manual vs. Automated: Which Testing Method Is Best?

Test manually or automatically? All software developers face this question sooner or later. Today, we find out the advantages and disadvantages of both types...