Home TECHNOLOGY Log4 Shell - The Zero-Day Vulnerability That Scares The Internet

Log4 Shell – The Zero-Day Vulnerability That Scares The Internet

On December 10, the news was disclosed of a severe vulnerability in the Apache Log4J library, Log4 Shell, which puts almost all applications and software using Java at risk. The risk for cyber security is high, so much so that it receives a score of 10 out of 10 on the CVSS scale that evaluates this type of vulnerability and involves many realities, both public and private. Let’s try to understand how the famous Apache open-source library works and why this bug risked doing severe damage.

What Is Log4J?

Log4J is a library written in Java code, allowing developers to create logs that record all the operations carried out by anyone who accesses and uses the software. In other words: ” its purpose is simply to keep track of everything that happens on the servers, noting every operation performed in a text file.” Log4J allows application developers to store a large amount of data, valid for monitoring the behavior of the software, both in the development phase and once it is sent online.

This makes it much easier for technicians to spot errors, malfunctions, and bugs.

It is the best-known and most popular open-source library used by many companies worldwide. For example, it is built into all Microsoft products, Twitter, Amazon, Minecraft, Steam, and iCloud, to name a few. And there is a zero-day vulnerability inside it, which has been called Log4 Shell.

Log4 Shell

Immediately defined as the “single largest and most critical vulnerability of the last decade,” Log4 Shell is a zero-day bug, a vulnerability unknown even to the developers who created the system.

This bug allows hackers who exploit it to take control of all servers running Java anonymously. Which, in practice, translates into illegal activities such as the creation of cryptocurrencies, the installation of malware to steal (and resell) log-in credentials, ransomware, and spying activities.

The cybersecurity threat is grave due to a few factors.

First of all, the Log4 Shell vulnerability seems to be very easy to exploit and, as already mentioned, involves a vast amount of software, devices, and companies. Suffice it to say that just 12 hours after the announcement of the discovery, over 40 thousand attacks have been recorded, with over 90 countries involved in the world. Furthermore, the seriousness of the situation also derives from the fact that, due to the very nature of the bug, it is tough to understand from where and, above all, from whom these attacks start.

Although most of the threats pass through servers located in Russia, this does not necessarily involve the Russian government being involved in the matter: “The Log4 Shell attack consists of two parts: the first is to send a written web request to a server or a vulnerable device to exploit the vulnerability; the second is to make malware available somewhere that will be downloaded by the target hit by the first action “. Not to mention that many attacks use a VPN connection to hide their origin. As soon as the security flaw was disclosed, although hackers were already exploiting it, many cyber-attacks started, some state-sponsored, i.e., connected to the governments of different countries such as China, Iran, and North Korea. And Turkey.

Run For Cover

Apache is, of course, not standing by. The American company immediately released two patches to solve the problem. However, both were not effective, showing similar vulnerabilities.

Only the third patch, particularly the 2.17.0 version of Log4J, seems immune to the Log4J Shell flaw. So far, all the actors involved who have implemented this version of the library have not reported any security problems. To reach this solution, however, took more than 2 weeks.

Precious time, which has cost over 4 million cyber attacks, with 43% of companies affected, and damages for a figure that will be challenging to establish. However, the announcement of the definitive closure of the flaw does not mean that we can let our guard down. The new version of Log4J focuses its attention on the CVE-2021-44832 vulnerability, which could execute lines of code from someone already inside the system, previously penetrated. While this is considered a minor threat, upgrading remains of paramount importance.

Tech Cults
Tech Cults is a global technology news platform that provides the trending updates related to the upcoming technology trends, latest business strategies, trending gadgets in the market, latest marketing strategies, telecom sectors, and many other categories.

RECENT POSTS

Reinventing Customer Loyalty To Meet New Consumer Expectations

Faced with increasingly volatile consumers, brands must offer more engaging experiences than ever. But building loyalty also involves displaying strong values or setting up...

5 Principles For Compelling Multi-Channel Prospecting

Channel prospecting is essential for business success. The science of prospecting has been around since the time of the Greeks. While there are many...

Best Smartwatches That Simplify Your Life 2022

Smartwatches are taking the world by storm. Be it an adult or a kid, everyone is wearing one or wanting to buy one! They...

Managing Mobility In Companies

Political interventions such as the end of combustion engines, subsidy chaos, and pointless revisions of the environmental bonus on the one hand, but necessary...

Accessible Workplace For The Disabled

Even though accessibility is being taken more and more seriously in a wide range of areas, people with disabilities still have to face numerous...

How Much Is A Blog Worth?

Last week, during a course I was teaching on the subject so dear to me as Digital Education, I focused on the importance of...