Regístrese ahora para una mejor cotización personalizada!

US warns Log4j flaw puts hundreds of millions of devices at risk

Dic, 14, 2021 Hi-network.com

Top US government cybersecurity officials fear advanced hackers will have a field day with the Log4j vulnerability that's likely present in hundreds of millions of devices. 

Security experts are already seeing widespread scanning for the Log4j vulnerability (also dubbed 'Log4Shell') on internet-connected devices running vulnerable versions of Log4j version 2, which have been under attack since December 1, although the bug became common knowledge on December 9. 

So far, Microsoft has seen attackers compromise machines to install coin miners, the Cobalt Strike pen-testing framework to enable credential theft and lateral movement, and exfiltration of data from compromised systems.


LOG4J FLAW COVERAGE - WHAT YOU NEED TO KNOW NOW

  • Security warning: New zero-day in the Log4j Java library is already being exploited 
  • Log4j RCE activity began on December 1 as botnets start using vulnerability

These attacks appear to be opportunistic cyber-criminal activity thanks to its ease of exploitation, but top officials at the US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) fear "sophisticated actors" will also pounce on the bug soon. 

"This vulnerability is one of the most serious that I've seen in my entire career, if not the most serious," Jen Easterly, director of CISA said in a call shared with CNN. Easterly has spent 20 years in various federal cybersecurity roles.

"We expect the vulnerability to be widely exploited by sophisticated actors and we have limited time to take necessary steps in order to reduce the likelihood of damage," she said. The call, with US critical infrastructure owners and operators, was first reported by CyberScoop.  

Jay Gazlay of CISA's vulnerability management office warned that hundreds of millions of devices are likely to be affected.

Log4J is a popular Java library for logging error messages in applications. It's vulnerable to a critical flaw, tracked as CVE-2021-44228, that lets any remote attacker take control of another device on the internet, if it's running Log4J versions 2.0 to 2.14.1. 

Recommends

  • Best VPN services
  • Best security keys
  • Best antivirus software
  • The fastest VPNs

The remotely exploitable flaw is present in hundreds of major enterprise products, from the likes of Oracle, Cisco, RedHat, IBM, VMware and Splunk, and cloud features from Amazon Web Services and Microsoft Azure, as well as security appliances and developer tools. Google Cloud is investigating the impact of the Log4j bug on its products and services, and is working with VMware to deploy fixes to the Google Cloud VMware Engine. Google has updated WAF rules to defend against Log4j attacks.  

The Apache Software Foundation has released version 2.15.0 to address the flaw, but product vendors still need to apply the fix in their products and then end-user customers need to update their devices once their vendor's fix becomes available.          

The flaw highlights known risks arising from software supply chains when a key piece of software is used within multiple products across multiple vendors and deployed by their customers around the world.


LOG4J FLAW COVERAGE - HOW TO KEEP YOUR COMPANY SAFE

  • Log4j zero-day flaw: What you need to know and how to protect yourself
  • Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability 

It's not a simple fix to address all vulnerable devices. As Sans Internet Storm Center notes: "There is no generic 'log4j2' patch to patch everything. In some cases, vendors including Log4j, need to patch their software to include the new version."

Rapid7 had a similar warning: "Organizations should be prepared for a continual stream of downstream advisories from third-party software producers who include Log4j among their dependencies."

SEE:Hackers are turning to this simple technique to install their malware on PCs

Rapid7 itself has been investigating its products' exposure to the Log4j bug and has deployed server-side fixes for several affected products. 

Historically slow uptake of new security patches means attackers will likely have months if not years to find and exploit vulnerable devices, security experts warned this week. 

The Log4j bug is internet-wide, prompting advisories from Australia, New Zealand, Canada, the UK, Sweden, Germany, Singapore, and elsewhere. Canada's Revenue Agency took some services offline on Friday after learning of the flaw, according to CBC.  

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Etiquetas calientes: tecnología seguridad

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.