Log4j was initially released in October 1999. It got much attention in December 2021, when critical vulnerabilities were made public. And to this day, threat actors still exploit its exposure.
Apache Log4j is one of the most utilised open-source software. It is a software library within an application or java service. It logs all system events automatically. And by nature, users are commonly unaware that it is running in the background.
David Nalley, president of the Apache Software Foundation, notes that “Logging is fundamental to any computer software or hardware operation. Whether it’s a phlebotomy machine or an application server, Logging is going to be present.”
In the latter part of 2021, it was identified that it had one critical flaw. When the Log4j library logs system events, it uses a standard set of interfaces for accessing Java Naming and Directory Interface (JNDI).
Kaspersky tech author Leonid Grustniy recounts that the system’s vulnerability is that when it logs, it becomes capable of running JNDI commands passed to it by an event like in the header field of a request, a chat message or even the description of a 404 error message.
According to Grustniy, “The vulnerability allows cybercriminals, at least theoretically, to do whatever they like on the victim’s system (if no additional security measures kick in). In practice, attackers often used Log4Shell to install illegal miners and carry out ransomware attacks. But there have been more exotic uses, including targeted attacks, spreading the Mirai botnet, and even RickRolling playing the ‘Never Gonna Give You Up’ hit by 80s crooner Rick Astley.”
To this day, attackers are still actively exploiting Log4Shell, despite numerous patches deployed to prevent it from happening. According to Chainguard CEO Dan Lorenc, “Log4Shell is going to show up in data breaches for the next decade as part of the root cause—all it takes is one instance of Log4Shell to be vulnerable.” He also added that when the vulnerability was first detected, the entire cybersecurity community scrambled to ensure attackers would not be able to impact most consumers.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...