3rd Party Risk Management , Application Security , Business Continuity Management / Disaster Recovery

Log4j Updates: Flaw Challenges Global Security Leaders

ISMG Team's Latest News and Views of Critical Zero-Day and Its Impact
Log4j Updates: Flaw Challenges Global Security Leaders

The security world continues its fight against potential widespread exploitation of the critical remote code execution vulnerability - tracked as CVE-2021-44229 - in Apache's Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell" and "Logjam."

See Also: The State of Organizations' Security Posture as of Q1 2018

As the U.S. Cybersecurity and Infrastructure Security Agency warns, Log4j is "very broadly used in variety of consumer and enterprise services, websites, and applications - as well as in OT products - to log security and performance information." An unauthenticated remote actor, CISA warns, could exploit this vulnerability to take control of an affected system.

Here, you'll find Information Security Media Group's ongoing coverage around Log4j - including how to navigate the patch process and how attackers are beginning to exploit it.

Feb. 2, 2022

Log4J Puts Vulnerable Ubiquiti Network Applications at Risk

A customized exploit for the Log4J vulnerability is targeting Ubiquiti's UniFi Network applications, according to cybersecurity researchers. Developed by Ubiquiti Networks, UniFi Network can be installed on a Windows, macOS or Linux device, where it can be used to help set up and manage UniFi Network devices as well as provide full oversight and control of a network's traffic, security and wireless performance.

Jan. 28, 2022

Log4j Exploitations Have Slowed, But Attack Vectors Remain

Attackers made more than 30,000 attempts to scan and leverage exploits found in the critical Log4Shell vulnerability in January, according to security firm Kaspersky. Log4Shell, a flaw found in the Apache Software Foundation Log4j library logging tool, was first disclosed to the public in December and continues to be a challenge.

Jan. 26, 2022

Report: Access Broker Exploiting VMware Log4j Vulnerability

VMware released a patch to fix the Log4j remote code execution flaw present in its software last December and has issued guidance on mitigation. But in its new report, BlackBerry says its security research team has tracked cryptomining software and Cobalt Strike deployments on Horizon. The latter tool is marketed as "software for adversary simulations and red team operations," but attackers regularly use cracked copies of the tool to build botnets. BlackBerry also says tactics, techniques and procedures related to Prophet Spider IAB - which is known to sell network access to other criminals, including ransomware gangs - have been spotted.

Jan. 25, 2022

Microsoft Finds SolarWinds Vulnerability Amid Log4j Search

Microsoft researchers tracking Apache Log4j exploits last week discovered a previously undisclosed vulnerability in SolarWinds' Serv-U software, which the firm has since confirmed and patched.

Jan. 21, 2022

From the Trenches: Remediating Widespread Apache Log4j Flaw

Exploitable vulnerabilities in the widely used Apache Log4j logging software have left security teams scrambling to identify where the software is used in their environment as well as how to guard against it being exploited.

Jan. 20, 2022

HHS HC3: Healthcare Sector Remains at Risk for Log4j Attacks

Although there have been no major compromises in the healthcare and public health sector to date involving Apache Log4j flaws, the health sector remains highly vulnerable, as do other industries, federal regulators warn.

Jan. 17, 2022

A Structured Response to the Log4j Vulnerability

Ian Keller, security director at Ericsson, discusses a structured approach to mitigating the Log4j vulnerability. "I would advise security teams to use scanning tools native to their organization to identify the Log4j kind of vulnerabilities and zero-day gaps," he says.

Jan. 12, 2022

Night Sky Ransomware Distributed via Log4j Exploits

Night Sky ransomware appears to be new. It was first spotted by security research group MalwareHunterTeam, which on Jan. 1 reported finding a dedicated data leak site for attacks tied to that strain of ransomware. As such, it means the attackers are practicing double extortion, meaning they demand payment not just for a decryptor, but also to not release stolen data.

Jan. 10, 2022

CISA: Federal Response to Log4j Has Been 'Exceptional'

Top U.S. cybersecurity leaders continue to warn against the perils of Apache Log4j vulnerabilities, confirming in a press conference that hundreds of millions of devices worldwide are likely affected by the logging utility flaw, although the response, in terms of scope and speed, has been "exceptional." Director of CISA, Jen Easterly, discusses incident reporting and SBOM legislation.

Jan. 7, 2022

Log4j: Sen. Peters Revisits Incident Reporting Legislation

U.S. Sen. Gary Peters, D-Mich., who chairs the Homeland Security and Governmental Affairs Committee, said this week that he convened a virtual briefing with both the U.S. Cybersecurity and Infrastructure Security Agency and National Cyber Director Chris Inglis to discuss the Biden administration's efforts to mitigate the threat posed by the Log4j vulnerability. Also, read additional updates by CISA in regards to Log4j.

Jan. 6, 2022

CISO Playbook: Log4j Response - What We Did, What We Learned

The Apache Log4j vulnerability capped the end of a long year for CISOs and incident responders, and it left them with a mitigation project that carries them well into the New Year. CISOs John Bassett and Martin Dinel discuss how their teams have tackled Log4j - and significant lessons learned.

Jan. 5, 2022

FTC Threatens Action Against Orgs Failing to Mitigate Log4j

The U.S. Federal Trade Commission, the nation's top consumer protection agency, issued notice that organizations failing to mitigate against Apache's Log4j vulnerabilities may face legal action.

Jan. 4, 2022

Microsoft: Log4j Exploit Attempts, Testing Remain Rampant

In an update to its Apache Log4j vulnerability guidance, Microsoft says exploitation attempts and testing for vulnerable systems and devices remained "high" through late December. This comes after security leaders have identified several sophisticated and even state-backed cyberattacks or attempts targeting vulnerable devices in recent weeks. Also, CISA continues to advocate for SBOM.

Dec. 30, 2021

CISA, Vendors Refine Scanners for Log4j Vulnerabilities

As network defenders continue to patch or mitigate against the remote code execution vulnerability in the Java-based logging utility Log4j, several cybersecurity vendors have issued scanning and assessment tools to speed up the identification process. Also, in an event on Tuesday with ISMG's CyberEdBoard, a members-only community of security executives and thought leaders, Eric Goldstein, executive assistant director for cybersecurity at CISA, stressed the significance of Log4j.

Dec. 29, 2021

Crypto Platform Suffers Log4j-Related Ransomware Attack

ONUS, one of Vietnam's largest cryptocurrency platforms, has reportedly fallen victim to a ransomware attack that has been traced to Apache's remote code execution vulnerability, Log4j, via third-party payment software. CrowdStrike has also detected Chinese APT activity around the logging flaw.

Dec. 28, 2021

Apache's Log4j Version 2.17.1 Addresses New Flaw

Another Log4j patch has been released by the Apache Foundation, the nonprofit that supports Apache's open-source software projects. Its Log4j version 2.17.1 fixes a newly disclosed remote code execution vulnerability tracked as CVE-2021-44832. The latest flaw is the fifth disclosed in under a month - four around Log4j and another detected in the "logback" framework. All target the easily exploitable, arbitrary remote code execution flaw in the Java-based logging utility - which experts say is present in millions of devices worldwide, or more.

Dec. 24, 2021

Fighting the Serious Apache Log4j Flaw: What's the Latest?

The latest edition of the ISMG Security Report features an analysis of the most recent developments in the Log4j security flaw crisis as well as incident response essentials for the ransomware era.

Dec. 22, 2021

CISA, International Partners Advise All Orgs to Patch Log4j

CISA, the FBI, the NSA and several of their international law enforcement partners have issued a joint advisory on the known vulnerabilities in the Apache Log4j software library urging "any organization using products with Log4j to mitigate and patch immediately.

'Hack DHS' Program Expanded to Include Log4j Bug Hunters

A week after announcing a new bug bounty program called "Hack DHS," intended to safeguard the federal agency's systems, U.S. Department of Homeland Security Secretary Alejandro Mayorkas announced that DHS is expanding the scope of the program to include finding and patching Log4j-related vulnerabilities in the systems.

Apache Log4j Meets Optiv MXDR

Since mid-December, enterprises globally have been responding to urgency of the Apache Log4j zero-day. John Ayers of Optiv discusses Optiv MXDR and how it helps customers detect, respond and provide visibility to protect from potential exploits.

Dec. 21, 2021

Log4j: Belgian Defense Ministry Reports It Was 'Paralyzed'

Belgium's Ministry of Defense announced it had fallen victim to a cyberattack linked to the Log4j vulnerability tracked as CVE-2021-44228. The attack reportedly "paralyzed the ministry's activities for several days." Also, Cryptolaemus, a security research group, made connections between Log4j and Dridex banking malware and the Meterpreter pen-testing tool.

Video: The Challenge of Open-Source Software Security

The Log4j vulnerability has underscored once again the widespread dependence on open-source software projects and the lurking risks. Patrick Dwyer of OWASP says such projects deserve more resources to avoid major security vulnerabilities.

Dec. 20, 2021

As Ransomware Variants Shift, Incidents 'Still on the Rise'

Ransomware-as-a-service continues to be a model cybercriminals are latching onto, with top variants accounting for the majority of the attacked: LockBit, Conti, BlackMatter, and Hive. Conti, in particular, are exploring ways to leverage attacks using the Log4j vulnerability.

Dec. 18, 2021

Time to Patch Log4j Again; Apache Releases 2.17 Fixing DoS

A third version of Apache Log4j - version 2.17 - fixes yet another highly sensitive denial-of-service vulnerability - CVE-2021-4505. The newly detected vulnerability was found in 2.16 and all other versions.

Apache Log4j: New Attack Vectors, Ransomware Seen

Cybersecurity firms, such as Blumira and Juniper Threat Labs, have uncovered multiple new attacks stemming from the Log4j vulnerability. Researchers say nation-state attackers are beginning to abuse and test the vulnerability while cybercriminals are targeting the flaw to drop malicious code, from ransomware to cryptomining software. Others are harvesting credentials to sell on the dark web.

Dec. 17, 2021

CISA to Agencies: Patch Log4j Vulnerability 'Immediately'

In an emergency directive issued on Friday regarding the explosive Apache Log4j vulnerabilities, CISA has required federal civilian departments and agencies to assess their internet-facing network assets and immediately patch the systems or implement appropriate mitigation measures.

Log4j Flaw: Healthcare Sector Warned to Take Action

Healthcare sector entities, like organizations across most industries, are being warned by authorities to carefully assess how the recently identified remote code execution vulnerability in the Apache Log4j Java logging library might affect their environments. What steps should they take?

ISMG Editors: Apache Log4j, Ransomware Updates

In the latest weekly update, four editors at ISMG discuss important cybersecurity issues, including mitigating the Apache Log4j zero-day vulnerability, findings from a new report analyzing the Conti ransomware attack on Ireland's Health Services Executive and President Biden's drive to tighten export controls on certain offensive cyber tools.

Log4j Special: What You Need to Know

The latest edition of the ISMG Security Report features an analysis of the Log4j security flaw, including the risks and mitigation techniques, how to patch Log4j, and CISO Dawn Cappelli on Log4j response.

Dec. 16, 2021

News: Nation-State Attackers Wielding Log4j Against Targets

Cybersecurity experts are warning that a number of attackers tied to nation-states appear to be actively abusing or testing the Apache Log4j vulnerability. Criminal groups have also begun to target the flaw to drop malicious code, including crypto-locking malware, and well-known access brokers are using the flaw to gather enterprise access credentials for sale to other attackers, including ransomware groups, some experts warn.

Dec. 15, 2021

News: How to Patch Now That Version 2.16 Has Been Released

The question now facing already overworked teams attempting to identify software and hardware that might have the flaw, test and deploy patches, and mitigate any attempts to exploit their systems before such fixes can be deployed, is now: Which version of the patched software should they deploy - 2.15.0 or the newly released 2.16.0?

Video: Attackers Exploiting Apache Log4j: 'Everyone Is a Target'

What's in store for defenders as attackers increasingly move to target the widespread Apache Log4j flaw present in many different types of software and hardware?

"Everyone is a target," says cybersecurity expert Etay Maor, whose team at Israeli secure access service edge company Cato Networks has been analyzing hundreds of attacks that attempt to exploit the Log4j vulnerability.

Dec. 14, 2021

News: Exploiting Log4j: 40% of Corporate Networks Targeted So Far

Experts warn that mitigating the Log4j version 2.14.x problem will be more akin to a marathon than a sprint. That's because Log4j is used by numerous vendors, and many have yet to identify all products at risk or develop and release patches. Once they do, enterprise IT and security teams will need to thoroughly test those patches to ensure they don't break existing setups, before rolling them out to production.

Video: CISO Playbook: Dawn Cappelli on Mitigating Log4j Zero-Day

Like CISOs everywhere, Dawn Cappelli of Rockwell Automation awoke last Friday to news about the Log4j vulnerability and the risk it posed to her company, customers and partners. Here is how she approached triage, response and capturing insights to be shared with other security leaders.

Apache Log4j - file image

Dec. 13, 2021

News: Already Compromised by Apache Log4j? Check Before You Patch

Multiple security researchers have now spotted several instances of threat actors exploiting the Apache Log4j vulnerability by deploying malwares including Muhstik and Mirai botnets or by scanning for vulnerable servers. Responders are advised to check for compromise before they implement fixes.

News: Serious Log4j Security Flaw: Race Underway to Discern Scope

For many security teams, it's been all hands on deck since the Apache Log4j zero day vulnerability recently came to light. Experts say the flaw may be the most serious security vulnerability to have emerged in years.

Dec. 11, 2021

News: Log4j: 'Vaccine' Released for Exploited Apache Zero Day

Urgent application of a temporary fix is advised as advanced persistent threat-level actors and access brokers are now reported to be conducting mass scanning for the zero-day vulnerability detected in the Java logging library Apache Log4j, which can result in full server takeover and leaves countless applications vulnerable.

Podcast: Log4j Zero-Day: 'It's About as Serious as It Gets'

How serious is the Apache Log4j zero-day vulnerability that was announced to the world on Friday? "It's big," says Sam Curry, chief security officer at Cybereason, which has developed a 'vaccine' to help mitigate the vulnerability. "I hate hyperbole generally," Curry says. "But it is a 10 on the criticality scale."

Dec. 10, 2021

Breaking News: Severe Apache Log4j Vulnerability Threatens Enterprise Apps

A zero-day vulnerability detected in the Java logging library Apache Log4j can result in full server takeover and leaves countless applications vulnerable, according to security researchers, who say that the easily exploitable flaw was first detected in the popular game Minecraft.


About the Author

Devon Warren-Kachelein

Devon Warren-Kachelein

Former Staff Writer, ISMG

Warren-Kachelein began her information security journey as a multimedia journalist for SecureWorld, a Portland, Oregon-based cybersecurity events and media group. There she covered topics ranging from government policy to nation-states, as well as topics related to diversity and security awareness. She began her career reporting news for a Southern California-based paper called The Log and also contributed to tech media company Digital Trends.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.