• Latest
  • Trending
Log4j Forced a Cybersecurity Wake-Up Call

Log4j Forced a Cybersecurity Wake-Up Call

March 4, 2022
Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 29 April, 2026
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Log4j Forced a Cybersecurity Wake-Up Call

by ITECHNEWS
March 4, 2022
in Leading Stories, Opinion
0 0
0
Log4j Forced a Cybersecurity Wake-Up Call

It’s been nearly four months since Alibaba Cloud’s security team first reported a remote code execution (RCE) vulnerability within Apache Log4j (also known as Log4Shell). Due to the popularity and widespread use of this application, it very quickly became a top priority for security operatives and administrators around the world.

Within weeks, Apache issued a patch for the logging library vulnerability (CVE-2021-44228), accompanied by the highest severity rating of 10.0. Despite the quick response, it is estimated that more than 89% of all environments across businesses and cloud providers have vulnerable Log4j libraries. This particular RCE vulnerability posed an enormous threat to affected organizations, given how widely used the application is around the globe. Suddenly, adversaries had unlimited administrative access to a very vulnerable system.

YOU MAY ALSO LIKE

French Telco Orange Hit by Cyber-Attack

ATC Ghana supports Girls-In-ICT Program

The Story so Far

It was all hands on deck to try and get on top of the vulnerability. At the same time, threat intelligence sources started reporting mass scanning activity from several hosts checking for severs using Apache Log4j—the hunters had arrived.

From past experiences, experts concluded that attacks on RCE vulnerabilities usually began with automated reconnaissance scans to first identify targets with vulnerable versions of the software. Attackers then exploited the vulnerability using a uniquely crafted string which is processed by the vulnerable Log4j component, enabling unauthenticated remote code execution, potentially resulting in full access to the target system by the attacker.

Unfortunately, the first patch released on December 9, 2021, did not address the full risk, so a new CVE-2021-45046 was released and Apache distributed a second patch on December 13. This was followed by two additional patches on December 17 and 28, 2021.

The Stages of Response

While Apache worked quickly to release the necessary patches, criminals were moving equally as fast to exploit the vulnerability. To make matters worse, attackers required no prior access to the impacted systems to exploit the vulnerability, since it could be attacked remotely.

The initial recommendation was to disable the message lookup functionality by adjusting the LOG4J2.formatMsgNoLookups environment variable to true or even deleting the JNDILookup.class from impacted JAR files to help mitigate the vulnerability. Organizations quickly encountered another problem, however; as Log4j is often present in other files as a bundle or within a shared library, these workarounds were challenging, difficult to verify and not always possible due to their impact on systems that relied on Lookups for message formatting. While these recommendations did not mitigate the vulnerability risks completely, they did deliver a greater level of defense when combined with the latest patches.

Despite all the efforts made to mitigate the fallout from the vulnerability, security analysts soon discovered greater challenges when it came to detecting all instances of Log4j. Research from Rezilion showed that “Java files (such as Log4j) can be nested a few layers deep into other files and may be packaged in many different formats which creates a real challenge in digging them inside other Java packages.” Rezilion tested nine Log4j vulnerability scanners and found that none of them could detect all formats of the vulnerability, thereby showing that no single solution could effectively respond to such a widespread vulnerability.

Elevating to Ransomware

There have been several cases where the original Log4j vulnerability became a tool used in wider ransomware campaigns. In particular, the Australian Cyber Security Centre (ACSC) reported that ransomware groups known to have previously targeted Australian organizations joined the horde already exploiting the Log4j vulnerability.

Unsurprisingly, the issue went from zero to hero in no time at all—and once ransomware entered the ring, the fallout risk became catastrophic.

Newly disclosed vulnerabilities offer huge advantages to criminal groups that have ransomware in their armory if they act fast, which is why it became imperative to circulate the necessary patches and mitigations as soon as possible.

An Increase in Infrastructure Vulnerabilities

Apache Log4j is used around the globe, which exacerbated the risk of exploit when the vulnerability hit. Combined with the difficulties posed by the pandemic, this fact made for a challenging time for affected organizations and the impacts are still seen today.

Known ransomware-as-a-service (RaaS) groups, including Conti, jumped on opportunities like Log4j and often targeted critical infrastructure sectors like health care, transportation and food. The burden these industries are facing due to the latest Omicron variant of COVID-19 leaves them in a vulnerable position and ransomware groups are making the most of it.

Organizations should continue to prioritize protective measures against Log4j and any future vulnerability that may surface. It’s a wake-up call for businesses who may have been lax with their attack prevention and risk mitigation strategies. Vulnerability and threat management is critical to defending against known and unknown weaknesses in an organization’s infrastructure—and businesses should act immediately.

Source: Rochelle Fleming
Via: Security Boulevard
Tags: Log4j
ShareTweet

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025

Recent News

  • Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa July 29, 2025
  • French Telco Orange Hit by Cyber-Attack July 29, 2025
  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version