Tech

Log4Shell – World’s Leading Cybersecurity Agencies Warn of Vulnerability Threats

Published

on

Leading Cybersecurity Agencies in Peace are a threat alert from the Log4Shell vulnerability and other related vulnerabilities. In a joint statement released this week, the Fives Eyes intelligence alliance indicates that Threat agents actively exploit an Apache vulnerability in the Log4j log library.

Five Eyes, made up of cybersecurity agencies from the US, UK, Australia, New Zealand and Canada, reports that “sophisticated cyberthreat actors are actively scanning networks to potentially exploit Log4Shell, CVE-2021-45046, and CVE-2021. -45105 on vulnerable systems. ” The best practices provide guidance for resolving an issue that has reached a critical vulnerability level of 10 out of 10 in the Common Vulnerability Scoring System (CVSS).

publicity

Read more:

Governments around the world are warning organizations of the risks posed by recent Log4j vulnerabilities, at least two of which – CVE-2021-44228 (also known as Log4Shell) and CVE-2021-45046 – have been used in attacks. Both cybercriminals and government-sponsored spy agents have targeted Log4j in their recent attacks. For now Belgian military they appear to be the only government agency to confirm that it was hit.

Cybersecurity and Infrastructure Agency US (CISA) issued an emergency directive obliging agencies to take immediate action to eliminate the risk. In addition to the mitigation guidance, this week CISA announced the release of scanner Log4j is an open source software designed to help organizations identify potentially vulnerable Internet services affected by recent vulnerabilities.

The Five Eyes release details the steps that vendors and organizations must take to mitigate the threats posed by Log4j vulnerabilities, including the latest Denial of Service (DoS) issue (CVE-2021-45105). The communiqué also provides guidance for organizations with systems control industrial (ICS) and other operating technology (OT) assets. However, agencies believe that information technology (IT) devices, especially those connected to the Internet, should take priority.

Especially dangerous vulnerability

A high severity vulnerability known as Log4Shell was patched by the Apache open source community in early December. However, vulnerabilities of the same nature were exploited by cybercriminals to launch extortionist, illegal mining of devices and systems to obtain virtual currency, data theft and much more.

The Log4j library is present in a huge number of modern enterprises, both in third party applications and in home applications. Some of the most used software in the world such as Apple iCloud, Google, Twitter, Steam and Minecraft use this tool.

The vulnerability could, among other malicious activities, allow attackers to execute remote code to install malware on an infected computer and launch a series of attacks. According to security experts, threats are especially dangerous because even hackers with little experience they can learn them easily.

We watched our new videos on Youtube? Subscribe to our channel.

Click to comment

Trending

Exit mobile version