Since the Log4j cyber vulnerability became public in early December 2021, there have been more than 100 new hacking attempts every minute.
So, what is Log4j and why is it being called one of the ‘worst attacks in history?’
How can it affect your organization, your cyber risk exposure, and how you assess your third parties and vendors?
What are the steps you can take to mitigate this urgent cybersecurity risk?
We bring you the answers to these critical questions.
Log4j is an open-source software from the all-volunteer Apache Software Foundation. Freely available open-source software, like Log4j, is used by programmers as building blocks to do common tasks. Java programmers use Log4j to create a log of all activity on a device as the programs run. It is an extremely useful tool for programmers as it takes a string of code, copies it, in addition to examining the string and interpreting it.
However, as now exposed, Log4j has a vulnerability that allows the abuse of a feature —one that allows users to specify custom code for formatting a log message.
The consequence: third-party servers can submit software code that can perform a wide range of actions on the targeted computer, including stealing data, taking control of the system, and attacking with malware. This allows hackers to take control of web servers and launch remote attacks, giving them control of the computer services.
The fact that Log4j is a common piece of software appearing in millions of devices, combined with the simplicity to exploit, makes it a grave matter of concern. Log4j is widespread in cloud services, video games, industrial and hospital equipment, as well as software and security tools.
This makes potentially every device vulnerable to hacks, putting almost everyone at risk including governments, corporate systems, and individuals.
For enterprises, risk exposure to the Log4j vulnerability is even greater.
With the global increase of employees working from home due to the ongoing pandemic the risk of company data on personal devices being compromised unknowingly becomes greater. There is a very real risk of hackers exploiting the vulnerability to hack “shadow IT” appliances, those not centrally managed.
Key suppliers, vendors, third-party providers, and even fourth-party providers of enterprises who are part of the supply chain and provide critical support could also serve as a source for Log4j vulnerability exploitation.
Since Log4j is currently being used in many critical support infrastructures such as cloud platforms, web applications, and email services, a wide range of systems could be at risk from Log4j vulnerability. A provider of Internet hosting for software development and version control using Git has published a list of vulnerable applications and systems.
Moreover, most large organizations will also need to be aware of the risk from any of their own products that may have been built with enterprise Java software that legitimately used Log4j.
State-sponsored and cyber-criminal attackers have been exploiting the Log4j flaw throughout the month of December 2021 and continue to do so.
It is important to be aware that it is difficult to find Log4j within your organization’s software system because this open-source component is often “bundled” in the software. Companies may not even realize they are compromised.
Beyond implementing measures to stop any immediate risks, the long-term solution will always be to use scanning tools to assess your company’s risk and impact. Furthermore, an additional review of devices where there might be vulnerable installations will be needed.
MetricStream’s CyberGRC product can help you by:
MetricStream’s ConnectedGRC provides a proactive approach to compliance and risk management giving you the power to rapidly scale and adapt your programs to emerging and evolving risks. Built as an interconnected, intuitive, and intelligent GRC program, our CyberGRC product line enables your organization to collate data from across the enterprise, including third and fourth-party vendors, which can then be transformed into actionable business intelligence to support data-driven decision-making.
This will help your organization gain:
Want to learn more? Write to me at jbhowmick@metricstream.com to discuss how to mitigate your risk from the Log4j vulnerability.
Check out more resources related to cybersecurity:
The Ultimate Guide to Cyber Security and IT & Cyber Risk