Widely Used Software With Log4j Vulnerability Sends Cyber Defenders Scrambling

The Apache Log4j Remote Code Execution Vulnerability is said to be the “single biggest, most critical vulnerability” of the last decade.

Advertisement
By Reuters | Updated: 14 December 2021 18:11 IST
Highlights
  • Log4j comes from a popular open-source product
  • US government warned the private sector about Log4j and its risks
  • A partial fix for the vulnerability was released on Friday by Apache

The US government sent a warning to the private sector about the Log4j vulnerability

A newly discovered vulnerability in a widely used software library is causing mayhem on the Internet, forcing cyber defenders to scramble as hackers rush to exploit the weakness. The vulnerability, known as Log4j, comes from a popular open-source product that helps software developers track changes in applications that they build. It is so popular and embedded across many companies' programs that security executives expect widespread abuse.

"The Apache Log4j Remote Code Execution Vulnerability is the single biggest, most critical vulnerability of the last decade," said Amit Yoran, chief executive of Tenable, a network security firm, and the founding director of the US Computer Emergency Readiness Team. The US government sent a warning to the private sector about the Log4j vulnerability and the looming risk it poses on Friday.

In a conference call on Monday, the leader of CISA said it was one of the worst vulnerabilities seen in many years. She urged companies to have staff working through the holidays to battle those using new methods to exploit the flaw.

Advertisement

Much of the software affected by Log4j, which bears names like Hadoop or Solr, may be unfamiliar to the public at large. But as with the SolarWinds program at the center of a massive Russian espionage operation last year, the ubiquity of these workhorse programs makes them ideal jumping-off points for digital intruders.

Advertisement

Juan Andres Guerrero-Saade, the principal threat researcher with cybersecurity firm SentinelOne, called it "one of those nightmare vulnerabilities that there's pretty much no way to prepare for." While a partial fix for the vulnerability was released on Friday by Apache, the maker of Log4j, affected companies and cyber defenders will need time to locate the vulnerable software and properly implement patches. Log4j itself is maintained by a few volunteers, security experts said.

In practice, the flaw allows an outsider to enter active code into the record-keeping process. That code then tells the server hosting the software to execute a command giving the hacker control. The issue was first publicly disclosed by a security researcher working for Chinese technology company Alibaba Group Holding Ltd, Apache noted in its security advisory.

Advertisement

It is now apparent that initial exploitation was spotted on December 2, before a patch rolled out a few days later. The attacks became much more widespread as people playing Minecraft used it to take control of servers and spread the word in gaming chats.

So far no major disruptive cyber incidents have been publicly documented as a result of the vulnerability, but researchers are seeing an alarming uptick in hacking groups trying to take advantage of the bug for espionage. "We also expect to see this vulnerability in everyone's supply chain," said Chris Evans, chief information security officer at HackerOne.

Advertisement

Multiple botnets, or groups of computers controlled by criminals, were also exploiting the flaw in a bid to add more captive machines, experts tracking the developments said.

What many experts now fear is that the bug could be used to deploy malware that either destroys data or encrypts it, like what was used against U.S. pipeline operator Colonial Pipeline in May which led to shortages of gasoline in some parts of the United States. Guerrero-Saade said his firm had already seen Chinese hacking groups moving to take advantage of the vulnerability.

The US cybersecurity firms Mandiant and Crowdstrike also said they found sophisticated hacking groups leveraging the bug to breach targets. Mandiant described those hackers as "Chinese government actors" in an email to Reuters.


Will Snapdragon's new 2022 chips make it more prominent as a brand? We discuss this on Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Nathan Fillion's The Rookie Season 8 Now Available for Streaming
  2. The Ultimate All-Rounder Flagship: Meet the vivo X200T, Launching on 27th January
  1. Raakaasa OTT Release Details: What You Need to Know About Niharika Konidela’s Horror Fantasy Film
  2. Sinking Calcium Carbonate Locked Away Greenhouse Gases, Reveals New Study
  3. Sarvam Maya Set for OTT Release on JioHotstar: All You Need to Know About Nivin Pauly’s Horror Comedy
  4. Europa’s Hidden Ocean Could Be ‘Fed’ by Sinking Salted Ice; New Study Boosts Hopes for Alien Life
  5. The Rookie Season 8 Now Available for Streaming Online: Where to Watch Nathan Fillion-Starrer Cop Drama Online?
  6. Scientists Search the Big Bang’s Afterglow for Signs of Colliding Parallel Universes
  7. Giant Ancient Collision May Have ‘Flipped’ the Moon’s Interior, Study Suggests
  8. VLT’s GRAVITY Instrument Detects ‘Tug’ from Colossal Exomoon; Could Be Largest Natural Satellite Ever Found
  9. Young Sherlock Now Set for OTT Release on OTT: What You Need to Know About Guy Ritchie’s Mystery Thriller
  10. NASA’s Miner++ AI Brings Machine Digs Into TESS Archive to the Hunt for Nearby Earth-Like Worlds
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.