PublicWire | Emerging Market Stock News
  •  Home
  • Technology
  • Medical
  • Energy
  • Cannabis
  • Finance
  • Retail
  • General
  • Podcast
  • Videos
  • Services
  •  Home
  • Technology
  • Medical
  • Energy
  • Cannabis
  • Finance
  • Retail
  • General
  • Podcast
  • Videos
  • Services
No Result
View All Result
PublicWire
No Result
View All Result

Home » Technology » Hackers target 40% of corporate networks through Log4J flaw

Hackers target 40% of corporate networks through Log4J flaw

by PublicWire
December 14, 2021
in Technology
Reading Time: 2 mins read
0

Hackers have targeted more than 40 per cent of companies globally since last Friday through a previously unnoticed vulnerability in a widely used piece of open-source software called Log4J, according to the cyber security group Check Point.

Check Point said there had been 846,000 documented attacks relating to the vulnerability in the 72 hours since Friday, and that at some points its researchers were seeing more than 100 hacks a minute.

The flaw in Log4J allows attackers to easily gain remote control over computers running apps in Java, a popular programming language.

Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency (CISA) told industry executives that the vulnerability was “one of the most serious I’ve seen in my entire career, if not the most serious,” according to US media reports. Hundreds of millions of devices are likely to be affected, she said.

Check Point said that in many cases, the hackers were taking control of computers to use them to mine cryptocurrency, or to become part of botnets, vast networks of computers that can be used to overwhelm websites with traffic, to send spam, or for other illegal purposes.

Both CISA and the UK’s National Cyber Security Centre have now issued alerts urging organisations to make upgrades related to the Log4J vulnerability, as experts attempt to assess the fallout. Amazon, Apple, IBM, Microsoft and Cisco are among those that have rushed to put out fixes, but no severe breaches have been reported publicly so far.

The vulnerability is the latest to hit corporate networks, after the emergence of flaws in the past year in commonly used software from Microsoft and IT company SolarWinds. Both these weaknesses were initially exploited by state-backed espionage groups from China and Russia respectively.

According to Check Point, nearly half of all attacks have been conducted by known cyber attackers. These included groups using Tsunami and Mirai — malware that turns devices into botnets, or networks used to launch remotely controlled hacks such as denial of service attacks. It also included groups using XMRig, a software that mines the hard-to-trace digital currency Monero.

Researchers at Mandiant told Reuters that sophisticated groups including “Chinese government actors” were also attempting to exploit the bug.

“With this vulnerability, attackers gain almost unlimited power — they can extract sensitive data, upload files to the server, delete data, install ransomware or pivot to other servers,” Nicholas Sciberras, head of engineering at vulnerability scanner Acunetix, said. It was “astonishingly easy” to deploy an attack, he said, adding that it would “be exploited for months to come”. 

The source of the vulnerability is faulty code developed by unpaid volunteers at the non-profit Apache Software Foundation, which runs multiple open source projects, raising questions about the security of vital parts of IT infrastructure. Log4J has been downloaded millions of times.

The flaw has existed unnoticed since 2013, experts say. Matthew Prince, chief executive of cyber group Cloudflare, said that it started to be actively exploited from December 1, although there was no “evidence of mass exploitation until after public disclosure” from Apache the following week.


This post was originally published on this site

Previous Post

DoJ probe adds to rotten year for short-sellers

Next Post

Purple brings on former New Balance chief as acting CEO

PublicWire

At PublicWire, we know the vast majority of all investors conduct their due diligence and get their news online in a variety of ways including email, social media, financial websites, text messages, RSS feeds and audio/video podcasts. PublicWire’s financial communications program is uniquely positioned to reach these investors throughout the U.S. and Canada as well as on a global scale.

Related Posts

Technology

Apple taps TSMC’s latest tech and BYD races into Japan

September 15, 2022
0
Technology

Fortress China: Xi Jinping’s plan for economic independence

September 15, 2022
0
Technology

Patreon: fight for talent makes creator economy more costly

September 15, 2022
0
Technology

Wall Street shudders after seeing US inflation data

September 14, 2022
0
Technology

After the tech sell-off: will growth investors keep the faith?

September 14, 2022
0
Technology

UK university develops device to restore sense of touch to stroke patients

September 14, 2022
0
Next Post

Purple brings on former New Balance chief as acting CEO

Please login to join discussion

Subscribe To Our Newsletter

Loading
Ad
PublicWire | Emerging Market Stock News 24/7 | Investor Relations US Stock Market

© Copyright 2022 publicwire.com

Navigate Site

  • About
  • Contact Us
  • Disclaimer
  • Watch LIVE
  • Privacy Policy
  • Terms and Services
  • Contributors

Follow Us

No Result
View All Result
  • LIVE Investor News Channel
  • Cannabis
  • Energy
  • Finance
  • General
  • Medical
  • Podcasts
  • Retail
  • Technology
  • Videos

© Copyright 2022 publicwire.com

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.