The massive cyber vulnerability of Log4Shell has laid bare the poor state of cyber threat preparedness. An update.
Beijing Winter Olympics boycott movement grows
- The story: A critical vulnerability was detected in Dec 2021, and named "Log4Shell". It is used in open-source logging software Apache Log4J, and was being exploited by attackers to target organizations all over the world. India isn't spared either. This vulnerability is based on an open-source logging library used in most applications by enterprises and even government agencies. Hence, it's a serious problem. The vulnerability was first detected on websites that were hosting servers of a Microsoft-owned game called Minecraft.
- What is "Vulnerability": In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. In simple language, it's a gap that a thief can use to enter into a secured home. To exploit a vulnerability, the cyber-attacker must have at least one applicable tool or technique that can connect to a system weakness. The vulnerabilities are also known as the attack surface.
- What is "Application Logging": It is the process of saving application events, and varies from other event logs within IT systems in that the information collected by an application event log is dictated by each individual application, instead of the operating system. They help provide visibility into how our applications are running on each of the various infrastructure components. The Log data contains information such as out of memory exceptions or hard disk errors.
- Latest issue: The latest "vulnerability" is the "Log4Shell" and is officially called "CVE-2021-44228". The CVE number is the unique number given to each vulnerability discovered across the world.
- Log4j library - This is open-source software maintained by a group of volunteer programmers as part of the nonprofit Apache Software Foundation and is a key Java-logging framework. The Log4j library is embedded in every Java-based web service or application and is used by a wide number of companies to enable logging in on applications.
- Java - It is one of the most commonly used programming languages in the world. The problem impacts Log4j 2 versions which is a very common logging library used by applications across the world. Logging lets developers see all the activity of an application.
- Tech companies such as Apple, Microsoft, Google all rely on this open-source library, as do enterprise applications from CISCO, Netapp, CloudFare, Amazon and others.
- Severity rating: This Log4Shell problem was assigned a severity rating of 10 by security experts, the highest level possible. The vulnerability could allow a hacker to take control of a system!
- Data supplied by an untrusted outsider – data that you are merely printing out for later reference, or logging into a file – can take over the server on which you are doing the logging.
- This could turn what should be a basic “print” instruction into a leak-some-secret-data-out-onto-the-internet situation, or even into a download-and-run-my-malware-at-once command.
- A log entry that you intended to make for completeness, perhaps even for legal or security reasons, could turn into a malware implantation event.
- Remote Code Execution: The vulnerability can be exploited by using a single line of code and allows attackers to execute remote commands on a victim’s system. It can be exploited by attackers to take control of any Java-based web server and carry out Remote Code Execution (RCE) attacks. In an RCE attack, attackers take control over the targeted system and can perform any function they want. The exploits for this vulnerability are already being tested by hackers, according to several reports, and it grants them access to an application, and could potentially let them run malicious software on a device or servers.
- Impact of Log4Shell Vulnerability:
- Cryptocurrency Mining - Most of the attacks observed appear to focus on the use of cryptocurrency mining at the expense of the victims. However, new variations of the original exploit are being introduced rapidly. Successful exploitation of this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).
- Global - The Australia-New Zealand (ANZ) area was the most impacted region with 46% of corporate networks facing an attempted exploit. While North America was the least impacted with 36.4% of organizations facing such an attempt. About 41% of corporate networks in India have already faced an attempted exploit. Indian companies are not more vulnerable than their western counterparts because they use Java-based applications, but are at a high risk because of their weak security protocols (especially the smaller companies that may not have the know-how or resources to detect and fix the issue quickly).
- Summary: A connected world is not without its risks.
- EXAM QUESTIONS: (1) Explain the nature of the cyber vulnerability dubbed Log4Shell. (2) What are the technical reasons that Log4Shell has been used on a wide scale by attackers? What risks does that pose? (3) What are the problems small Indian firms face due to Log4Shell like vulnerabilities? Explain.
* Content sourced from free internet sources (publications, PIB site, international sites, etc.). Take your own subscriptions. Copyrights acknowledged.
COMMENTS