The Log4j threat: What everyone should do

Dec 18, 2021, 5:00 AM
(Pexels Photo)...
(Pexels Photo)
(Pexels Photo)

Q: What should I be doing about the Log4j vulnerability?

A: In what is considered one of the most widespread and dangerous vulnerabilities to be discovered in a very long time, the Log4j problem is going to be a threat that will likely linger for a long time.

The reason this discovery is considered a nightmare scenario is because of the ubiquity of the tool that is being compromised and the difficulty in determining where it is being used.

Free Logging Tool

At the heart of the problem is a very popular open-source tool (Log4j) used to log activity – it can be easily compromised on millions of devices that connect to the Internet.

The tool can be instructed to allow what is known as ‘Remote Code Execution’, which can allow a remote user to take control of the device.

The good news is that it will be a pretty easy thing to fix but the bad news is that it’s going to take a long time to determine where it’s being used.

Anyone along the manufacturing process of any device or the development of any software program could have used the logging tool, so it’s many needles in many haystacks.

The best analogy that I’ve heard is to think of it as a common nail used by millions of construction companies on millions of construction projects and the nail has been found to deteriorate to the point that it could fail.

This means every construction company has to figure out where they used this nail on every construction project they or any of their subcontractors has ever completed.

Active Attempts To Exploit Log4j

For cyber criminals, exploiting this tool’s vulnerability is like shooting fish in a barrel because it’s so widespread.

Security firm Cloudflare posted ( that it saw the first attempts to exploit the vulnerability just nine minutes after the problem was disclosed publicly.

To date, millions of hacking attempts have already been made and we can expect them to grow in popularity and sophistication.

Of particular concern is the ability to launch a ransomware attack without the need to trick a user into doing something that allows them in.

What You Need To Do

The majority of the work to fix the vulnerability has to be done by the manufacturers and developers of the exposed products, which then need to be distributed to all of their users.

If you’re a small business, you or your IT resources should be checking the support website for your software programs and hardware devices for posted updates or alerts.

In some cases, there may be some temporary mitigation steps that can be taken until a patch has been developed.

If you are using really old technology that no longer gets updates, you may need to consider replacing it altogether or make sure it’s no longer connected to the Internet.

Don’t Ignore Update Notices

Large businesses are a more attractive target at the moment, but as time goes on, we’re likely going to see attempts to exploit the average user.

Make sure to install security updates when they are made available on any and all of your computers, smartphones, tablets, software programs and ‘smart home’ devices to plug the holes that could allow you to be exploited.

Lifetime Windows & Doors

We want to hear from you.

Have a story idea or tip? Pass it along to the KTAR News team here.

Data Doctors

(Pexels Photo)...
Ken Colburn, Data Doctors

What to know about the Marco Polo video chat app

The Marco Polo app is a video chat program that’s like a walkie-talkie conversation instead of a live session.
5 days ago
Ken Colburn, Data Doctors

Here are some tips on how to speed up slow starting computers

Here are some ways you can identify and solve potential issues that may be causing your computer to start up slower than normal.
12 days ago
(AP Photo/Jenny Kane, File)...
Data Doctors

An explanation of how new credit cards have information stolen

If you've ever wondered how people can crack a new credit card, here's a rundown and a brief explanation on what thieves could be doing.
19 days ago
(Pexels Photo)...
Ken Colburn, Data Doctors

Here are the differences between Google Chrome and Microsoft Edge

Half of the United States uses Google Chrome as a default browser, but here are the key differences between Chrome and Microsoft Edge.
26 days ago
(Pexels Photo)...
Data Doctors

Tips on how and when to use the iPhone screen recording feature

Here are some tips on when and how to use the the screen recording feature located on the dropdown bar on your iPhone.
1 month ago
In this photo illustration a spam 'Phishing' email is displayed on a laptop screen on March 21,2022...
Data Doctors

Tips and tools to detect and avoid computer phishing scams

Far and away, the method of choice for compromising users is through sophisticated phishing messages in email, via text messaging and through social media accounts.
1 month ago

Sponsored Articles

Quantum Fiber

How high-speed fiber internet edges out cable for everyday use

In a world where technology drives so much of our daily lives, a lack of high-speed internet can be a major issue.
Day & Night Air Conditioning, Heating and Plumbing

Here are 4 signs the HVAC unit needs to be replaced

Pool renovations and kitchen upgrades may seem enticing, but at the forefront of these investments arguably should be what residents use the most. In a state where summertime is sweltering, access to a functioning HVAC unit can be critical.
Day & Night Air Conditioning, Heating and Plumbing

Ways to prevent clogged drains and what to do if you’re too late

While there are a variety of ways to prevent clogged drains, it's equally as important to know what to do when you're already too late.
The Log4j threat: What everyone should do