DATA DOCTORS

The Log4j threat: What everyone should do

Dec 18, 2021, 5:00 AM

(Pexels Photo)...

(Pexels Photo)

(Pexels Photo)

Q: What should I be doing about the Log4j vulnerability?

A: In what is considered one of the most widespread and dangerous vulnerabilities to be discovered in a very long time, the Log4j problem is going to be a threat that will likely linger for a long time.

The reason this discovery is considered a nightmare scenario is because of the ubiquity of the tool that is being compromised and the difficulty in determining where it is being used.

Free Logging Tool

At the heart of the problem is a very popular open-source tool (Log4j) used to log activity – it can be easily compromised on millions of devices that connect to the Internet.

The tool can be instructed to allow what is known as ‘Remote Code Execution’, which can allow a remote user to take control of the device.

The good news is that it will be a pretty easy thing to fix but the bad news is that it’s going to take a long time to determine where it’s being used.

Anyone along the manufacturing process of any device or the development of any software program could have used the logging tool, so it’s many needles in many haystacks.

The best analogy that I’ve heard is to think of it as a common nail used by millions of construction companies on millions of construction projects and the nail has been found to deteriorate to the point that it could fail.

This means every construction company has to figure out where they used this nail on every construction project they or any of their subcontractors has ever completed.

Active Attempts To Exploit Log4j

For cyber criminals, exploiting this tool’s vulnerability is like shooting fish in a barrel because it’s so widespread.

Security firm Cloudflare posted (https://bit.ly/3pdV3Xr) that it saw the first attempts to exploit the vulnerability just nine minutes after the problem was disclosed publicly.

To date, millions of hacking attempts have already been made and we can expect them to grow in popularity and sophistication.

Of particular concern is the ability to launch a ransomware attack without the need to trick a user into doing something that allows them in.

What You Need To Do

The majority of the work to fix the vulnerability has to be done by the manufacturers and developers of the exposed products, which then need to be distributed to all of their users.

If you’re a small business, you or your IT resources should be checking the support website for your software programs and hardware devices for posted updates or alerts.

In some cases, there may be some temporary mitigation steps that can be taken until a patch has been developed.

If you are using really old technology that no longer gets updates, you may need to consider replacing it altogether or make sure it’s no longer connected to the Internet.

Don’t Ignore Update Notices

Large businesses are a more attractive target at the moment, but as time goes on, we’re likely going to see attempts to exploit the average user.

Make sure to install security updates when they are made available on any and all of your computers, smartphones, tablets, software programs and ‘smart home’ devices to plug the holes that could allow you to be exploited.

We want to hear from you.

Have a story idea or tip? Pass it along to the KTAR News team here.

Data Doctors

(Pexels File Photo)...

Data Doctors

Beware of ‘quishing’ emails! These scary scams can hurt your computer

Ever heard of quishing? This scary scam is a type of phishing email. Click on it at your own peril. It can infect your computer with malware.

24 hours ago

digital will...

Ken Colburn, Data Doctors

Here’s how to create a ‘digital will’ so family can access important online assets

Creating a "digital will" will help your family access important online assets if you pass away.

8 days ago

Multiple desktop feature tips for Arizonans in 2024...

Data Doctors

How to use the multiple desktop feature on Windows

Here are a few tips and tricks that Arizona technology lovers should know if they want to take advantage of the multiple desktop feature on Arizona.

15 days ago

Google Chrome may be bogging down your computer browser....

Ken Colburn, Data Doctors

Is Google Chrome slowing down your computer?

Google Chrome may be bogging down your computer browser.

22 days ago

(Pixabay photo)...

Ken Colburn, Data Doctors

What to know about Apple intelligence

What to know about Apple intelligence and its features? This guide by Data Doctors makes its simple.

29 days ago

How to pause the problematic Windows update...

Ken Colburn, Data Doctors

How to pause the problematic Windows update

I’m seeing all kinds of problems online with the latest Windows update and worried that it will be installed automatically. What should I be doing?

1 month ago

Sponsored Articles

...

Schwartz Laser Eye Center

Don’t miss the action with this game-changing procedure

PHOENIX -- The clear lens exchange procedure has emerged as a popular alternative to LASIK eye surgery.

...

Midwestern University

Midwestern University Clinics – Providing Comprehensive, Thorough and Unrushed Healthcare to the Valley Community

With so many options for healthcare in the Valley, why should you choose a clinic that has graduate medical students integrated into the patient experience?

...

Collins Comfort Masters

Collins Comfort Masters: Leading the Way in HVAC and Plumbing Services in Arizona

Tempe, AZ – Since its inception in 1985, Collins Comfort Masters has been a cornerstone in the HVAC and plumbing industry in Phoenix and the surrounding Valley.

The Log4j threat: What everyone should do