%Start How the Log4J Security Vulnerability Puts You at Risk GA
S
REGULAR Menu Lifewire Tech for Humans Newsletter! Search Close GO News > Internet & Security 52 52 people found this article helpful
How the Log4J Security Vulnerability Puts You at Risk
Experts dub it the worst cybersecurity incident in quite a while
By Mayank Sharma Mayank Sharma Freelance Tech News Reporter Writer, Reviewer, Reporter with decades of experience of breaking down complex tech, and getting behind the news to help readers get to grips with the latest buzzwords. lifewire's editorial guidelines Published on December 13, 2021 01:54PM EST Fact checked by Jerri Ledford Fact checked by
Jerri Ledford Western Kentucky University Gulf Coast Community College Jerri L.
thumb_upLike (38)
commentReply (1)
shareShare
visibility351 views
thumb_up38 likes
comment
1 replies
W
William Brown 5 minutes ago
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared ...
L
Lucas Martinez Moderator
access_time
6 minutes ago
Wednesday, 30 April 2025
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared in Computerworld, PC Magazine, Information Today, and many others.
thumb_upLike (37)
commentReply (3)
thumb_up37 likes
comment
3 replies
S
Sofia Garcia 2 minutes ago
lifewire's fact checking process Tweet Share Email Tweet Share Email Internet & Security Mobile Phon...
E
Elijah Patel 4 minutes ago
Cybersecurity experts are seeing a wide variety of use cases for the Log4j exploit already beginning...
lifewire's fact checking process Tweet Share Email Tweet Share Email Internet & Security Mobile Phones Internet & Security Computers & Tablets Smart Life Home Theater & Entertainment Software & Apps Social Media Streaming Gaming
Key Takeaways
Hackers posted a code revealing an exploit in a widely used Java logging library.Cybersecurity sleuths noticed mass scanning across the web looking for exploitable servers and services.The Cybersecurity and Infrastructure Security Agency (CISA) has urged vendors and users to patch and update their software and services urgently. Andriy Onufriyenko / Getty Images The cybersecurity landscape is ablaze due to an easily exploitable vulnerability in a popular Java logging library, Log4j. It's used by every popular software and service and has perhaps already started affecting the everyday desktop and smartphone user.
thumb_upLike (36)
commentReply (3)
thumb_up36 likes
comment
3 replies
C
Chloe Santos 1 minutes ago
Cybersecurity experts are seeing a wide variety of use cases for the Log4j exploit already beginning...
C
Christopher Lee 1 minutes ago
"The security community has uncovered vulnerable applications from other technology manufacturers li...
Cybersecurity experts are seeing a wide variety of use cases for the Log4j exploit already beginning to appear on the dark web, ranging from exploiting Minecraft servers to more high-profile issues they believe could potentially affect Apple iCloud. "This Log4j vulnerability has a trickle-down effect, impacting all large software providers that might use this component as part of their application packing," John Hammond, Senior Security Researcher at Huntress, told Lifewire via email.
thumb_upLike (26)
commentReply (2)
thumb_up26 likes
comment
2 replies
A
Aria Nguyen 7 minutes ago
"The security community has uncovered vulnerable applications from other technology manufacturers li...
V
Victoria Lopez 6 minutes ago
That’s when weaponized proof-of-concept exploits (PoCs) began to appear, leading to a rapid increa...
E
Emma Wilson Admin
access_time
10 minutes ago
Wednesday, 30 April 2025
"The security community has uncovered vulnerable applications from other technology manufacturers like Apple, Twitter, Tesla, [and] Cloudflare, among others. As we speak, the industry is still exploring the vast attack surface and risk this vulnerability poses."
Fire in the Hole
The vulnerability tracked as CVE-2021-44228 and dubbed Log4Shell, has the highest severity score of 10 in the common vulnerability scoring system (CVSS). GreyNoise, which analyzes Internet traffic to pick up security signals of note, first observed activity for this vulnerability on December 9, 2021.
thumb_upLike (4)
commentReply (0)
thumb_up4 likes
D
David Cohen Member
access_time
6 minutes ago
Wednesday, 30 April 2025
That’s when weaponized proof-of-concept exploits (PoCs) began to appear, leading to a rapid increase of scanning and public exploitation on December 10, 2021, and through the weekend. Log4j is heavily integrated into a broad set of DevOps frameworks and enterprise IT systems and in end-user software and popular cloud applications. Sitade / Getty Images Explaining the severity of the vulnerability, Anirudh Batra, a threat analyst at CloudSEK, tells Lifewire via email that a threat actor could exploit it to run code on a remote server. "This has left even popular games like Minecraft also vulnerable. An attacker can exploit it just by posting a payload in the chatbox.
thumb_upLike (7)
commentReply (2)
thumb_up7 likes
comment
2 replies
G
Grace Liu 6 minutes ago
Not only Minecraft, but other popular services like iCloud [and] Steam are also vulnerable," Bat...
H
Hannah Kim 2 minutes ago
Batten Down the Hatches
It’s no surprise, then, that due to the ease of exploitation an...
A
Audrey Mueller Member
access_time
28 minutes ago
Wednesday, 30 April 2025
Not only Minecraft, but other popular services like iCloud [and] Steam are also vulnerable," Batra explained, adding that "triggering the vulnerability in an iPhone is as simple as changing the name of the device."
Tip of the Iceberg
Cybersecurity company Tenable suggests that because Log4j is included in a number of web applications, and is used by a variety of cloud services, the full scope of the vulnerability won’t be known for some time. The company points to a GitHub repository that tracks the impacted services, which at the time of writing lists about three dozen manufacturers and services, including popular ones such as Google, LinkedIn, Webex, Blender, and others mentioned earlier. As we speak, the industry is still exploring the vast attack surface and risk this vulnerability poses. Till now, the vast majority of activity has been scanning, but exploitation and post-exploitation activities have also been seen. "Microsoft has observed activities including installing coin miners, Cobalt Strike to enable credential theft and lateral movement, and exfiltrating data from compromised systems," writes the Microsoft Threat Intelligence Center.
thumb_upLike (41)
commentReply (2)
thumb_up41 likes
comment
2 replies
H
Henry Schmidt 6 minutes ago
Batten Down the Hatches
It’s no surprise, then, that due to the ease of exploitation an...
Z
Zoe Mueller 20 minutes ago
But it’s now up to individual software makers to patch up their versions to protect their customer...
L
Lily Watson Moderator
access_time
8 minutes ago
Wednesday, 30 April 2025
Batten Down the Hatches
It’s no surprise, then, that due to the ease of exploitation and prevalence of Log4j, Andrew Morris, Founder and CEO of GreyNoise, tells Lifewire that he believes the hostile activity will continue to increase over the next few days. The good news, however, is that Apache, the developers of the vulnerable library, has issued a patch to neuter the exploits.
thumb_upLike (49)
commentReply (3)
thumb_up49 likes
comment
3 replies
C
Charlotte Lee 1 minutes ago
But it’s now up to individual software makers to patch up their versions to protect their customer...
N
Nathan Chen 2 minutes ago
The sentiment was echoed by Jen Easterly, Director at the Cybersecurity and Infrastructure Security ...
But it’s now up to individual software makers to patch up their versions to protect their customers. Manuel Breva Colmeiro / Getty Images Kunal Anand, CTO of cybersecurity company Imperva, tells Lifewire over email that while most of the adversarial campaign exploiting the vulnerability is currently directed towards enterprise users, end-users need to stay vigilant and make sure they update their affected software as soon as patches are available.
thumb_upLike (26)
commentReply (2)
thumb_up26 likes
comment
2 replies
L
Lily Watson 17 minutes ago
The sentiment was echoed by Jen Easterly, Director at the Cybersecurity and Infrastructure Security ...
S
Sophie Martin 25 minutes ago
Thanks for letting us know! Get the Latest Tech News Delivered Every Day
Subscribe Tell us why!...
H
Henry Schmidt Member
access_time
40 minutes ago
Wednesday, 30 April 2025
The sentiment was echoed by Jen Easterly, Director at the Cybersecurity and Infrastructure Security Agency (CISA). "End users will be reliant on their vendors, and the vendor community must immediately identify, mitigate, and patch the wide array of products using this software. Vendors should also be communicating with their customers to ensure end-users know that their product contains this vulnerability and should prioritize software updates," said Easterly via a statement. Was this page helpful?
thumb_upLike (26)
commentReply (3)
thumb_up26 likes
comment
3 replies
A
Audrey Mueller 1 minutes ago
Thanks for letting us know! Get the Latest Tech News Delivered Every Day
Subscribe Tell us why!...
V
Victoria Lopez 37 minutes ago
Other Not enough details Hard to understand Submit More from Lifewire How to Disable Remote Assistan...
Thanks for letting us know! Get the Latest Tech News Delivered Every Day
Subscribe Tell us why!
thumb_upLike (1)
commentReply (1)
thumb_up1 likes
comment
1 replies
E
Ella Rodriguez 9 minutes ago
Other Not enough details Hard to understand Submit More from Lifewire How to Disable Remote Assistan...
J
Jack Thompson Member
access_time
36 minutes ago
Wednesday, 30 April 2025
Other Not enough details Hard to understand Submit More from Lifewire How to Disable Remote Assistance and Desktop in Windows XP How to Protect Your iPad From Malware and Viruses 5 MacBook Security Tips - Internet / Network Security What Is Cloud Computing? How to Update Your Logitech Unifying Receiver What Is Security Content Automation Protocol (SCAP)? Microsoft Windows XP on New Computers What Is a Patch?
thumb_upLike (25)
commentReply (3)
thumb_up25 likes
comment
3 replies
I
Isabella Johnson 34 minutes ago
(Patch / Hotfix Definition) A Brief History of Malware How Self Driving Cars Can Be Hacked Microsoft...
E
Ella Rodriguez 36 minutes ago
How the Log4J Security Vulnerability Puts You at Risk GA
S
REGULAR Menu Lifewire Tech for Humans New...
(Patch / Hotfix Definition) A Brief History of Malware How Self Driving Cars Can Be Hacked Microsoft Security Bulletin Severity Rating System Apple’s Device Finder App Could Expose You, Experts Say What Are the Security Threats In VoIP New macOS Malware Uses Several Tricks to Spy on You Introduction to Peer-to-Peer Networks Google Drops Pixel Security Patch and Feature Update Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up Newsletter Sign Up By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookies Settings Accept All Cookies
thumb_upLike (32)
commentReply (2)
thumb_up32 likes
comment
2 replies
J
Julia Zhang 23 minutes ago
How the Log4J Security Vulnerability Puts You at Risk GA
S
REGULAR Menu Lifewire Tech for Humans New...
A
Andrew Wilson 17 minutes ago
Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared ...