Cyber Officials Warn of Long-Term Fallout From Log4j Cyber Flaw

WASHINGTON—Senior U.S. security officials said Monday they hadn’t yet seen significant disruptive or destructive cyberattacks, such as ransomware attacks, linked to a massive internet flaw discovered one month ago, but warned that the bug could aid the nefarious activity of criminals and foreign governments for months or years to come.

The Biden administration hasn’t identified any confirmed breaches of federal government agencies that relied on the flaw in the widely used software code known as Log4j, nor has it detected foreign governments developing attacks that exploit the bug to carry out a network intrusion, officials said during a press briefing.

Still, officials said the dangers posed by Log4j—a free bit of code that logs activity in computer networks and applications—were severe and likely to be a long-lasting problem for organizations big and small because of the software’s ubiquity.

“The scale and potential impact of this makes it incredibly serious,” said Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency. Despite the lack of major attacks so far, Ms. Easterly said she considered the Log4j problem “the most serious vulnerability” she has seen in her decadeslong career, and she was concerned about long-term risks to networks that control U.S. critical infrastructure.

Ms. Easterly said the flaw had so far led to “widespread criminal activity” that mostly consisted of installing cryptocurrency mining software or botnet code on vulnerable devices. She added that some hackers may be waiting undetected after entering networks to do more damage and said there were limits to what CISA may know about because victimized organizations often don’t report intrusions to the government.

Researchers have said the Log4j flaw, publicly disclosed one month ago after being discovered by a Chinese security team, was particularly worrying because the free Java-based software is used in a range of products including security software, networking tools and videogame servers. The exact number of users of Log4j is impossible to know, but the software has been downloaded millions of times, according to the organization that builds it, the Apache Software Foundation.

A public catalog of products known to have the flaw that CISA set up in the wake of its discovery has received more than 2,800 submissions detailing Log4j-related problems in different commercial products that incorporate the code, Ms. Easterly said. Hundreds of millions of individual devices are likely at risk, she said.

The administration hadn’t confirmed that hackers backed by foreign governments are exploiting the Log4j flaw, but “it is of course possible that that may change,” Eric Goldstein, executive assistant director for cybersecurity at CISA, said. Senior officials have separately said they expect such activity to be inevitable.

Ransomware attacks are increasing in frequency, victim losses are skyrocketing, and hackers are shifting their targets. WSJ’s Dustin Volz explains why these attacks are on the rise and what the U.S. can do to fight them. Photo illustration: Laura Kammermann

Multiple U.S.-based cybersecurity firms and

Microsoft Corp.

said in December that they had identified hackers linked to China, Iran and other governments exploiting the Log4j vulnerability. The U.S. government is often slower than private companies to formally attribute cyberattacks to foreign governments, given the added geopolitical significance of doing so.

The impact of the Log4j bug overseas has so far been more pronounced than in the U.S. The Belgian Defense Ministry has reported a breach to its systems. In addition, businesses ranging from a German chemical company to a Milwaukee-based industrial-parts supplier have rushed to shore up their networks, taking portions offline as a precaution.

The Federal Trade Commission last week urged organizations to address the Log4j flaw in products with available patches to avoid exposure to possible legal action from the agency.

Write to Dustin Volz at [email protected]

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.