{"id":3623,"date":"2021-12-14T03:53:21","date_gmt":"2021-12-14T03:53:21","guid":{"rendered":"https:\/\/www.tech-battery.com\/batteriesblog\/?p=3623"},"modified":"2021-12-14T03:53:21","modified_gmt":"2021-12-14T03:53:21","slug":"flaw-prompts-100-hack-attacks-a-minute-security-company-says","status":"publish","type":"post","link":"https:\/\/www.tech-battery.com\/batteriesblog\/flaw-prompts-100-hack-attacks-a-minute-security-company-says\/","title":{"rendered":"Flaw prompts 100 hack attacks a minute, security company says"},"content":{"rendered":"\n<p>A flaw in widely used computer code is prompting 100 new hacking attempts every minute, a security company says.<\/p>\n\n\n\n<p>Check Point said it had seen attempts to exploit the vulnerability on over 40% of corporate networks globally.<\/p>\n\n\n\n<p>One US official said the security flaw, Log4shell, posed a &#8220;severe risk&#8221;, with companies warning it was being actively used by criminal groups.<\/p>\n\n\n\n<p>Fixes have been issued but need to be implemented. Popular applications and cloud services have been affected.<\/p>\n\n\n\n<p>&#8216;Specific address&#8217;<br>\nWritten in the programming language Java, Log4J, the code containing the flaw, is used by millions of computers running online services.<\/p>\n\n\n\n<p>In the last four months it had been downloaded 84 million times from the largest public repository of open-source Java components, Brian Fox of security company Sonatype, said.<\/p>\n\n\n\n<p>And the ease with which hackers could exploit the vulnerability was, &#8220;akin to someone figuring out that mailing a letter into your postbox, with a specific address written on it, allows them to open all your doors in your house&#8221;.<\/p>\n\n\n\n<p>Words such as &#8220;critical&#8221; and &#8220;emergency&#8221; are often bandied around by cyber-security people when a major flaw is discovered.<\/p>\n\n\n\n<p>But in this crisis, another word has stuck out &#8211; &#8220;trivial&#8221;.<\/p>\n\n\n\n<p>According to Crowdstrike, the weakness everyone is trying to fix is &#8220;trivial&#8221; to exploit.<\/p>\n\n\n\n<p>Often when a vulnerability is found in a computer system, there is a little bit of time to fix it.<\/p>\n\n\n\n<p>The cyber-criminals have to work out a way to attack and usually only the smartest crews can do so in the first few hours.<\/p>\n\n\n\n<p>But in this case, it is, apparently, very easy.<\/p>\n\n\n\n<p>We do not yet know how many of these attempted attacks are successful &#8211; but this incident has the potential to be extremely costly for corporations that become victims.<\/p>\n\n\n\n<p>For the average person, there is not a lot we can do.<\/p>\n\n\n\n<p>Make sure your apps and software are up to date &#8211; and send thoughts, prayers and hugs to the IT teams around the world trying to fix this problem.<\/p>\n\n\n\n<p>2px presentational grey line<br>\nResearchers at Chinese technology company Alibaba discovered the flaw last month.<\/p>\n\n\n\n<p>But it gained widespread public attention after being found affecting some sites hosting versions of Minecraft using Java.<\/p>\n\n\n\n<p>Before the flaw was made public, the Apache Software Foundation, which oversees the Log4j code, issued a fix for the problem, rating the problem a &#8220;10&#8221; &#8211; the highest level of seriousness.<\/p>\n\n\n\n<p>Cloudflare chief technology officer John Graham-Cumming told the Verge he had seen two only two other issues of similar severity in the past 10 years.<\/p>\n\n\n\n<p>&#8216;Urgent challenge&#8217;<br>\nUS Cybersecurity and Infrastructure Security Agency director Jen Easterly also stressed the urgency of the situation.<\/p>\n\n\n\n<p>&#8220;To be clear, this vulnerability poses a severe risk,&#8221; she wrote.<\/p>\n\n\n\n<p>It was being widely exploited by hackers and &#8220;presents an urgent challenge to network defenders given its broad use&#8221;.<\/p>\n\n\n\n<p>Microsoft researchers said they had seen hackers using Log4shell to:<\/p>\n\n\n\n<p>install malicious software that mined crypto-currency<br>\nsteal passwords and log-ins<br>\nextract data from compromised systems<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A flaw in widely used computer code is prompting 100 new hacking attempts every minute, a security company says. Check Point said it had seen attempts to exploit the vulnerability on over 40% of corporate networks globally. One US official said the security flaw, Log4shell, posed a &#8220;severe risk&#8221;, with companies warning it was being &hellip; <a href=\"https:\/\/www.tech-battery.com\/batteriesblog\/flaw-prompts-100-hack-attacks-a-minute-security-company-says\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Flaw prompts 100 hack attacks a minute, security company says&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3623","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/posts\/3623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/comments?post=3623"}],"version-history":[{"count":1,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/posts\/3623\/revisions"}],"predecessor-version":[{"id":3624,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/posts\/3623\/revisions\/3624"}],"wp:attachment":[{"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/media?parent=3623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/categories?post=3623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tech-battery.com\/batteriesblog\/wp-json\/wp\/v2\/tags?post=3623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}