{"id":31897,"date":"2022-01-13T09:12:01","date_gmt":"2022-01-13T09:12:01","guid":{"rendered":"https:\/\/www.digife.it\/?p=31897"},"modified":"2022-01-13T09:12:01","modified_gmt":"2022-01-13T09:12:01","slug":"log4shell-the-zero-day-vulnerability-that-scares-the-internet","status":"publish","type":"post","link":"https:\/\/www.digife.it\/en\/log4shell-the-zero-day-vulnerability-that-scares-the-internet\/","title":{"rendered":"Log4Shell - The zero-day vulnerability that scares the internet"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On December 10, the news of the presence of a serious vulnerability in the library was disclosed <\/span><a href=\"https:\/\/it.wikipedia.org\/wiki\/Log4j\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Apache <\/span><b>Log4J<\/b><\/a><span style=\"font-weight: 400;\">, call<strong> Log4Shell<\/strong>, which puts almost all applications and software that use Java at risk.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The risk for cybersecurity is high, so much so that it receives a score of 10 out of 10 in the <\/span><a href=\"https:\/\/it.wikipedia.org\/wiki\/Common_Vulnerability_Scoring_System#:~:text=Il%20Common%20Vulnerability%20Scoring%20System,sicurezza%20di%20un%20sistema%20informatico.&amp;text=Il%20punteggio%20%C3%A8%20espresso%20in,livello%20di%20vulnerabilit%C3%A0%20pi%C3%B9%20grave.\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">CVSS scale<\/span><\/a><span style=\"font-weight: 400;\"> which evaluates this type of vulnerability, and involves a large number of realities, both public and private.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#039;s try to understand how the famous Apache open source library works and why this bug risked doing serious damage.\u00a0<\/span><\/p>\n<h3><b>What is Log4J?<\/b><\/h3>\n<p><b>Log4J<\/b><span style=\"font-weight: 400;\"> is a library, written in Java code, that allows developers to create <\/span><a href=\"https:\/\/it.wikipedia.org\/wiki\/Log\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">log<\/span><\/a><span style=\"font-weight: 400;\">, that is a register of all the operations carried out by anyone who accesses and uses the software. In other words: &quot;<\/span><i><span style=\"font-weight: 400;\">its purpose is simply to keep track of everything that happens on the servers, noting every operation performed in a text file<\/span><\/i><span style=\"font-weight: 400;\">&quot;(<\/span><a href=\"https:\/\/www.ilsole24ore.com\/art\/cybersecurity-tutto-quello-che-sappiamo-finora-vulnerabilita-log4shell-AEzBEp2\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">1<\/span><\/a><span style=\"font-weight: 400;\">).\u00a0<\/span><\/p>\n<p><b>Log4J <\/b><span style=\"font-weight: 400;\">It therefore allows application developers to store a large amount of data, useful for monitoring the behavior of the software, both in the development phase and once it is sent online. This makes it much easier for technicians to spot errors, malfunctions and bugs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is the library <\/span><a href=\"https:\/\/it.wikipedia.org\/wiki\/Open_source\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">open source<\/span><\/a><span style=\"font-weight: 400;\"> best known and popular, used by a huge number of companies around the world. For example, it is integrated into all Microsoft products, Twitter, Amazon, Minecraft, Steam and iCloud, just to name a few.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And, apparently, there is one inside <\/span><a href=\"https:\/\/it.wikipedia.org\/wiki\/0-day\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">zero day vulnerability<\/span><\/a><span style=\"font-weight: 400;\"> that was called <\/span><b>Log4Shell<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Log4Shell<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Immediately defined as the &quot;<\/span><i><span style=\"font-weight: 400;\">single largest and most critical vulnerability of the last decade<\/span><\/i><span style=\"font-weight: 400;\">&quot;(<\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2021\/dec\/10\/software-flaw-most-critical-vulnerability-log-4-shell\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">2<\/span><\/a><span style=\"font-weight: 400;\">)<\/span><span style=\"font-weight: 400;\">, <\/span><b>Log4Shell <\/b><span style=\"font-weight: 400;\">is a type bug <\/span><b>zero day<\/b><span style=\"font-weight: 400;\">, which is a vulnerability unknown even to the developers who created the system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This bug allows hackers who exploit it to anonymously take control of all servers running Java. Which, in practice, translates into illegal activities such as the creation of cryptocurrencies, the installation of malware to steal (and resell) login credentials, ransomware and spying activities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The threat to cyber security is very serious, due to some factors. Vulnerability in the first place <\/span><b>Log4Shell <\/b><span style=\"font-weight: 400;\">it seems to be very easy to exploit and, as already mentioned, involves a huge amount of software, devices and companies. Suffice it to say that just 12 hours after the announcement of the discovery, over 40 thousand attacks have been recorded, with over 90 countries involved in the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, the seriousness of the situation also derives from the fact that, due to the very nature of the bug, it is very difficult to understand where and, above all, who these attacks start from. Although, in fact, most of the threats pass through servers located in Russia, this does not necessarily involve the involvement of the Russian government in the matter:\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&quot;<\/span><i><span style=\"font-weight: 400;\">The Log4Shell attack, in fact, consists of two parts: the first is to send a written web request to a server or a vulnerable device to exploit the vulnerability; the second is to make malware available somewhere that will be downloaded by the target hit by the first action<\/span><\/i><span style=\"font-weight: 400;\">&quot;(<\/span><a href=\"https:\/\/www.ilsole24ore.com\/art\/log4shell-tempesta-e-ancora-corso-ma-non-si-sa-chi-ne-sta-approfittando-AEWeVF4\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">3<\/span><\/a><span style=\"font-weight: 400;\">). Not to mention that many attacks use a VPN connection to hide their origin.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As soon as the security flaw became known, although in reality it was already being exploited by hackers, a huge amount of cyber attacks started, some state-sponsored, i.e. connected to the governments of different countries such as China, Iran, North Korea. and Turkey.<\/span><\/p>\n<h3><b>Run for cover<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Apache, of course, did not stand by and watch. The American company immediately released two patches to solve the problem. However, both were not effective, showing similar vulnerabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Only the third patch, and in particular the <\/span><i><span style=\"font-weight: 400;\">version 2.17.0<\/span><\/i><span style=\"font-weight: 400;\"> of <\/span><b>Log4J<\/b><span style=\"font-weight: 400;\">, appears to be immune to the flaw <\/span><b>Log4Shell<\/b><span style=\"font-weight: 400;\">. So far, in fact, all the actors involved who have implemented this version of the library have not reported any security problems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To reach this solution, however, it took more than 2 weeks. Precious time, which has cost over 4 million cyber attacks, with the 43% of Italian companies affected, and damages for a figure that is and will be difficult to establish.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the&#039;<\/span><a href=\"https:\/\/www.ansa.it\/sito\/notizie\/tecnologia\/hitech\/2021\/12\/30\/log4shell-la-falla-informatica-e-stata-chiusa-del-tutto_884dc50c-a26b-494b-89b3-9e47e3f3ddd8.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">announcement of the definitive closure of the flaw<\/span><\/a><span style=\"font-weight: 400;\">however, it does not mean that we can let our guard down. The Italian cybersecurity agency warns that the new version of <\/span><b>Log4J <\/b><span style=\"font-weight: 400;\">focuses its attention on vulnerability <\/span><i><span style=\"font-weight: 400;\">CVE-2021-44832<\/span><\/i><span style=\"font-weight: 400;\">, which, however, could execute lines of code from someone who is already inside the system, previously penetrated. While this is considered a minor threat, it remains of paramount importance to upgrade.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow us on <\/span><a href=\"https:\/\/www.digife.it\/en\/news\/\"><span style=\"font-weight: 400;\">our site<\/span><\/a><span style=\"font-weight: 400;\"> to stay updated on the latest news.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>On 10 December the news was disclosed of the presence of a serious vulnerability in the Apache Log4J library, called Log4Shell, which puts almost all applications and ...<\/p>","protected":false},"author":35,"featured_media":31899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[59,242],"tags":[],"class_list":{"0":"post-31897","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-notizie","8":"category-sicurezza"},"_links":{"self":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts\/31897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/comments?post=31897"}],"version-history":[{"count":0,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/posts\/31897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/media\/31899"}],"wp:attachment":[{"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/media?parent=31897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/categories?post=31897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digife.it\/en\/wp-json\/wp\/v2\/tags?post=31897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}