Newly exposed zero-day vulnerability puts Internet at risk

Featured image

Share this article

Neural network sphere/globe sparks fly into space

The Apache Log4j logging library is a free Java tool that is used by many programs to log information. It was recently discovered that it has a zero-day security vulnerability that is easy to exploit. An attacker could cause the tool to log a specific message that can take over the entire host system. The new vulnerability has been identified and tracked as CVE-2021-44228

Read more: HIPAA compliant email: The definitive guide

What does this mean?

Since log4j is commonly used, it could cause widespread damage. Hackers can use the zero-day vulnerability to take over devices and services that are running software like iCloud or Twitter. 

Unfortunately, hackers had an entire week’s headstart to exploiting the vulnerability before it was publicly disclosed. Recent reports show that hackers are already targeting Windows users and attempting to install Khonsari ransomware and a remote access Trojan called Orcus.

We are taking urgent action to drive mitigation of this vulnerability and detect any associated threat activity,” said Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA) in a statement. “To be clear, this vulnerability poses a severe risk. We will only minimize potential impacts through collaborative efforts between government and the private sector.” 

What should vendors do to protect themselves?

The Apache Software Foundation has already released a patch to fix the vulnerability. So it’s crucial that people update their software. Organizations also need to search for malicious software that may have been installed before the vulnerability was discovered.

The CISA also recommends that organizations take the following three additional steps:

  1. Enumerate any external-facing devices that have log4j installed. 
  2. Make sure that your security operations center is actioning every single alert on the devices that fall into the category above. 
  3. Install a web application firewall (WAF) with rules that automatically update so that your SOC is able to concentrate on fewer alerts. 

Is Paubox affected?

Your trust means everything to us, and keeping your data safe is our number one priority at Paubox. None of Paubox’s solutions are affected by the Log4j vulnerability. Our HITRUST CSF certified software does not rely on the software that is subject to this issue. Mail delivery, encryption, and security are all unaffected. 

Try Paubox Email Suite Plus for FREE today.

 

Author Photo

About the author

Sara Nguyen

Read more by Sara Nguyen

Get started with
end-to-end protection

Bolster your organization’s security with healthcare’s most trusted HIPAA compliant email solution

The #1-rated email encryption 
and security software on G2

G2 Badge: Email Encryption Leader Fall 2022
G2 Badge: Security Best Usability Fall 2022
G2 Badge: Encryption Momentum Leader Fall 2022
G2 Badge: Security Best Relationship Fall 2022
G2 Badge: Security Users Most Likely to Recommend Fall 2022
G2 Badge: Email Gateway Best Relationship Fall 2022
G2 Badge: Email Gateway Best Meets Requirements Fall 2022
G2 Badge - Users Most Likely to Recommend Summer 2022
G2 Badge: Email Gateway Best Results Fall 2022
G2 Badge: Email Gateway Best Usability Fall 2022
G2 Badge: Email Gateway Best Support Fall 2022
G2 Badge: Email Gateway Easiest To Use Fall 2022
G2 Badge: Email Gateway Easiest Setup Fall 2022
G2 Badge: Email Gateway Easiest Admin Fall 2022
G2 Badge: Email Gateway Easiest to do Business with Fall 2022
G2 Badge: Email Gateway Highest User Adoption 2022
G2 Badge: Email Gateway High Performer Fall 2022
G2 Badge: Email Gateway Momentum Leader Fall 2022
G2 Badge: Email Gateway Most Implementable Fall 2022
G2 Badge: Email Gateway Users Most Likely to Recommend Fall 2022