Log4j attacks are still a major threat, warns Microsoft

Updated: Feb 18

Create a blog post subtitle that summarizes your post in a few short, punchy sentences and entices your audience to continue reading.


Welcome to your blog post. Use this space to connect with your readers and potential customers in a way that’s current and interesting. Think of it as an ongoing conversation where you can share updates about business, trends, news, and more.


“Do you have a design in mind for your blog? Whether you prefer a trendy postcard look or you’re going for a more editorial style blog - there’s a stunning layout for everyone.”

You’ll be posting loads of engaging content, so be sure to keep your blog organized with Categories that also allow visitors to explore more of what interests them.


Create Relevant Content


Writing a blog is a great way to position yourself as an authority in your field and captivate your readers’ attention. Do you want to improve your site’s SEO ranking? Consider topics that focus on relevant keywords and relate back to your website or business. You can also add hashtags (#vacation #dream #summer) throughout your posts to reach more people, and help visitors search for relevant content.


Blogging gives your site a voice, so let your business’ personality shine through. Choose a great image to feature in your post or add a video for extra engagement. Are you ready to get started? Simply create a new post now.


Microsoft is warning its Windows and Microsoft Azure customers that they need to remain vigilant when dealing with potential attacks exploiting the Log4Shell vulnerabilities in the popular Java logging framework Log4j.



At the beginning of December, the Apache Software Foundation disclosed a zero-day vulnerability, tracked as CVE-2021-44228, and four related flaws now known as Log4Shell. As numerous applications and online services use Log4j to log code written in Java, it could take years before the matter is finally resolved.


In an update to a blog post first published on December 11, Microsoft provided further insight on how the Log4Shell vulnerabilities are being exploited in the wild so far, saying:




“Exploitation attempts and testing have remained high during the last weeks of December. We have observed many existing attackers adding exploits of these vulnerabilities in their existing malware kits and tactics, from coin miners to hands-on-keyboard attacks. Organizations may not realize their environments may already be compromised. Microsoft recommends customers to do additional review of devices where vulnerable installations are discovered.”

Log4j dashboard and scanners


To protect themselves from any potential Log4j attacks, Microsoft recommends that its customers employ now readily available scripts and scanning tools to assess their risk and impact.



In addition to cybercriminals, nation-state hackers that have more advanced capabilities have been observed taking advantage of the Log4Shell vulnerabilities which means we could see large-scale cyberattacks exploiting them in the future. In fact, Sonatype CTO Brian Fox said that “The combination of scope and potential impact here is unlike any previous component vulnerability I can readily recall” in a recent email to TechRadar Pro.


At the end of December, Microsoft took it upon itself to roll out a Log4j dashboard in the Microsoft 365 Defender Portal for Windows 10 and 11, Windows Server and Linux systems to help security teams find patches for software and devices affected by Log4Shell. At the same time, both CISA and Crowdstrike released separate Log4j scanners ahead of the holidays.


Dealing with the the Log4Shell vulnerabilities has been quite difficult for security teams which is why the UK's NCSC recently published a blog post warning organizations about the potential for burnout while trying to patch affected software and devices.


As Log4Shell has the potential to lead to cyberattacks and data breaches on par or greater than the 2017 hack of Equifax, organizations should heed Microsoft's advice when it comes to remaining vigilant.


We've also highlighted the best endpoint protection software, best firewall and best antivirus


Via ZDNet

4 views0 comments

Recent Posts

See All

9 hot (and not) cybersecurity trends: Hot – Ransomware Hot – Cryptomining/Cryptojacking Hot – Deepfakes Hot – Videoconferencing attacks Cold – VPNs Hot – IoT and OT attac

Zero Trust has become one of cybersecurity’s most used buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t. Zero Trust is a strategic approach to cybersecu