Widely used software with key vulnerability sends cyber defenders scrambling | The Business Standard
Skip to main content
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Tuesday
May 20, 2025

Sign In
Subscribe
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
TUESDAY, MAY 20, 2025
Widely used software with key vulnerability sends cyber defenders scrambling

World+Biz

Reuters
14 December, 2021, 12:05 pm
Last modified: 14 December, 2021, 12:07 pm

Related News

  • Tesla recalling 2 million US vehicles over Autopilot safeguards
  • Starting $60,990, Tesla's Cybertruck is priced 50% higher than initial estimate
  • Zoho to arrange its maiden user conference in Dhaka today
  • Proposing VAT on local software a 'misunderstanding': Salman F Rahman
  • VAT on software: Will it impact the vision of Smart Bangladesh 2041?

Widely used software with key vulnerability sends cyber defenders scrambling

The US government sent a warning to the private sector about the Log4j vulnerability and the looming risk it poses on Friday

Reuters
14 December, 2021, 12:05 pm
Last modified: 14 December, 2021, 12:07 pm
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Top U.S. fuel pipeline operator Colonial Pipeline has shut its entire network after a cyber attack, the company said on Friday. REUTERS/Kacper Pempel/Illustration/File Photo
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Top U.S. fuel pipeline operator Colonial Pipeline has shut its entire network after a cyber attack, the company said on Friday. REUTERS/Kacper Pempel/Illustration/File Photo

A newly discovered vulnerability in a widely used software library is causing mayhem on the internet, forcing cyber defenders to scramble as hackers rush to exploit the weakness.

The vulnerability, known as Log4j, comes from a popular open source product that helps software developers track changes in applications that they build. It is so popular and embedded across many companies' programs that security executives expect widespread abuse.

"The Apache Log4j Remote Code Execution Vulnerability is the single biggest, most critical vulnerability of the last decade," said Amit Yoran, chief executive of Tenable, a network security firm, and the founding director of the US Computer Emergency Readiness Team.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

The US government sent a warning to the private sector about the Log4j vulnerability and the looming risk it poses on Friday.

In a conference call on Monday, the leader of CISA said it was one of the worst vulnerabilities seen in many years. She urged companies to have staff working through the holidays to battle those using new methods to exploit the flaw.

Much of the software affected by Log4j, which bears names like Hadoop or Solr, may be unfamiliar to the public at large. But as with the SolarWinds program at the center  of a massive Russian espionage operation last year, the ubiquity of these workhorse programs makes them ideal jumping-off points for digital intruders.

Juan Andres Guerrero-Saade, principal threat researcher with cybersecurity firm SentinelOne, called it "one of those nightmare vulnerabilities that there's pretty much no way to prepare for."

While a partial fix for the vulnerability was released on Friday by Apache, the maker of Log4j, affected companies and cyber defenders will need time to locate the vulnerable software and properly implement patches. Log4j itself is maintained by a few volunteers, security experts said.

In practice, the flaw allows an outsider to enter active code into the record-keeping process. That code then tells the server hosting the software to execute a command giving the hacker control.

The issue was first publicly disclosed by a security researcher working for Chinese technology company Alibaba Group Holding Ltd, Apache noted in its security advisory.

It is now apparent that initial exploitation was spotted Dec. 2, before a patch rolled out a few days later. The attacks became much more widespread as people playing Minecraft used it to take control of servers and spread the word in gaming chats.

So far no major disruptive cyber incidents have been publicly documented as a result of the vulnerability, but researchers are seeing an alarming uptick in hacking groups trying to take advantage of the bug for espionage.

"We also expect to see this vulnerability in everyone's supply chain," said Chris Evans, chief information security officer at HackerOne.

Multiple botnets, or groups of computers controlled by criminals, were also exploiting the flaw in a bid to add more captive machines, experts tracking the developments said.

What many experts now fear is that the bug could be used to deploy malware that either destroys data or encrypts it, like what was used against US pipeline operator Colonial Pipeline of gasoline in some parts of the United States.

Guerrero-Saade said his firm had already seen Chinese hacking groups moving to take advantage of the vulnerability.

US cybersecurity firms Mandiant and Crowdstrike also said they found sophisticated hacking groups leveraging the bug to breach targets. Mandiant described those hackers as "Chinese government actors" in an email to Reuters.

software / cyber

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • At least 500 workers of eight TNZ Group companies positioned themselves at Kakrail on 20 May in front of the Shrom Bhaban. Photo: Rajib Dhar/TBS
    'March to Jamuna': TNZ Group workers block Kakrail demanding due arrears
  • Saleh Uddin Ahmed. Sketch: TBS
    What finance adviser tells TBS about NBR split, BSEC chair removal
  • Photo: TBS
    Chatradal blocks Shahbag intersection demanding justice for Shammo

MOST VIEWED

  • Lotto inaugurates new factory to nearly triple production capacity
    Lotto inaugurates new factory to nearly triple production capacity
  • Illustration: Collected
    Unemployment rate hits historic high, rises to 4.63% as 27.4 lakh now jobless
  • Representational image
    Govt plans to scrap reduced tax benefits for textile sector
  • Photo shows actress Nusraat Faria produced before the Chief Metropolitan Magistrate (CMM) Court on Monday, 19 May 2025. File Photo: Focus Bangla
    Court sends actress Nusraat Faria to jail, sets 22 May for bail hearing
  • Nusraat Faria Mazhar. File Photo: Noor A Alam/TBS
    Interim govt struggling with moral, political direction: British journo David Bergman on Nusraat Faria arrest
  • The Chattogram Custom House building in Chattogram. File Photo: Collected
    Ctg custom house pen-down strike continues for 5th day

Related News

  • Tesla recalling 2 million US vehicles over Autopilot safeguards
  • Starting $60,990, Tesla's Cybertruck is priced 50% higher than initial estimate
  • Zoho to arrange its maiden user conference in Dhaka today
  • Proposing VAT on local software a 'misunderstanding': Salman F Rahman
  • VAT on software: Will it impact the vision of Smart Bangladesh 2041?

Features

Photo: TBS

How Shahbagh became the focal point of protests — and public suffering

22h | Panorama
PHOTO: Collected

Helmet Hunt: Top 5 half-face helmets that meet international safety standards

2d | Wheels
Photo: Collected

Simple accessories to extend the life of your luggage

2d | Brands
With a growing population, the main areas of Rajshahi city are now often clogged with traffic. Photo: Mahmud Jami

Once a ‘green city’, Rajshahi now struggling to breathe

2d | Panorama

More Videos from TBS

We will take control of the entire territory of the valley: Netanyahu

We will take control of the entire territory of the valley: Netanyahu

52m | TBS World
No third country had role in ceasefire: India

No third country had role in ceasefire: India

1h | TBS World
Russia agrees to ceasefire talks: Trump after phone call with Putin

Russia agrees to ceasefire talks: Trump after phone call with Putin

3h | TBS World
Actress Nusraat Faria granted bail

Actress Nusraat Faria granted bail

5h | TBS Today
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net