Widely used software with key vulnerability sends cyber defenders scrambling | The Business Standard
Skip to main content
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Monday
May 19, 2025

Sign In
Subscribe
  • Epaper
  • Economy
    • Aviation
    • Banking
    • Bazaar
    • Budget
    • Industry
    • NBR
    • RMG
    • Corporates
  • Stocks
  • Analysis
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • Subscribe
    • Epaper
    • GOVT. Ad
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
MONDAY, MAY 19, 2025
Widely used software with key vulnerability sends cyber defenders scrambling

World+Biz

Reuters
14 December, 2021, 12:05 pm
Last modified: 14 December, 2021, 12:07 pm

Related News

  • Tesla recalling 2 million US vehicles over Autopilot safeguards
  • Starting $60,990, Tesla's Cybertruck is priced 50% higher than initial estimate
  • Zoho to arrange its maiden user conference in Dhaka today
  • Proposing VAT on local software a 'misunderstanding': Salman F Rahman
  • VAT on software: Will it impact the vision of Smart Bangladesh 2041?

Widely used software with key vulnerability sends cyber defenders scrambling

The US government sent a warning to the private sector about the Log4j vulnerability and the looming risk it poses on Friday

Reuters
14 December, 2021, 12:05 pm
Last modified: 14 December, 2021, 12:07 pm
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Top U.S. fuel pipeline operator Colonial Pipeline has shut its entire network after a cyber attack, the company said on Friday. REUTERS/Kacper Pempel/Illustration/File Photo
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Top U.S. fuel pipeline operator Colonial Pipeline has shut its entire network after a cyber attack, the company said on Friday. REUTERS/Kacper Pempel/Illustration/File Photo

A newly discovered vulnerability in a widely used software library is causing mayhem on the internet, forcing cyber defenders to scramble as hackers rush to exploit the weakness.

The vulnerability, known as Log4j, comes from a popular open source product that helps software developers track changes in applications that they build. It is so popular and embedded across many companies' programs that security executives expect widespread abuse.

"The Apache Log4j Remote Code Execution Vulnerability is the single biggest, most critical vulnerability of the last decade," said Amit Yoran, chief executive of Tenable, a network security firm, and the founding director of the US Computer Emergency Readiness Team.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

The US government sent a warning to the private sector about the Log4j vulnerability and the looming risk it poses on Friday.

In a conference call on Monday, the leader of CISA said it was one of the worst vulnerabilities seen in many years. She urged companies to have staff working through the holidays to battle those using new methods to exploit the flaw.

Much of the software affected by Log4j, which bears names like Hadoop or Solr, may be unfamiliar to the public at large. But as with the SolarWinds program at the center  of a massive Russian espionage operation last year, the ubiquity of these workhorse programs makes them ideal jumping-off points for digital intruders.

Juan Andres Guerrero-Saade, principal threat researcher with cybersecurity firm SentinelOne, called it "one of those nightmare vulnerabilities that there's pretty much no way to prepare for."

While a partial fix for the vulnerability was released on Friday by Apache, the maker of Log4j, affected companies and cyber defenders will need time to locate the vulnerable software and properly implement patches. Log4j itself is maintained by a few volunteers, security experts said.

In practice, the flaw allows an outsider to enter active code into the record-keeping process. That code then tells the server hosting the software to execute a command giving the hacker control.

The issue was first publicly disclosed by a security researcher working for Chinese technology company Alibaba Group Holding Ltd, Apache noted in its security advisory.

It is now apparent that initial exploitation was spotted Dec. 2, before a patch rolled out a few days later. The attacks became much more widespread as people playing Minecraft used it to take control of servers and spread the word in gaming chats.

So far no major disruptive cyber incidents have been publicly documented as a result of the vulnerability, but researchers are seeing an alarming uptick in hacking groups trying to take advantage of the bug for espionage.

"We also expect to see this vulnerability in everyone's supply chain," said Chris Evans, chief information security officer at HackerOne.

Multiple botnets, or groups of computers controlled by criminals, were also exploiting the flaw in a bid to add more captive machines, experts tracking the developments said.

What many experts now fear is that the bug could be used to deploy malware that either destroys data or encrypts it, like what was used against US pipeline operator Colonial Pipeline of gasoline in some parts of the United States.

Guerrero-Saade said his firm had already seen Chinese hacking groups moving to take advantage of the vulnerability.

US cybersecurity firms Mandiant and Crowdstrike also said they found sophisticated hacking groups leveraging the bug to breach targets. Mandiant described those hackers as "Chinese government actors" in an email to Reuters.

software / cyber

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • Bangladesh Bank Governor Ahsan H Mansur speaks to media at a press briefing at the Foreign Service Academy in Dhaka on Monday, 19 May 2025. Photo: Focus Bangla
    Money, assets seized from financial offenders will be used to support underprivileged population: BB governor
  • Protesting officials at the NBR headquarters in Agargaon, Dhaka on 19 May 2025. Photo: TBS
    Protesting NBR officials to hold talks with advisers, tomorrow's strike suspended
  • Home Adviser Jahangir Alam speaks to media following a meeting of the law and order coordination committee ahead of Eid-ul-Adha on 19 May 2025. Photo: UNB
    Home adviser defends Nusraat Faria's arrest, says letting her go would've raised questions as well

MOST VIEWED

  • Illustration: Ashrafun Naher Ananna/TBS
    World’s top universities outside United States 2025
  • Infograph: TBS
    US-Bangladesh FTA talks begin, RMG may see major boost
  • Representational image. File photo: TBS
    India halts import of Bangladeshi garments, processed foods via land ports
  • Nusraat Faria Mazhar. Photo: Noor A Alam/TBS
    Actress Nusraat Faria detained at Dhaka airport over attempted murder case
  • Infographic: TBS
    Nationwide elevated highways in the works to boost mobility, minimise land use
  • Employees of the now-dissolved NBR hold a protest programme in front of the revenue board's HQ on 13 May. Photo: Jahir Rayhan/TBS
    Govt looks for ways to resolve NBR deadlock

Related News

  • Tesla recalling 2 million US vehicles over Autopilot safeguards
  • Starting $60,990, Tesla's Cybertruck is priced 50% higher than initial estimate
  • Zoho to arrange its maiden user conference in Dhaka today
  • Proposing VAT on local software a 'misunderstanding': Salman F Rahman
  • VAT on software: Will it impact the vision of Smart Bangladesh 2041?

Features

PHOTO: Collected

Helmet Hunt: Top 5 half-face helmets that meet international safety standards

1d | Wheels
Photo: Collected

Simple accessories to extend the life of your luggage

1d | Brands
With a growing population, the main areas of Rajshahi city are now often clogged with traffic. Photo: Mahmud Jami

Once a ‘green city’, Rajshahi now struggling to breathe

1d | Panorama
Illustration: TBS

Cassettes, cards, and a contactless future: NFC’s expanding role in Bangladesh

2d | Panorama

More Videos from TBS

Intervention in Syria should not occur: A direct message from the King of Jordan to the United States.

Intervention in Syria should not occur: A direct message from the King of Jordan to the United States.

25m | TBS World
Delicious Makhandi Halwa

Delicious Makhandi Halwa

15m | TBS Programs
New law planned to protect insurance clients as 6 firms embezzle Tk3,736cr

New law planned to protect insurance clients as 6 firms embezzle Tk3,736cr

1h | TBS Insight
Former US President Joe Biden diagnosed with prostate cancer

Former US President Joe Biden diagnosed with prostate cancer

1h | TBS World
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net