100 Hack Attempts Conducted Against Log4J Flaw in a Minute

Share post:

Hackers are taking every opportunity to compromise a vulnerability discovered in Log4j, a java programming language used by millions of computers to run online services.

According to security firm Check Point, 100 new hacker attempts are being conducted every minute to effectively exploit the flaw. Check Point also explained that attempts to exploit the flaw have been detected in over 40% of corporate networks globally.

The issue concerning the flaw is complicated by two important factors, including the fact that many companies still have difficulty installing the available patch that fixes the bug, and the second factor that includes the ease with which the bug can be easily compromised by attackers.

While cracking a flaw takes attackers a lot of technical know-how, the Log4j flaw is relatively easy to crack and makes it an attractive operation for hackers.

In their analysis, Microsoft researchers listed some things attackers use Log4shell to do, including installing malicious software that mines cryptocurrencies, stealing passwords and log-ins, and extracting data from compromised systems.

For more information, read the original story on the BBC.



Related articles

Cyber Security Today, March 22, 2023 – ChatGPT4 is out, poorly-protected Linux servers are exploited, and more

ChatGPT4 is out, poorly-protected Linux servers are exploited, and more. Welcome to Cyber Security Today. It’s Wednesday, March 22nd, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for and in the U.S. The new version of ChatGPT has been released. But if you were hoping that version 4 has made this tool safer

Only 9 per cent of Canadian firms are cyber mature: Cisco report

Only 15 per cent of companies around the world would have a mature cyber readiness, according to survey

Ferrari notifies customers of ransom demand

Exclusive car maker says some client contact information exposed in cy

Government backs down on document demand from Google, Facebook

Change meets criticism that demand for external communications is an invasion

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways