AGI – Millions of home doors seem to open suddenly without security. As if anyone with evil intent can enter inside and capture it. It is still difficult to establish the true extent of the vulnerability detected in computer systems that use the Java language, but the consensus among experts is that it is a serious one.
The National Cyber Security Agency speaks of “a vast and diversified attack surface over the entire network”, defining the situation as “particularly serious”. In other words, the Internet is at risk. His security suffers. Suddenly, all the software and applications written in Java find themselves on their page, The most widely used programming language in the world: billions of programs and applications, from servers to smartphones.
If no solution is found for Log4Shell in the next few days, the effects will be even worse because of the so-called vulnerabilities that compromise the security of servers and companies, but in the short term smartphones, computers, and the like. ., All devices in circulation. To the extent of bringing in some experts to talk about the “computer apocalypse”.
What happened: “Researchers have discovered a vulnerability in Lock 4j, the library used by most software programmers with the Java language, which allows you to write in software called ‘logs’, which is the ‘status’ of the software that allows you to photograph a moment in software development, progress , Records performance, issues and solutions, ”explains Aki Marco Ramili, CEO of Yoruba.
There is vulnerability in the tags of these posts, which allows you to identify the type of post that was previously written in the blog tags or on Twitter.. “One of these tags allows you to run a command and start a program,” Ramilli continues. Any kind of command or program. He can say to the machine: ‘Do this’. The attacker can do whatever he wants with the machine with this tag. It can throw code on the computer.
But what to do? “Anything. At the moment, what we see is that attackers are using this vulnerability to mine cryptocurrencies”, that is, the function that allows you to generate bitcoins, a complex function that requires particular computer skills and energy. “But they can do anything: enter a company’s servers, see what’s inside, steal trade secrets, or decide to launch ransomware attacks to monetize their computer control,” says Ramilly, who admits that “about five, eight” witnessed this type of attack. Times in the last 20 years “.
In detail, what is Log4j? “If you use Java, you’ll use Log4j,” Matteo Flora, IT security expert and CEO of TheFool, explains to Agi. “This is a practical standard for anyone using Java” for programming. “It is everywhere like Tesla, Twitter, Facebook, number control systems, iPhones. What has emerged is an unresolved issue. “
What happens then? “Worse, this is a bit of a cyber apocalypse: if this vulnerability is not resolved, it is possible to start the command.
Instead Ramille uses a metaphor: “Log4j is like an actor’s text following a login platform: it’s used to follow a trail or to a certain point if you want to work on an error. ”. A track to follow and implement. However, in one of his columns, he has the opportunity to completely change the plot of the text and write his own. Of your choice.
Java is on about 3 billion devices. Log4j, developed by Apache, is used by almost all programmers. To give an idea of its usability and its reliability, Apache announced on its Twitter profile that Ingenuity, the NASA helicopter that landed on Mars last February, also has software that uses Log4j.
But you do not have to go to Mars to understand the enormous use of this programming language. During these hours hundreds, if not thousands, of hackers around the world are trying to identify this vulnerability in software and servers, capture it and launch attacks. The greatest risk at this time is driven by companies and institutions, more or less large. The situation is exacerbated by the fact that it is often difficult to understand whether or not Log4j was used in someone’s software development.
However, on the grill, companies and firms are not alone. This is because the problem can quickly occur to the individual user, the owner of the smartphone or the smartwatch. “If an attacker attacks a company, the user who logs into the system may be Twitter, Minecraft or Ecommerce.
Unless quick solutions are found, the possibility of this happening in the next few days is even more serious: “Malicious hackers can spread distorted connections and open doors on people’s devices, phones, tablets, and anything connected to the network.. Once the back door is open, he can do whatever he wants. Ramili still has a little day time. “It will be difficult to recover from the situation by the middle of next week.” This is competition against time.
“Avid writer. Subtly charming alcohol fanatic. Total twitter junkie. Coffee enthusiast. Proud gamer. Web aficionado. Music advocate. Zombie lover. Reader.”
More Stories
Acrylic Nails for the Modern Professional: Balancing Style and Practicality
The Majestic Journey of the African Spurred Tortoise: A Guide to Care and Habitat
Choosing Between a Russian and a Greek Tortoise: What You Need to Know