nypost.com Open in urlscan Pro
192.0.66.32  Public Scan

Submitted URL: https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkI...
Effective URL: https://nypost.com/2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/
Submission: On December 22 via manual from US — Scanned from DE

Form analysis 4 forms found in the DOM

https://nypost.com/

<form class="search__form" action="https://nypost.com/" id="nav-search">
  <div class="search__inner" role="search">
    <label for="search-input-interior" class="screen-reader-text"> Search </label>
    <input type="search" name="s" class="search__input" placeholder="Type to Search" value="">
  </div>
  <button class="search__submit" type="submit" id="search-submit" value="search" tabindex="-1" aria-label="Click to Search">
    <span class="search__submit-text"> Search </span>
    <span class="search__submit-icon">
      <svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#C60800"></path>
      </svg>
    </span>
  </button>
</form>

<form class="search__form">
  <div class="search__inner" role="search">
    <label for="search-input-header" class="screen-reader-text"> Search </label>
    <span class="search__input-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
      </svg>
    </span>
    <input type="search" name="s" class="search__input" id="search-input-header" placeholder="Type to Search" tabindex="-1" data-search-header="input">
  </div>
  <button class="search__submit" type="submit" tabindex="-1" aria-label="Click to Search" data-search-header="submit">
    <span class="search__submit-text">Search</span>
    <span class="search__submit-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
        <path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
      </svg>
    </span>
  </button>
</form>

<form>
  <h1 class="vjs-social-title">Share: </h1>
  <h2 class="vjs-social-description"></h2>
  <div class="vjs-social-share-links">
    <a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&amp;title=" class="vjs-social-share-link vjs-icon-facebook" aria-role="link" aria-label="Share on Facebook" title="Facebook" target="_blank">
          <span class="vjs-control-text">Facebook</span>
        </a>
    <a href="https://plus.google.com/share?url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F" class="vjs-social-share-link vjs-icon-gplus" aria-role="link" aria-label="Share on Google+" title="Google+" target="_blank">
          <span class="vjs-control-text">Google+</span>
        </a>
    <a href="https://www.linkedin.com/shareArticle?mini=true&amp;url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&amp;title=&amp;summary=undefined&amp;source=Classic" class="vjs-social-share-link vjs-icon-linkedin" aria-role="link" aria-label="Share on LinkedIn" title="LinkedIn" target="_blank" rel="nofollow">
          <span class="vjs-control-text">LinkedIn</span>
        </a>
    <a href="https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&amp;media=&amp;description=&amp;is_video=true" class="vjs-social-share-link vjs-icon-pinterest" aria-role="link" aria-label="Share on Pinterest" title="Pinterest" target="_blank">
          <span class="vjs-control-text">Pinterest</span>
        </a>
    <a href="https://www.tumblr.com/share?v=3&amp;u=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&amp;t=" class="vjs-social-share-link vjs-icon-tumblr" aria-role="link" aria-label="Share on Tumblr" title="Tumblr" target="_blank">
          <span class="vjs-control-text">Tumblr</span>
        </a>
    <a href="https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fabout.twitter.com%2Fresources%2Fbuttons&amp;text=&amp;tw_p=tweetbutton&amp;url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F" class="vjs-social-share-link vjs-icon-twitter" aria-role="link" aria-label="Share on Twitter" title="Twitter" target="_blank">
          <span class="vjs-control-text">Twitter</span>
        </a>
  </div><label class="vjs-social-direct-link" aria-label="Read Only: Direct Link To Content"><span class="vjs-social-label-text">Direct Link</span><input type="text" readonly="true" value=""></label><label class="vjs-social-embed-code"
    aria-label="Read Only: Embed Code"><span class="vjs-social-label-text">Embed Code</span><input type="text" readonly="true" value=""></label>
</form>

POST /2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/

<form action="/2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/" method="post">
  <label for="target_email">Send to Email Address</label>
  <input type="email" name="target_email" id="target_email" value="">
  <label for="source_name">Your Name</label>
  <input type="text" name="source_name" id="source_name" value="">
  <label for="source_email">Your Email Address</label>
  <input type="email" name="source_email" id="source_email" value="">
  <input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
  <div id="g-recaptcha"></div>
  <img style="float: right; display: none" class="loading" src="https://nypost.com/wp-content/mu-plugins/jetpack-9.8/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
  <input type="submit" value="Send Email" class="sharing_send">
  <a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
  <div class="errors errors-1" style="display: none;">There was an error with the form</div>
  <div class="errors errors-2" style="display: none;">Incorrect reCAPTCHA, please try again.</div>
  <div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>

Text Content

Primary Menu Sections
Search
Search
Skip to search results
 * News
 * Metro
 * Page Six
 * Sports
 * Post Sports+
 * Business
 * Opinion
 * Entertainment
 * Fashion
 * Shopping
 * Living
 * Media
 * Tech
 * Real Estate
 * Video
 * Photos
 * Visual Stories
 * Sub Menu 1
   * Covers
   * Columnists
   * Horoscopes
   * Sports Odds
   * Podcasts
   * Careers
 * Sub menu 2
   * Email Newsletters
   * Official Store
   * Home Delivery
   * Tips

Log In
Search Email
New York Post
New!
Sports Plus!
Try it free


December 22, 2021
Search
Search

Tech
 * Facebook
 * Twitter
 * Flipboard
 * WhatsApp
 * Email
 * Copy
 * 


WHY IS THE LOG4J CYBERSECURITY FLAW THE ‘MOST SERIOUS’ IN DECADES?

By
Theo Wayt


SOCIAL LINKS FOR THEO WAYT

 * View Author Archive
 * Get author RSS feed



Thanks for contacting us. We've received your submission.

Back to Reading
December 20, 2021 5:28pm
Updated
December 20, 2021 5:50pm
Intruders leverage Log4j flaw to breach Belgian Defense Department
Parts of the Belgian Defense Ministry’s computer networks have been down since
Thursday after a cyber incident in which attackers exploited the Apache Log4j
vulnerability, government officials said.

Video Player is loading.
Play Video
Pause
Unmute

Current Time 0:27
/
Duration 1:19
Loaded: 100.00%


0:27
Stream Type LIVE
Seek to live, currently behind liveLIVE
Remaining Time -0:52
 
Share
1x
Playback Rate

Chapters
 * Chapters

Descriptions
 * descriptions off, selected

Captions
 * captions settings, opens captions settings dialog
 * captions off, selected

Audio Track
 * en (Main), selected

Picture-in-PictureFullscreen

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Close Modal Dialog

This is a modal window. This modal can be closed by pressing the Escape key or
activating the close button.



This is a modal window. This modal can be closed by pressing the Escape key or
activating the close button.


SHARE:




Facebook Google+ LinkedIn Pinterest Tumblr Twitter
Direct LinkEmbed Code
Close Modal Dialog


MORE ON: HACKING


 * SATELLITE PHOTOS REVEAL WORRYING ANTENNAS IN SOUTH CHINA SEA


 * GOOGLE WARNS OVER 1M DEVICES HAVE BEEN INFECTED IN ‘RUSSIAN HACK’


 * DATA HACKED FOR 400,000 PLANNED PARENTHOOD PATIENTS


 * ARE YOU LAZY WITH IPHONE OR GMAIL SECURITY? QUARTER OF ADULTS ‘VICTIM OF
   HACKERS’

A newly discovered cybersecurity flaw is affecting vast swaths the internet from
Google and Amazon to the systems used to run militaries and hospitals, with US
Homeland Security’s top cybersecurity official calling it the most serious
vulnerability in decades. 

The flaw is present within a popular piece of software called Log4j, which is
part of the ubiquitous programming language Java. Log4j is used by millions of
websites and apps — and the software’s flaw potentially allows hackers to take
control of systems by typing a simple line of code, according to cybersecurity
experts. 

“The log4j vulnerability is the most serious vulnerability I have seen in my
decades-long career,” Jen Easterly, the director of the US Cybersecurity and
Infrastructure Security Agency, said Thursday on CNBC. 

Most hacking attempts using Log4j so far have involved attackers trying to
install cryptocurrency “mining” software on victims’ computers. However, an
Iranian hacking group called “Charming Kitten” has also tried to use the
vulnerability to breach government agencies and businesses in Israel, according
to the cybersecurity company Check Point. 

“The log4j vulnerability is the most serious vulnerability I have seen in my
decades-long career,” Jen Easterly, the director of the US Cybersecurity and
Infrastructure Security Agency, said. Getty Images

The Log4j flaw is more serious than other cybersecurity flaws because of its
“ubiquity, simplicity and complexity,” according to Easterly.

“It is a piece of software, open source, that’s in millions of devices from
video games to hospital equipment to industrial control systems to cloud
services,” the cybersecurity official said.

“It is trivial to exploit,” she added. “And it takes a very focused effort to be
able to find and to fix the vulnerability.” 



While there’s little that individual internet users can do to protect
themselves, government agencies and tech companies alike are scrambling to fix
the vulnerability. 

The Cybersecurity and Infrastructure Security Agency published an emergency
directive on Friday urging all government agencies to immediately “patch”
computer systems to address the Log4j flaw. 

Google, meanwhile, has more than 500 engineers combing through the company’s
code to make sure it’s safe, the Washington Post reported. 

Government agencies are scrambling to address the vulnerability.AP

Asaf Ashkenazi, chief operating officer of security company Verimatrix, told the
paper that coders across tech companies have been clocking excessive hours since
the Log4j issue was first made public on Dec. 9. 

“Some of the people didn’t see sleep for a long time, or they sleep like three
hours, four hours and wake back up,” Ashkenazi told the Washington Post. “We
were working around-the-clock. It’s a nightmare since it was out. It’s still a
nightmare.”

Even the Microsoft-owned online video game Minecraft has been affected. Some
hackers were apparently able to breach victims by typing a single line of code
into the game’s chat box, according to Wired. Microsoft says it has since fixed
the issue and is urging players to update their Minecraft software.

On Monday, Belgium’s defense ministry was forced to shut down parts of its
computer network after hackers triggered the Log4j vulnerability, the Wall
Street Journal reported. The ministry did not provide details on the breach. 

Most hacking attempts have reportedly involved attackers trying to install
cryptocurrency mining software on victims’ computers. Getty Images


SHARE THIS ARTICLE:

 * Facebook
 * Twitter
 * Flipboard
 * WhatsApp
 * Email
 * Copy
 * 

Filed under
 * amazon
 * cryptocurrency
 * cybersecurity
 * google
 * hackers
 * hacking
 * 12/20/21

Read Next Meta investors push for harder line against 'harmful conte...

Skip
Ads by




TRENDING NOW ON NYPOST.COM

 * This story has been shared 95,103 times. 95,103
   
   
   CHRIS NOTH AND WIFE TARA WILSON’S MARRIAGE IS ‘HANGING BY A THREAD’

 * This story has been shared 89,135 times. 89,135
   
   
   EX-PATRIOT DESTROYS MAC JONES: 'KEEP YOUR MOUTH SHUT'

 * This story has been shared 72,956 times. 72,956
   
   
   TOURIST STUNNED AFTER NYC HOTEL ROOM WINDOW OPENS INTO TIMES SQUARE
   RESTAURANT





NOW ON PAGE SIX




 * DETAILS ON ‘BACHELORETTE’ MICHELLE YOUNG’S ENGAGEMENT RING FROM NATE OLUKOYA


 * ‘BACHELORETTE’ MICHELLE YOUNG AND NAYTE OLUKOYA GIFTED $200K FOR FIRST HOME


 * LEONARDO DICAPRIO’S OLD NYC BACHELOR PAD PRICE CHOPPED TO $7.5M

See All


VIDEO


 * BRITNEY SPEARS' MOST MONUMENTAL MOMENTS OF 2021


NOW ON DECIDER




 * ‘WHEEL OF FORTUNE’ FANS RAGE OVER TECHNICALITY THAT LOST CONTESTANT AN AUDI:
   “SHE GOT SCREWED!”

See All

WHAT TO SHOP


 * THE 50 BEST NEW YEAR'S RESOLUTION IDEAS FOR 2022 AND HOW TO ACHIEVE THEM


 * SHOP KATE SPADE SALE STYLES WITH AN EXTRA 40% OFF NOW


 * 42 BEST E-GIFT CARDS YOU CAN BUY ONLINE FOR EASY, LAST-MINUTE HOLIDAY GIFTS


 * THE 15 BEST PAJAMAS FOR WOMEN IN 2021 THAT YOU'LL NEVER WANT TO TAKE OFF


 * THE 63 BEST HOLIDAY GIFTS YOUR WIFE WILL LOVE, FROM BOOTS TO PERFUME





SHARE THIS ARTICLE

Share Selection

 * Share selection to Facebook
 * Share selection to Twitter


MORE STORIES


PAGE SIX

CHRIS NOTH AND WIFE TARA WILSON’S MARRIAGE IS ‘HANGING BY A THREAD’




NYPOST

EX-PATRIOT DESTROYS MAC JONES: 'KEEP YOUR MOUTH SHUT'

 * Facebook
 * Twitter
 * Instagram
 * LinkedIn
 * Email
 * YouTube

 * Sections & Features
   * News
   * Metro
   * Sports
   * Business
   * Opinion
   * Entertainment
   * Fashion
   * Shopping
   * Living
   * Media
   * Tech
   * Real Estate
   * Video
   * Photos
   * Visual Stories
   * Alexa
   * Covers
   * Horoscopes
   * Sports Odds
   * Podcasts
   * Columnists
   * Classifieds
 * Post Sports+
   * Subscribe
   * Articles
   * Manage
 * Newsletters & Feeds
   * Email Newsletters
   * RSS Feeds
   * NY Post Official Store
   * Home Delivery
     * Subscribe
     * Manage Subscription
   * Delivery Help
 * Help/Support
   * About New York Post
   * Customer Service
   * App FAQ & Help
   * Community Guidelines
   * Contact Us
     * Tips
     * Newsroom
     * Letters to the Editor
     * Reprints
     * Careers
 * Apps
   * iPhone App
   * iPad App
   * Android Phone
   * Android Tablet
   * Advertise
     * Media Kit
     * Contact

© 2021 NYP Holdings, Inc. All Rights Reserved Terms of Use Membership Terms
Privacy Notice Your Ad Choices Sitemap Your California Privacy Rights Do Not
Sell My Personal Information


SHARE LINK

click to copy




Send to Email Address Your Name Your Email Address

Cancel
There was an error with the form
Incorrect reCAPTCHA, please try again.
Sorry, your blog cannot share posts by email.