nypost.com
Open in
urlscan Pro
192.0.66.32
Public Scan
Submitted URL: https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkI...
Effective URL: https://nypost.com/2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/
Submission: On December 22 via manual from US — Scanned from DE
Effective URL: https://nypost.com/2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/
Submission: On December 22 via manual from US — Scanned from DE
Form analysis
4 forms found in the DOMhttps://nypost.com/
<form class="search__form" action="https://nypost.com/" id="nav-search">
<div class="search__inner" role="search">
<label for="search-input-interior" class="screen-reader-text"> Search </label>
<input type="search" name="s" class="search__input" placeholder="Type to Search" value="">
</div>
<button class="search__submit" type="submit" id="search-submit" value="search" tabindex="-1" aria-label="Click to Search">
<span class="search__submit-text"> Search </span>
<span class="search__submit-icon">
<svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#C60800"></path>
</svg>
</span>
</button>
</form>
<form class="search__form">
<div class="search__inner" role="search">
<label for="search-input-header" class="screen-reader-text"> Search </label>
<span class="search__input-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
</svg>
</span>
<input type="search" name="s" class="search__input" id="search-input-header" placeholder="Type to Search" tabindex="-1" data-search-header="input">
</div>
<button class="search__submit" type="submit" tabindex="-1" aria-label="Click to Search" data-search-header="submit">
<span class="search__submit-text">Search</span>
<span class="search__submit-icon"><svg xmlns="http://www.w3.org/2000/svg" width="23" height="24" viewBox="0 0 23 24" tabindex="-1" aria-hidden="true">
<path data-name="Search Icon" d="M21.568 24l-7.348-7.344a9.218 9.218 0 111.54-1.325L23 22.569 21.569 24zM9.116 2.025a7.087 7.087 0 107.091 7.087 7.1 7.1 0 00-7.091-7.087z" fill="#fff"></path>
</svg>
</span>
</button>
</form>
<form>
<h1 class="vjs-social-title">Share: </h1>
<h2 class="vjs-social-description"></h2>
<div class="vjs-social-share-links">
<a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&title=" class="vjs-social-share-link vjs-icon-facebook" aria-role="link" aria-label="Share on Facebook" title="Facebook" target="_blank">
<span class="vjs-control-text">Facebook</span>
</a>
<a href="https://plus.google.com/share?url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F" class="vjs-social-share-link vjs-icon-gplus" aria-role="link" aria-label="Share on Google+" title="Google+" target="_blank">
<span class="vjs-control-text">Google+</span>
</a>
<a href="https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&title=&summary=undefined&source=Classic" class="vjs-social-share-link vjs-icon-linkedin" aria-role="link" aria-label="Share on LinkedIn" title="LinkedIn" target="_blank" rel="nofollow">
<span class="vjs-control-text">LinkedIn</span>
</a>
<a href="https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&media=&description=&is_video=true" class="vjs-social-share-link vjs-icon-pinterest" aria-role="link" aria-label="Share on Pinterest" title="Pinterest" target="_blank">
<span class="vjs-control-text">Pinterest</span>
</a>
<a href="https://www.tumblr.com/share?v=3&u=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F&t=" class="vjs-social-share-link vjs-icon-tumblr" aria-role="link" aria-label="Share on Tumblr" title="Tumblr" target="_blank">
<span class="vjs-control-text">Tumblr</span>
</a>
<a href="https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fabout.twitter.com%2Fresources%2Fbuttons&text=&tw_p=tweetbutton&url=https%3A%2F%2Fnypost.com%2F2021%2F12%2F20%2Fwhy-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades%2F" class="vjs-social-share-link vjs-icon-twitter" aria-role="link" aria-label="Share on Twitter" title="Twitter" target="_blank">
<span class="vjs-control-text">Twitter</span>
</a>
</div><label class="vjs-social-direct-link" aria-label="Read Only: Direct Link To Content"><span class="vjs-social-label-text">Direct Link</span><input type="text" readonly="true" value=""></label><label class="vjs-social-embed-code"
aria-label="Read Only: Embed Code"><span class="vjs-social-label-text">Embed Code</span><input type="text" readonly="true" value=""></label>
</form>
POST /2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/
<form action="/2021/12/20/why-is-the-log4j-cybersecurity-flaw-the-most-serious-in-decades/" method="post">
<label for="target_email">Send to Email Address</label>
<input type="email" name="target_email" id="target_email" value="">
<label for="source_name">Your Name</label>
<input type="text" name="source_name" id="source_name" value="">
<label for="source_email">Your Email Address</label>
<input type="email" name="source_email" id="source_email" value="">
<input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
<div id="g-recaptcha"></div>
<img style="float: right; display: none" class="loading" src="https://nypost.com/wp-content/mu-plugins/jetpack-9.8/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
<input type="submit" value="Send Email" class="sharing_send">
<a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
<div class="errors errors-1" style="display: none;">There was an error with the form</div>
<div class="errors errors-2" style="display: none;">Incorrect reCAPTCHA, please try again.</div>
<div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>
Text Content
Primary Menu Sections Search Search Skip to search results * News * Metro * Page Six * Sports * Post Sports+ * Business * Opinion * Entertainment * Fashion * Shopping * Living * Media * Tech * Real Estate * Video * Photos * Visual Stories * Sub Menu 1 * Covers * Columnists * Horoscopes * Sports Odds * Podcasts * Careers * Sub menu 2 * Email Newsletters * Official Store * Home Delivery * Tips Log In Search Email New York Post New! Sports Plus! Try it free December 22, 2021 Search Search Tech * Facebook * Twitter * Flipboard * WhatsApp * Email * Copy * WHY IS THE LOG4J CYBERSECURITY FLAW THE ‘MOST SERIOUS’ IN DECADES? By Theo Wayt SOCIAL LINKS FOR THEO WAYT * View Author Archive * Get author RSS feed Thanks for contacting us. We've received your submission. Back to Reading December 20, 2021 5:28pm Updated December 20, 2021 5:50pm Intruders leverage Log4j flaw to breach Belgian Defense Department Parts of the Belgian Defense Ministry’s computer networks have been down since Thursday after a cyber incident in which attackers exploited the Apache Log4j vulnerability, government officials said. Video Player is loading. Play Video Pause Unmute Current Time 0:27 / Duration 1:19 Loaded: 100.00% 0:27 Stream Type LIVE Seek to live, currently behind liveLIVE Remaining Time -0:52 Share 1x Playback Rate Chapters * Chapters Descriptions * descriptions off, selected Captions * captions settings, opens captions settings dialog * captions off, selected Audio Track * en (Main), selected Picture-in-PictureFullscreen This is a modal window. Beginning of dialog window. Escape will cancel and close the window. TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque Font Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall Caps Reset restore all settings to the default valuesDone Close Modal Dialog End of dialog window. Close Modal Dialog This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. SHARE: Facebook Google+ LinkedIn Pinterest Tumblr Twitter Direct LinkEmbed Code Close Modal Dialog MORE ON: HACKING * SATELLITE PHOTOS REVEAL WORRYING ANTENNAS IN SOUTH CHINA SEA * GOOGLE WARNS OVER 1M DEVICES HAVE BEEN INFECTED IN ‘RUSSIAN HACK’ * DATA HACKED FOR 400,000 PLANNED PARENTHOOD PATIENTS * ARE YOU LAZY WITH IPHONE OR GMAIL SECURITY? QUARTER OF ADULTS ‘VICTIM OF HACKERS’ A newly discovered cybersecurity flaw is affecting vast swaths the internet from Google and Amazon to the systems used to run militaries and hospitals, with US Homeland Security’s top cybersecurity official calling it the most serious vulnerability in decades. The flaw is present within a popular piece of software called Log4j, which is part of the ubiquitous programming language Java. Log4j is used by millions of websites and apps — and the software’s flaw potentially allows hackers to take control of systems by typing a simple line of code, according to cybersecurity experts. “The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency, said Thursday on CNBC. Most hacking attempts using Log4j so far have involved attackers trying to install cryptocurrency “mining” software on victims’ computers. However, an Iranian hacking group called “Charming Kitten” has also tried to use the vulnerability to breach government agencies and businesses in Israel, according to the cybersecurity company Check Point. “The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency, said. Getty Images The Log4j flaw is more serious than other cybersecurity flaws because of its “ubiquity, simplicity and complexity,” according to Easterly. “It is a piece of software, open source, that’s in millions of devices from video games to hospital equipment to industrial control systems to cloud services,” the cybersecurity official said. “It is trivial to exploit,” she added. “And it takes a very focused effort to be able to find and to fix the vulnerability.” While there’s little that individual internet users can do to protect themselves, government agencies and tech companies alike are scrambling to fix the vulnerability. The Cybersecurity and Infrastructure Security Agency published an emergency directive on Friday urging all government agencies to immediately “patch” computer systems to address the Log4j flaw. Google, meanwhile, has more than 500 engineers combing through the company’s code to make sure it’s safe, the Washington Post reported. Government agencies are scrambling to address the vulnerability.AP Asaf Ashkenazi, chief operating officer of security company Verimatrix, told the paper that coders across tech companies have been clocking excessive hours since the Log4j issue was first made public on Dec. 9. “Some of the people didn’t see sleep for a long time, or they sleep like three hours, four hours and wake back up,” Ashkenazi told the Washington Post. “We were working around-the-clock. It’s a nightmare since it was out. It’s still a nightmare.” Even the Microsoft-owned online video game Minecraft has been affected. Some hackers were apparently able to breach victims by typing a single line of code into the game’s chat box, according to Wired. Microsoft says it has since fixed the issue and is urging players to update their Minecraft software. On Monday, Belgium’s defense ministry was forced to shut down parts of its computer network after hackers triggered the Log4j vulnerability, the Wall Street Journal reported. The ministry did not provide details on the breach. Most hacking attempts have reportedly involved attackers trying to install cryptocurrency mining software on victims’ computers. Getty Images SHARE THIS ARTICLE: * Facebook * Twitter * Flipboard * WhatsApp * Email * Copy * Filed under * amazon * cryptocurrency * cybersecurity * google * hackers * hacking * 12/20/21 Read Next Meta investors push for harder line against 'harmful conte... Skip Ads by TRENDING NOW ON NYPOST.COM * This story has been shared 95,103 times. 95,103 CHRIS NOTH AND WIFE TARA WILSON’S MARRIAGE IS ‘HANGING BY A THREAD’ * This story has been shared 89,135 times. 89,135 EX-PATRIOT DESTROYS MAC JONES: 'KEEP YOUR MOUTH SHUT' * This story has been shared 72,956 times. 72,956 TOURIST STUNNED AFTER NYC HOTEL ROOM WINDOW OPENS INTO TIMES SQUARE RESTAURANT NOW ON PAGE SIX * DETAILS ON ‘BACHELORETTE’ MICHELLE YOUNG’S ENGAGEMENT RING FROM NATE OLUKOYA * ‘BACHELORETTE’ MICHELLE YOUNG AND NAYTE OLUKOYA GIFTED $200K FOR FIRST HOME * LEONARDO DICAPRIO’S OLD NYC BACHELOR PAD PRICE CHOPPED TO $7.5M See All VIDEO * BRITNEY SPEARS' MOST MONUMENTAL MOMENTS OF 2021 NOW ON DECIDER * ‘WHEEL OF FORTUNE’ FANS RAGE OVER TECHNICALITY THAT LOST CONTESTANT AN AUDI: “SHE GOT SCREWED!” See All WHAT TO SHOP * THE 50 BEST NEW YEAR'S RESOLUTION IDEAS FOR 2022 AND HOW TO ACHIEVE THEM * SHOP KATE SPADE SALE STYLES WITH AN EXTRA 40% OFF NOW * 42 BEST E-GIFT CARDS YOU CAN BUY ONLINE FOR EASY, LAST-MINUTE HOLIDAY GIFTS * THE 15 BEST PAJAMAS FOR WOMEN IN 2021 THAT YOU'LL NEVER WANT TO TAKE OFF * THE 63 BEST HOLIDAY GIFTS YOUR WIFE WILL LOVE, FROM BOOTS TO PERFUME SHARE THIS ARTICLE Share Selection * Share selection to Facebook * Share selection to Twitter MORE STORIES PAGE SIX CHRIS NOTH AND WIFE TARA WILSON’S MARRIAGE IS ‘HANGING BY A THREAD’ NYPOST EX-PATRIOT DESTROYS MAC JONES: 'KEEP YOUR MOUTH SHUT' * Facebook * Twitter * Instagram * LinkedIn * Email * YouTube * Sections & Features * News * Metro * Sports * Business * Opinion * Entertainment * Fashion * Shopping * Living * Media * Tech * Real Estate * Video * Photos * Visual Stories * Alexa * Covers * Horoscopes * Sports Odds * Podcasts * Columnists * Classifieds * Post Sports+ * Subscribe * Articles * Manage * Newsletters & Feeds * Email Newsletters * RSS Feeds * NY Post Official Store * Home Delivery * Subscribe * Manage Subscription * Delivery Help * Help/Support * About New York Post * Customer Service * App FAQ & Help * Community Guidelines * Contact Us * Tips * Newsroom * Letters to the Editor * Reprints * Careers * Apps * iPhone App * iPad App * Android Phone * Android Tablet * Advertise * Media Kit * Contact © 2021 NYP Holdings, Inc. All Rights Reserved Terms of Use Membership Terms Privacy Notice Your Ad Choices Sitemap Your California Privacy Rights Do Not Sell My Personal Information SHARE LINK click to copy Send to Email Address Your Name Your Email Address Cancel There was an error with the form Incorrect reCAPTCHA, please try again. Sorry, your blog cannot share posts by email.