Hackers have used the discovery of the largest critical vulnerability in Internet history to launch massive attacks on the servers of businesses and organizations around the world. Tesla, Microsoft, Apple, Twitter, or even the game Minecraft are among the victims.
It has been dubbed “Log4Shell” and, in the opinion of experts, is the worst bug in the history of the Internet. This has been a critical zero day vulnerability at the end of last month in the library Log4j Java by a member of the Alibaba security team. But only for two days the planet is disturbed by this dosha. Government center to monitor, alert and respond since last night (Certified France), That it is currently widely used by hackers to remotely execute code and carry out attacks. The organization called it a 10/10 inch . given a score of Dangerous. And for good reason! This defect affects almost everyone java operator!
Hardly any high-tech giant has been spared, and the same is the case with many government sites and services across the planet. So, as an example, Tesla, Apache was quickly established by the Foundation, but the damage has already been done as hackers have already taken the opportunity to launch massive attacks. Time to implement this update everywhere will give them a good chance to execute their misdeeds.MILF game store steam, minecraft game, And even security experts Cloudflare are impressed. One
easy to exploit
Simply put, the flaw seems impressive in its simplicity. The attacker only needs to enter a few instructions to break into the target computer. It is enough that the address of a web page containing malicious code To execute this code must be entered instead of an email address on a login page, for example Twitter. From this point, the hacker can take control of the server by installing , Similarly, adding this malicious code to Minecraft chat is a vector ,
With malware, the attacker can easily access the computer remotely and collect its data, using it to perform malicious activities. … According to some experts, this major flaw also suggests that the software They are now easy targets of attacks because they are heavily used on infrastructure.
Thus, hundreds of different open source components are used on the server. It turns out that some people have severe vulnerabilities for many years without noticing. Therefore it remains difficult to secure the entire architecture driven by this software.