Skip to main content
News

Cyber News Rundown: Global reverberations from new Apache Log4j vulnerability

Cyber News Rundown: Global reverberations from new Apache Log4j vulnerability
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

Webroot and BrightCloud product and services are unaffected by the Log4j vulnerability. For more information on all OpenText products, please see this advisory

https://www.opentext.com/support/log4j-remote-code-execution-advisory

Companies released lists of products affected by a newly discovered vulnerability found in the Apache Log4j library that’s already identified on billions of systems around the globe. In other cyber security news, Volvo suffered a security incident affecting their computer systems that may have also caused a breach of sensitive company information.

Hundreds of financial institutions hit by Anubis malware

The Anubis Android malware that has plagued the Google Play store for several years has resurfaced to again target financial apps for their login credentials. While it is still unclear which group is operating this recent Anubis campaign, many different groups have used it in the past. It is believed that this latest campaign is still in its early stages and is being lightly distributed as a testing phase to ready it for a full release.

Superior Plus gas supplier suffers ransomware attack

A global supplier of natural gas named Superior Plus discovered unauthorized access to their internal systems and took many of them offline to avoid additional damage. It remains unclear who orchestrated the attack. Currently, officials are working with industry experts to determine the damage and ascertain if any sensitive information was compromised. This Superior Plus attack fits into the pattern of attacks that focus on critical infrastructure, as they tend to have unpatched older systems that lack updated security.

Hackers infiltrate Volvo’s systems

Volvo suffered a security incident that affected their computer systems and may have stolen sensitive company information. While officials haven’t released much more information on the attack itself, they say that there are no signs that any customer information was compromised during the unauthorized access of a file repository. It remains unclear which of Volvo’s global locations have been impacted.

Log4j vulnerability has global consequences

On Thursday of last week, researchers began noticing a major vulnerability in the Apache Log4j library that has been exploited by a variety of ransomware groups and other cybercriminals. This vulnerability in the logging service has been identified on millions of systems around the world. It allows attackers to perform remote code execution within a variety of applications without authentication. Dozens of companies have since released lists of their products that are affected by this vulnerability. They’ve also informed users if they have any workarounds or have pushed out patches that resolve the issue.

Over 750,000 patients exposed in Oregon medical group breach

Following a July ransomware attack, the Oregon Anesthesiology Group (OAG) suffered a data breach that could affect close to 750,000 former and current patients and employees. Officials for OAG only learned of the data breach in October, when the FBI contacted them regarding sensitive OAG data found on seized files from the HelloKitty ransomware group. The medical group have since updated their systems to resolve the vulnerabilities that were exploited during the initial July attack and have begun contacting the affected patients.

Did this help you find an answer to your question?

36 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 9018 replies
  • December 24, 2021

Glad to see that none of OpenText products are affected.


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • December 24, 2021

Apache Log4j is very far reaching. Reading this article makes it clear just how many systems can and have been impacted.


Sander G.
New Voice
  • 22 replies
  • December 24, 2021

Don’t let the bad guys have a happy Christmas. Stay safe and patch!


MajorHavoc
Bronze VIP
Forum|alt.badge.img+25
  • Bronze VIP
  • 1278 replies
  • December 24, 2021

As always, thank you for this depressing news. :-)


  • New Voice
  • 17 replies
  • December 24, 2021

Used a RMM tool for scanning every system. Now its time for a quit vacation.


Robis
New Member
Forum|alt.badge.img+1
  • New Member
  • 74 replies
  • December 24, 2021

Very interesting news.


Forum|alt.badge.img+1
  • New Member
  • 16 replies
  • December 24, 2021

Busy time working through various systems to see whats affected. Thankfully it’s not too bad but still making sure customers know we are working on the fix.

 

Merry Xmas!


Forum|alt.badge.img+1
  • New Voice
  • 40 replies
  • December 24, 2021

Thanks for providing a comprehensive and very informative summary of the global impact.  It’s reassuring that Webroot products are not impacted by sloppy practices.


Forum|alt.badge.img+8
  • New Voice
  • 209 replies
  • December 24, 2021

Great Article but very worrying times.


Forum|alt.badge.img+5
  • Popular Voice
  • 36 replies
  • December 24, 2021

Vulnerabilities, breaches, ransomware. The news stays the same but those involved change by the week. Thankfully, Webroot is not one of them.


Forum|alt.badge.img+1
  • New Voice
  • 86 replies
  • December 24, 2021

This vulnerability has surely woken up some of our customers.


AsadP
New Voice
Forum|alt.badge.img+1
  • New Voice
  • 56 replies
  • December 24, 2021

Great write-up, definitely a vulnerability that is not kind.

Ensure to mitigate the issue by updating your Log4j

 

https://logging.apache.org/log4j/2.x/security.html


  • New Voice
  • 21 replies
  • December 24, 2021

Thanks for spreading knowledge.

Bottom line is to become security centric, train and implement all security layers


  • New Member
  • 2 replies
  • December 24, 2021

Very interesting read, it doesnt matter how big or small you are you need to keep on top of your security.


Forum|alt.badge.img+4
  • New Voice
  • 56 replies
  • December 24, 2021

Is Blackpoint Cyber also included on the mitigation / no risk list? I did not see it in the threat matrix. While not an OpenText product, because of their integration into the Webroot line their vulnerability status should be noted and reported.


  • New Voice
  • 14 replies
  • December 24, 2021

Been a rough time for Software Devs!


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

I have been following this closely in the Security News forum and it is very far reaching but it is good to see that Webroot products are not affected by it.


Rondolino Cellamare
New Voice

Having timely information is essential. Thanks, keep it up 


  • Fresh Face
  • 2 replies
  • December 25, 2021

This has ruined one of our engineers Christmas who has now had to cancel his leave to get this sorted for multiple systems of our biggest customer.

how Broadcom can be so blasé about this is unreal


Forum|alt.badge.img+1
  • Fresh Face
  • 3 replies
  • December 26, 2021

This is a nightmare security wise, but I’m glad to hear that Webroot applications are not affected.


Forum|alt.badge.img+4
  • New Voice
  • 14 replies
  • December 27, 2021

Kudos to the log4j development team for giving up their personal time to fix something that wasn’t actually broken.  Hope they recover soon.

Also would be nice to see corps start to kick a few bucks towards those OSS projects they take advantage of.


  • New Member
  • 16 replies
  • December 28, 2021

thanks for all the info. we must always remember to patch up our software


  • New Voice
  • 22 replies
  • December 28, 2021

I am thankful that your products are not affected!  Appreciate you keeping us well informed.


  • New Voice
  • 6 replies
  • December 29, 2021

It’s amazing how many products are using Apache Log4j, and we’ve had to work for our customers to ensure anything they are using with this vulnerability is fixed asap.


clutka
New Member
  • New Member
  • 10 replies
  • December 29, 2021

It’s nice to know that with all these vulnerabilities, I can keep my endpoints protected with my Webroot subscription.