Arkansas Democrat-Gazette

Cybersecur­ity profession­als race to patch software flaw

- FRANK BAJAK

BOSTON — Security pros say it’s one of the worst computer vulnerabil­ities they’ve ever seen. Firms including Microsoft say state-backed Chinese and Iranian hackers and rogue cryptocurr­ency miners have already seized on it.

The Department of Homeland Security has sounded a dire alarm, ordering federal agencies to urgently find and patch bug instances because it’s so easily exploitabl­e — and telling those with public-facing networks to put up firewalls if they can’t be sure. A small piece of code, the affected software is often undocument­ed.

Lodged in an extensivel­y used utility called Log4j, the flaw lets internet-based attackers easily seize control of everything from industrial control systems to web servers and consumer electronic­s.

Simply identifyin­g which systems use the utility is a challenge. It is often hidden under layers of other software.

The top U.S. cybersecur­ity defense official, Jen Easterly, deemed the flaw “one of the most serious I’ve seen in my entire career, if not the most serious” in a call Monday with state and local officials and partners in the private sector. Publicly disclosed last Thursday, it’s catnip for cybercrimi­nals and digital spies because it allows easy, password-free entry.

The Cybersecur­ity and Infrastruc­ture Security Agency, which Easterly runs, put up a resource page Tuesday to deal with the flaw, which it says is present in hundreds of millions of devices. Other heavily computeriz­ed countries were taking it just as seriously, with Germany activating its national informatio­n technology crisis center.

A wide swath of critical industries, including electric power, water, food and beverage, manufactur­ing and transporta­tion, were exposed, said Dragos, a top cybersecur­ity firm.

“I think we won’t see a single major software vendor in the world — at least on the industrial side — not have a problem with this,” said Sergio Caltagiron­e, the company’s vice president of threat intelligen­ce.

Eric Goldstein, who heads the security agency’s cybersecur­ity division, said no federal agencies were known to have been compromise­d. But these are early days.

“What we have here is a extremely widespread, easy-to-exploit and potentiall­y highly damaging vulnerabil­ity that certainly could be utilized by adversarie­s to cause real harm,” he said.

The affected software, written in the Java programmin­g language, logs user activity.

Developed and maintained by a handful of volunteers under the auspices of the opensource Apache Software Foundation, it is highly popular with commercial software developers. It runs across many platforms — Windows, Linux, Apple’s macOS — powering everything from webcams to car navigation systems and medical devices, according to the security firm Bitdefende­r.

Goldstein told reporters in a Tuesday call that the security agency would be updating an inventory of patched software as fixes become available.

“We expect remediatio­n will take some time,” he said.

Apache Software Foundation said the Chinese tech giant Alibaba notified it of the flaw Nov. 24. It took two weeks to develop and release a fix.

Beyond patching, computer security pros have an even more daunting challenge: trying to detect whether the vulnerabil­ity was exploited — whether a network or device was hacked. That will mean weeks of active monitoring. A frantic weekend of trying to identify — and slam shut — open doors before hackers exploited them now shifts to a marathon.

Newspapers in English

Newspapers from United States