Are you at risk from the security vulnerability found in the Java-based Apache Log4j logging feature?

ronnie 27.12.2021

At the beginning of December, a security hole was discovered in the Java-based Log4j logging feature, affecting millions of businesses, government agencies, and cloud services using this popular Apache library. Many cybersecurity experts assess the vulnerability, named Log4Shell, as one of the most critical vulnerabilities of the decade.

According to our lead consultant Ronnie Jaanhold this is a critical vulnerability that can be used to do a lot of harm. “It’s as if you were sitting in an anthill wearing a wetsuit, unaware that you actually have several tiny holes in your wetsuit. You think you’re protected and as long as the ants haven’t found a hole, you’re fine.  But as soon as one ant discovers one of the holes and communicates it to the others, they start crawling in one after the other,” he explains.

 

Global impact

To date, Google, Amazon, LinkedIn, Apple, Tesla, Twitter, and many other well-known enterprises have suffered damage because of the Log4Shell security vulnerability. According to Microsoft, cybercriminals are using Log4Shell for malicious crypto mining, identity, and bank detail theft, as well as ransomware installation.

Who is affected by the vulnerability?

All Java-based services using Apache Log4j 2 versions 2.0 to 2.14.1 are affected. Log4j 2 has been integrated into many popular frameworks, including Apache Struts 2, Solr, Druid, Flink and Swift, Tomcat.

Log4j is used by almost all the Internet services or applications we are familiar with, such as Twitter, Amazon, Microsoft and many others. Its GitHub project has 400,000 downloads.

Prompt response is required

“Nobody foresaw such a security hole. Prompt response is all the more important now. All companies and institutions whose systems are affected should be engaged in mapping and patching the vulnerability. Denying the risk could lead to the worst-case scenario, i.e. a sudden shutdown of business activity.

Through this hole, access could be gained to your corporate infrastructure. From there on, it’s a piece of cake for an attacker, business as usual – encryption, ransomware, erasing data, and so on,” explains Jaanhold.

Computer and communication networks are as vulnerable as human immune systems

There are probably a lot of similar security holes we do not know about. It is essential that people responsible for your company’s digital channels know what software is being used, appropriate prevention, detection, and protection measures are in place and a plan has been prepared for responding to vulnerabilities and attacks detected. In many cases, a company might opt to use a vulnerability scanner to keep a track of “live” vulnerabilities, as not all of them can be patched.

Should your company lack adequate competence in this field, you can use a service partner that can draw attention to and prioritize cyber security issues. “The question is not whether an attack will come but when, how well the defense has been arranged, and how prepared the company is to respond,” Jaanhold points out. “Our team has helped to analyze the situation on this issue and develop the most appropriate and cost-effective plan in several companies.”

Steps for Log4Shell countermeasures

  • The first step is to check whether the e-services or digital products of your company or institution use the Java-based Log4j logging feature.
  • You should also map all external devices that have Log4j 2 installed.
  • The next step is to upgrade the software, either in-house or with the help of a service provider.
  • If patching is not possible – consider using virtual patching.
  • Many information security solution providers like Tenable, Crowdstrike, Vectra, and others have created additional functionalities for detecting this vulnerability and the cyber-attacks exploiting it.

Share

Related service

Read more
Related service

Emergency Security Incident Response (SOS)

This unique service will help you resolve the toughest cyber attacks with optimal results and help you make sure that this doesn’t happen again.

Read more

Latest blog posts

31.07.2025

Cyber turbulence: why airlines must take cybersecurity as seriously as air safety

The aviation industry is facing an escalating wave of cyber threats that go far beyond flight delays or data leaks. Airlines are now prime targets in modern cyber warfare—critical infrastructure vulnerable to sabotage, espionage, and geopolitical disruption. The July 2025 cyberattack on Aeroflot, which destroyed 7,000 servers and halted dozens of flights, is a stark warning of what’s to come. As digital systems control everything from aircraft operations to passenger data, this article explores why the skies are no longer safe from cyber conflict—and what the industry must do to defend itself.

Keep reading
23.07.2025

Building confidence, not just compliance: how Axinom validated their web application security

In high-trust industries, security is more than a checkbox—it’s a competitive advantage. Learn how Axinom validated the resilience of their DRM platform with NEVERHACK’s Offensive Security team, using deep manual testing to uncover what automation misses. A case study in turning compliance into confidence.

Keep reading
21.01.2025

Cybersecurity in 2025: Challenges and Strategies

Cybersecurity has become a crucial part of business strategy, determining organizations’ ability to protect their digital assets and continue operations during crises. The economic impact of cyberattacks is estimated to reach 1.5% of the global GDP, making 2025 a year of significant challenges and the need for continuous development in defense strategies. This is especially […]

Keep reading