{"id":34871,"date":"2021-12-21T15:39:16","date_gmt":"2021-12-21T21:39:16","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=34871"},"modified":"2021-12-21T15:39:16","modified_gmt":"2021-12-21T21:39:16","slug":"stealing-the-most-fundamental","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2021\/12\/21\/stealing-the-most-fundamental\/","title":{"rendered":"Stealing The Most Fundamental"},"content":{"rendered":"<p>It&#8217;s rather like having a thief steal years off your life.<\/p>\n<blockquote><p>On December 9th, an acute remote code execution (RCE) vulnerability was reported in the Apache logging package Log4j 2 versions 2.14.1 and below (CVE-2021-44228).<\/p>\n<p>Apache Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project. It used by a vast number of companies worldwide, enabling logging in a wide set of popular applications.<\/p>\n<p>Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks.<\/p>\n<p>The Log4j library is embedded in almost every Internet service or application we are familiar with, including Twitter, Amazon, Microsoft, Minecraft and more.<\/p>\n<p><strong>At present most of the attacks focus on the use of a cryptocurrency mining at the expense of the victims<\/strong>, however under the auspices of the noise more advanced attackers may act aggressively against quality targets.<em> [<a href=\"https:\/\/blog.checkpoint.com\/2021\/12\/11\/protecting-against-cve-2021-44228-apache-log4j2-versions-2-14-1\/\" target=\"_blank\" rel=\"noopener\"><strong>Check Point Blog<\/strong><\/a>]<\/em><\/p><\/blockquote>\n<h6><strong>[Bold mine]<\/strong><\/h6>\n<p>Stealing CPU cycles to mine for the tokens specific to crypto &#8211; it reflects the greed associated with currency, at least to my mind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s rather like having a thief steal years off your life. On December 9th, an acute remote code execution (RCE) vulnerability was reported in the Apache logging package Log4j 2 versions 2.14.1 and below (CVE-2021-44228). Apache Log4j is the most popular java logging library with over 400,000 downloads from its \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2021\/12\/21\/stealing-the-most-fundamental\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-34871","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/34871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=34871"}],"version-history":[{"count":1,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/34871\/revisions"}],"predecessor-version":[{"id":34872,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/34871\/revisions\/34872"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=34871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=34871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=34871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}