U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far

U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far

By Joseph Menn

SAN FRANCISCO (Reuters) - The U.S. agency charged with defending the country against hacking said on Tuesday the majority of attacks it has seen using a recently disclosed flaw in widely used open-source software were minor, with many of them seeking to hijack computing power to mine cryptocurrency.

Our top trading bots

Officials at the Cybersecurity and Infrastructure Security Agency said they had not confirmed reports by multiple security companies of ransomware installations or attempts by other governments to steal secrets.

“We are not seeing widespread, highly sophisticated intrusion campaigns,” Eric Goldstein, executive assistant director for cybersecurity at CISA, said in a call with reporters.

But he warned the threat would continue to evolve and the agency was still working to assemble reliable information on what types of software were subject to the attacks.

He said it was possible widespread consumer devices such as routers were vulnerable and his unit within the Department of Homeland Security was working with vendors to have them deploy fixes where needed.

The flaw was found in a common logging tool, known as Log4j, and it is carried forward by at least hundreds of other programs that rely on the tool. Goldstein said the flaw is easy to exploit.

Although a patch in the tool has been available since Dec. 6, many of those other programs also have to implement the patch to ensure an attacker cannot get deep network access.

Under recently granted powers, CISA has directed all federal agencies to install patches as they become available.

Goldstein said there have been no reports of intrusions using the vulnerability in the government, but CISA expects “all manner of adversaries” to seek to exploit the flaw.

The logging function allows users to submit live code referring to an outside repository, which the program will then seek out and install. Hackers can use that to take control of the servers, which may have access to other machines with more valuable data or network powers.

Though the flaw has existed in the free Log4j program for years, it was recently discovered by a researcher at Chinese tech company Alibaba (NYSE:BABA) and reported to the group of volunteers who maintain the program. Open discussion within the Chinese security company was detected and some exploitation of the flaw began before the Apache (NASDAQ:APA) Software Foundation could issue the patch.

Goldstein said it was “concerning” any time a flaw is exploited before a patch is out. Under recent Chinese regulations, some security professionals must report their findings to the government quickly, often before patches are ready.

Read on concerning Reuters
Biden to sign executive order on crypto, authorize all-government effort to consolidate regulation
Later today, U.S. President Joe Biden will sign a long-anticipated executive order on digital assets. Despite fears that the order may resound a regulatory...
Chinese police busts illegal crypto mining farm, seizes 190 miners
The Guangdong province’s Development and Reform Commission has reportedly busted an illegal crypto mining farm secretly operating in an electric vehicle...
Payment services provider Shift4 acquires The Giving Block for $54 million
According to an investor presentation published Tuesday, U.S.-based payment solutions provider Shift4 announced its acquisition of The Giving Block in cash...
Crypto and NFTs meet regulation as Turkey takes on the digital future
In her monthly Expert Take column, Selva Ozelli, an international tax attorney and CPA, covers the intersection between emerging technologies and sustainability,...
Indian state government to accredit Web2 and Web3 blockchain startups
The state government of Telangana announced the launch of the India Blockchain Accelerator program to foster early-stage Web2 and Web3 startups and blockchain...
What is Mimblewimble and how does it work?
What is Mimblewimble? Mimblewimble is a privacy-oriented decentralized protocol that uses a novel way of structuring and storing transactions on the blockchain....
Nigerian president to unveil eNaira central bank digital currency
Nigerian President Muhammadu Buhari is set to officially introduce the country’s central bank digital currency (CBDC), the eNaira.The Central Bank of Nigeria...
Bulls and bears fight over $34K Bitcoin price as $445M options expiry looms
Bitcoin (BTC) has been ranging from $30,400 to 36,400 for the last 12 days, and it has been difficult to pinpoint the exact reason for investors’ lack of...
Bitcoin Slump Stokes Fears of 'Mass Capitulation,' But Hodlers Stand Firm
By Yasin EbrahimInvesting.com – Bitcoin slumped Tuesday, and some warn a breach below $30,000 could trigger “mass capitulation” as negative noise is poised...
A $1 billion crypto fund could be on its way from Andreessen Horowitz
Building on its previous crypto involvement, VC firm Andreessen Horowitz is now reportedly gathering thunder for another fund, according to an article from...
Major Thai bank experimenting with decentralized finance
Kasikornbank, or KBank, one of Thailand’s largest banks, has begun experimenting with DeFi services as part of its business expansion plan.According to...
Cryptos Bring Money-Laundering To a New Level
Where money is, there is always a crime related to it. It has eternally been used by malicious individuals for various illicit purposes including terrorism...
First BTC Lightning Mainnet Release Occurred With Devs' Net $2.5 Million
This week, the Lightning Labs team of developers has presented what is believed to be the first Lightning Network fruition, ready for the main network....
The US Judge Defines Cryptos As Commodities, Backing Up CFTC Decision
One of the US rulers has finally explained what cyber money is. Neither are they fiat, nor assets, following the decision of the American, New York region,...
How Governments Treat ICO: 5 Common Positions
What authorities in different countries think about the boom of initial placements of tokens. At different times governments around the world haunted...