By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: No immediate, mass exploits but Log4Shell threat to remain for years: Sophos
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > No immediate, mass exploits but Log4Shell threat to remain for years: Sophos
CybersecurityEnterpriseSoftware

No immediate, mass exploits but Log4Shell threat to remain for years: Sophos

Alfred Siew
Last updated: February 10, 2022 at 6:16 PM
Alfred Siew
Published: February 10, 2022
3 Min Read
PHOTO: Pexels

The Log4JShell bug that hit various online services in December has not resulted in immediate crisis, according to cybersecurity firm Sophos, which also warned that the vulnerability remains embedded in many applications and products, making them a target for exploitation for years to come.

From late December to January 2022, attack attempts flattened out and declined, the company found from analysis of customer data, but cyber attackers appear to be still scanning for vulnerabilities in many organisations.

The bug stems from the Log4J software commonly used by a myriad of online services to log events that are happening on software applications and the servers that run them.

In a report today, Sophos’ principal research scientist Chester Wisniewski said the number of successful attacks making use of the vulnerability has been lower than expected.

One reason was the severity of the bug, which united the digital and security communities and galvanised people into action, he added.

“As soon as details of the Log4Shell bug became clear, the world’s biggest and most important cloud services, software packages and enterprises took action to steer away from the iceberg, supported by shared threat intelligence and practical guidance from the security community,” he noted.

Another factor, he explained, was the need to customise the attack to each application that is using the vulnerable code. This meant cyber attackers, some of whom were crypto-miners, had to spend time to tweak their malicious code.

However, this does not mean that the threat is over. On the contrary, it is expected to be a long-term issue, given the widespread use of Log4J and the difficulty in patching or updating all the systems affected.

Some attackers may already have managed to access victims’ servers and set up malware to keep a backdoor open, even as the victims rushed to close the initial loophole, said Wisniewski.

These backdoors are not be utilised until possibly months later, when the hackers wish to mount a larger attack, he noted, adding that this would be consistent with other vulnerabilities that hackers had seized on previously.

Q&A: Aled Tien, lead for APAC telecom vertical market, Motorola Solutions
MobileIron Cloud debuts in Singapore
Singaporeans among most frequent gamers: Limelight study
$143 MS Office 2007 – is it really a discount?
Emotet malware an emerging threat to Singapore organisations: Ensign
TAGGED:ApacheChester WisniewskiJavaLog4JLog4ShellSophos

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Samsung’s Galaxy S22 Ultra is a noteworthy replacement for a one-time sleeper hit
Next Article Time to use a tablet, as new ones like Galaxy Tab S8 Ultra get bigger screens than laptops?
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Southeast Asia organisations to pick up on agentic AI in 2026: IDC study
Enterprise
August 15, 2025
Fujfilm X-E5 review: Serious image quality with fun film simulation
Imaging
August 14, 2025
AI-powered tool from Elastic promises smarter threat detection for cybersecurity ops
Cybersecurity Enterprise Software
August 14, 2025
How Simba can buy over larger rival M1 and what it means for Singapore telcos
Mobile Telecom
August 13, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?