• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

What to Know About the Log4J Java Bug for 2022

January 10, 2022 by Hector

Home » Blog » What to Know About the Log4J Java Bug for 2022

log4j-bug-log4shell-java-software-vulnerability-cve-ransomware

The Log4J bug that created vulnerabilities in millions of devices in December 2021 is still persistent in the new year, and will likely continue well past 2022 according to experts, with some predicting it could take years to address. Also known as Log4Shell, this exploit allows hackers to take advantage of a serious error in a logging tool used in Java programs that are embedded in some of the biggest technology brands, including Oracle, IBM and Amazon Web Services (AWS).

What is Log4J?

Apache Log4J 2 is the latest version of an open-source Java utility developed by the Apache Software Foundation, providing a logging framework that enables systems to record, track and otherwise manage errors and other events in their code. The vulnerability appeared in Log4J 2.14, with Apache releasing the updated 2.15 version 3 days before publicly announcing the zero-day exploit. However, subsequent bugs were found and as of this writing 2.17.1 is the latest version, containing several fixes to prevent intrusion.

The Log4J Bug & Log4Shell

Log4Shell was discovered and brought to Apache’s attention on November 24, 2021, by a security researcher at Alibaba Cloud, although it is believed to have existed since 2013. It was disclosed to the public at large December 8, 2021, preceding a chaotic scramble as enterprise vendors rushed to assess the risk to their systems and roll out stopgap fixes. Simultaneously, Microsoft’s security researchers noted a spike in hacker activity that could be traced back mostly to probing operations carried out across the malware ecosystem, although they also uncovered evidence of attempts made before even the public announcement.

The Widespread Risk of the Vulnerability

The Log4J bug has spawned multiple CVE (Common Vulnerabilities and Exposures) notices beyond even just the initial Log4Shell that potentially affect “hundreds of millions” of devices in widespread usage today. Since the exploit leverages a remote code execution (RCE), cloud services like AWS and Google Cloud are particularly vulnerable, with some experts claiming that up to 93% of all cloud-based environments being at risk. Other possibly impacted platforms include VMware, Microsoft Azure and RedHat.

what-is-log4j-java-bug-log4shell-2022

Cyber Attacks Using Log4J

Cybersecurity research and defense teams have seen multiple attacks in the wild attempting to leverage Log4J exploits since the news broke, including some firsthand as their clients were in the process of being hacked. According to Microsoft’s own security researchers, the majority of activity still revolves around scanning for vulnerable systems (which includes legitimate professionals checking internally for affected components), but some cybercriminals have already directly breached several systems with the zero-day. Attacks seen so far have included “cryptojacking” for cryptocurrency mining as well as botnet networks, two models that take control of a computer’s processing power for the hacker’s external usage.

Ransomware Ecosystem

The malware ecosystem quickly jumped on Log4Shell with ransomware gangs buying credentials and other data from access brokers who already breached vulnerable systems. Ransomware as a Service (RaaS) affiliates have been extra active around Log4J bugs, with a large-scale cryptocurrency platform hosted in Vietnam hacked and extorted for $5 million only a few days after it became public news. This attack in particular revealed deeper potential dangers tied to the Log4Shell vulnerability, as it also leveraged AWS misconfigurations seen in past breaches, reflecting how hackers can take advantage of multiple exploits.

Nation-state Hackers

Besides the typical cybercriminal syndicates, many nation-state hackers and gangs known to be tied to national cyber espionage groups (with all the overlap in-between) seem to be especially interested in the Log4J exploit. Several Chinese APTs (advanced persistent threats) as well as teams tracked out of Iran, North Korea and Turkey have been observed testing possible toolkits being developed to take advantage of the bug for future attacks. The real-world consequences of this may already be apparent, as the Belgian defense ministry was breached using a Log4J exploit.

FTC Crackdown

Exacerbating the impact of Log4Shell is a warning from the Federal Trade Commission (FTC) alerting companies regulated under the Gramm Leach Bliley Act and similar laws that they are expected to quickly apply fixes to the vulnerability, or face penalization for nonconformance. They specifically referred to the 2017 Equifax breach and subsequent $700 million settlement with the FTC as a very explicit example of the consequences of a breach, with promises from the agency to “use its full legal authority” against businesses that do not take the recommended steps to mitigate exposure.

Work with SWK to Protect Your Business from Log4J

The good news for clients of SWK Technologies is that our team has been painstakingly reviewing our deployed systems since the news came to our attention, and have worked to patch any vulnerable components in our portfolio. If you have questions about what to do about the rest of your technology stack or about handling Log4J in general, please reach out to us promptly to get in touch with one of our experts.

Contact SWK today to learn about how we keep your systems protected from threats like Log4J.

Reach out to the cybersecurity experts at SWK


Category: Blog, Cybersecurity

Sidebar

Recent Posts

  • How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
  • Why Financial Services Firms Need Phishing Defense
  • Acumatica General Ledger Training – Key Tips & Tricks
  • Sage Intacct vs. Sage 500: Best ERP for CFOs and Financial Leaders
  • What is the Relationship Between Cybersecurity and Cyber Insurance? 
  • Guide for Sage Intacct Credit Card Management
  • Minimize Tariff Impacts on Your Technology Costs in the Cloud

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Recreational Play Structure

How a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth

Read moreHow a Recreational Play Structure Builder Laid the Groundwork for Their Lasting Growth
Hands holding an open silver padlock over a laptop keyboard, symbolizing cybersecurity vulnerabilities that phishing attacks exploit in financial services firms

Why Financial Services Firms Need Phishing Defense

Read moreWhy Financial Services Firms Need Phishing Defense
Black laptop displaying Acumatica General Ledger journal transactions screen on a desk with coffee mug and notepad, showcasing the financial management interface on a computer in an office setting.

Acumatica General Ledger Training – Key Tips & Tricks

Read moreAcumatica General Ledger Training – Key Tips & Tricks

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand