San Francisco: Cyber ââsecurity researchers have discovered that changing the device name of an iPhone or Tesla in Settings reveals details of the remote server, indicating that the server on the other end is vulnerable to the most Internet bug. grave called “Log4Shell”.
During demonstrations, the researchers changed the names of the devices to a “string” that would send the servers to a test URL, reports The Verge.
“After the name change, inbound traffic showed URL requests from IP addresses owned by Apple and, in Tesla’s case, China Unicom, the company’s mobile services partner for the Chinese market.” , the report said on Monday evening.
The research team actually tricked Apple and Tesla servers to visit a URL of their choice. A Dutch security researcher demonstrated the details of the iPhone server.
“An attacker could host malicious code on the target URL in order to infect vulnerable servers, but a well-maintained network could prevent such a network-level attack,” the report notes.
Cyber ââsecurity researchers have warned that hackers make more than 100 attempts every minute to exploit a critical security vulnerability in the widely used Java logging system called “Apache log4j2”, leaving millions of businesses around the world at risk of damage. cybervol.
Several popular services, including Apple iCloud, Amazon, Twitter, Cloudflare and Minecraft, are vulnerable to this “ubiquitous” zero-day exploit, now considered one of the most serious vulnerabilities on the internet in recent years.
âApache Log4jâ is used in many forms of enterprise and open source software, including cloud platforms, web applications, and email services.
Apache Log4j is the most popular Java logging library with over 400,000 downloads from its GitHub project. It is used by a large number of companies around the world, allowing connection to a wide range of popular applications.
“Exploitation of this vulnerability is straightforward and allows threat actors to control Java-based web servers and launch remote code execution attacks,” cybersecurity researchers said in a blog post.
Microsoft researchers have also warned of attacks attempting to take advantage of “Log4j” vulnerabilities, including a range of crypto-mining malware.
(To receive our electronic paper daily on WhatsApp, please click here. We allow sharing of the PDF document on WhatsApp and other social media platforms.)
Posted on: Wednesday, December 15, 2021, 7:00 a.m. IST