Developers: | BI.Zone |
Date of the premiere of the system: | 2021/12/16 |
Technology: | IB - Fraud Detection System (phrod), IB - Security Information and Event Management (SIEM) |
2021: Appearing in the public domain
The subsidiary Sbera BI.ZONE put[1] in the open access tool to combat critical vulnerability. Sber announced this on December 16, 2021.
A few days ago, the most critical vulnerability in the last 5 years was discovered, Log4Shell threatening the whole world. Vulnerability allows even beginners to hackers to gain control over servers and web applications. It does not attacks require specific knowledge: it is enough only to have a general idea of the language programming Java and its patterns of use.
Among the possible victims are products of technology giants like Google, Amazon, Apple and Cloudflare, internal development of organizations, from production control systems to diagnostic utilities.
{{quote 'author = said Stanislav Kuznetsov, Deputy Chairman of the Management Board of Sberbank. |
In recent days, Log4Shell's vulnerability has been exploited in hundreds of thousands of successful attacks around the world. The problem is that to protect you need to know which assets are vulnerable - and this is difficult to find out. Therefore, our experts have developed a utility that allows you to find all network nodes that require additional protection and increased attention of cybersecurity officers,}}
{{quote 'author = noted Dmitry Samartsev, Director of BI.ZONE. |
To solve the problem, companies use classic vulnerability scanners, but in this case they are ineffective, since they do not provide 100% coverage of all log data. When scanning from the network, you can skip a vulnerable application, so our tool involves scanning from the inside, on the host. If you find a vulnerability, update Log4j immediately and follow the steps on [[GitHub],}}
Additionally, you can use the BI.ZONE WAF cloud service as protection against external attacks. It does not relieve the need to install updates that fix the vulnerability, but reduces the risk of successful Log4Shell operation.
The Log4Shell vulnerability is related to the Log4j logging library, which is used when creating many applications and programs. With Log4Shell, hackers can get into the IT infrastructure of companies and, for example, steal data, encrypt all files, stop business processes.