Log4shell – Audited

Last week a software vulnerability named Log4shell made the front pages of newspapers worldwide.  Its prominence came from being within freely available open source software – meaning that its code was to be found in a very broad range of places running the code Log4j. The risk has been in its simplicity and wide use enabling e.g. data loss, ransomware, or theft of crypto currency. 

Not all uses of Log4j are the same level of risk – e.g. laptops on the network are less likely to be compromised than web servers. However, because Log4j is widely spread, deployed on many internet facing applications and the heightened levels of attack on it, it should be addressed quickly. 

Skopos helps businesses audit the software in use. We use several data sets to understand vulnerabilities, including the National Vulnerability Database (NVD). We also check the dark web and our cyber network to learn of wider risks. Skopos advises all its clients to run security software that hardens the network against cyber attack. 

Skopos’ action list for businesses

  1. Check for vulnerabilities by comparing your software against this list of what’s been affected so far – this is automated within the Skopos summaries
  2. Patch the software directly – as good practice you should ensure all software updates are run immediately they are available
  3. If no patch is available yet, take the server temporarily offline. 
  4. Check your firewall and detection software and review the system logs for suspicious behavior.
  5. Update your audit of actions – where vulnerable, when, for how long, progress, patches and actions taken – automated for Skopos users

At Skopos we want all our clients to be confident of their business continuity and resilience and have a transparent audit of security activity.

Interested in a demonstration of the Skopos platform? Read more here or contact us for more information via info@skopos.ai