{"id":1051921,"date":"2022-01-05T08:58:31","date_gmt":"2022-01-05T13:58:31","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/log4j-cybersecurity-concerns-in-industry-automation-world\/"},"modified":"2022-01-05T08:58:31","modified_gmt":"2022-01-05T13:58:31","slug":"log4j-cybersecurity-concerns-in-industry-automation-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/log4j-cybersecurity-concerns-in-industry-automation-world\/","title":{"rendered":"Log4j Cybersecurity Concerns in Industry &#8211; Automation World"},"content":{"rendered":"<p><p>Youve likely heard about the log4j  cybersecurity vulnerability. Chances are, however, that youve mostly heard  how this primarily affects public-facing internet systems. Some of the higher  profile exploits of this vulnerability include penetration of Belgiums defense  ministry, several ransomware hackings, and taking control of computers to mine  cryptocurrency, according  to the Washington Post.<\/p>\n<p>Though no incursions of industrial controls systems via  the log4j vulnerability have yet been reported, we do know that the potential  exists. According to aDolus Technology, a  supply chain cybersecurity provider, several million operations technology (OT)  software packages use log4j. Most OT software suppliers use log4j because it is  opensource software that effectively handles required logging tasks. aDolus  explains that the log4j vulnerability (called Log4Shell)  is a result of overly-provisioned features enabled byan insecure default  configuration and the implicit trust of messages.<\/p>\n<p>The National  Institute of Standards National Vulnerability Database reports that Log4Shell has been disabled from log4j 2.15.0  and completely removed from version 2.16.0.<\/p>\n<p>If you don't know that the software you use contains log4j, you won't know whether you should patch or block certain traffic, or perhaps do nothing at all.<\/p>\n<p>As with most cybersecurity correction measures, protecting  your operations requires identification of the vulnerability in your systems. After all,  as aDolus notes, if you don't know that the software you  use contains log4j, you won't know whether you should patch or block certain  traffic, or perhaps do nothing at all.<\/p>\n<p>According to aDolus, a software bill of materials (SBOMs)  is the best tool for uncovering hidden vulnerabilities like Log4Shell. TheFACT platformfrom aDolus reportedly providesenriched SBOMsthat report all the subcomponents of a  software package and can be a valuable tool for cybersecurity assessments. Source  code analysis is another option if you have access to the source code, but  that's often not the case in the OT world, according to aDolus.<\/p>\n<p>More detailed information about mitigating Log4Shell and  other log4j-related vulnerabilities can be found at <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-356a\" rel=\"nofollow\">https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-356a<\/a>.<\/p>\n<p>ISA99 Update<\/p>\n<p>As 2022 began, the  ISA99 Committee on Industrial Automation Control Systems (IACS) Cybersecurity  issued an update to stakeholders about its focus moving forward considering the  ever-evolving cybersecurity threats facing industry.<\/p>\n<p>Key aspects of  this notice from the committee include:<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.automationworld.com\/cybersecurity\/article\/21977403\/log4j-cybersecurity-concerns-in-industry\" title=\"Log4j Cybersecurity Concerns in Industry - Automation World\">Log4j Cybersecurity Concerns in Industry - Automation World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Youve likely heard about the log4j cybersecurity vulnerability. Chances are, however, that youve mostly heard how this primarily affects public-facing internet systems.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/log4j-cybersecurity-concerns-in-industry-automation-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-1051921","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1051921"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1051921"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1051921\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1051921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1051921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1051921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}