This post is intended to help community financial institutions appropriately prioritize their response efforts to the Log4Shell vulnerability. If you’ve been watching your threat intel feeds (or even just the news) over the past week, you are well aware of this vulnerability.
Security experts are calling Log4Shell one of the top 3 vulnerabilities in the past decade. Why? Because of the widespread use and how easy it is to successfully attack the affected systems.
It stems from the Java Log4j library that many systems use for logging. Recently it was discovered that, if supplied the right (or wrong) string of characters, those systems could be forced to download and run malicious code.
Before we all panic, there are a few things to consider. This isn’t like the SolarWinds attack, where the code had already been installed on the affected systems. For this one, attackers must be able to access the system to successfully execute the attack. This means that they need to be in your network (and if so, you have a ton of problems anyway), or the system must be externally facing.
The good news for the banking industry is that we don’t typically host our own externally facing systems. The bad news is that we continue to partner with more and more service providers and vendors that DO have external facing systems.
In times like these, it’s important to prioritize our responses so we can make the most of our limited resources. This is my suggested approach to do so:
For many financial institutions, the first step is to jump directly to #2 and begin the process of working with vendors to determine their exposure and if an appropriate response has been taken. Make sure you take care of that before beginning the quest of addressing internal systems.
As always, retain your documentation and other evidence of your response. It’s also good in high-profile incidents like this to communicate to your board where you stand and if further actions are necessary.
Lastly, the FDIC sent out an email this week pointing folks to the CISA website for the latest information, that site can be found here: https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance
If you’d like to see a sample threat analysis on Log4Shell (that we do for our customers regularly), email me at chris@bedelsecurity.com and I’ll send you a full copy.
If managing the ever-changing threat landscape (including vulnerabilities like Log4Shell) seems to be a task that’s getting out of control, it might be time for outside perspective from an expert. We’ll give you feedback on incident response processes and responsibilities as well as other areas of your infosec program. If you’d like to know more, check out our CISO Assessment.