Chinese hackers have already discovered a “fully weaponized” software flaw that is causing havoc on the internet. Experts warn it could pose a danger to all devices connected to the Internet. 

This vulnerability is caused by Apache Log4j. It’s a widely used open-source library that allows software developers to track the changes made in their applications. 

Experts agree that the Log4shell vulnerability is one of the most dangerous in modern computing history. Many countries are warning about this flaw, which allows hackers to access private data and install malicious software on computers.

Amit Yoran (chief executive at Tenable, a network security company) stated that the Apache Log4j Remote code Execution Vulnerability was the biggest and most serious vulnerability in the past decade. He is also the founder of the US Computer Emergency Readiness Team. 

Juan Andres Guerrero Saade, the principal threat researcher at cybersecurity company SentinelOne called it “one of those nightmare vulnerability that there is pretty much no way for you to prepare.”

Guerrero Saade claimed that the firm has already witnessed Chinese hackers trying to exploit this vulnerability. 

Crowdstrike, a US cybersecurity firm Mandiant said that it found sophisticated hackers who were using the bug in order to target targets. In an email sent to Reuters, Mandiant addressed these hackers as ‘Chinese Government Actors’.

Chinese hackers have already discovered a “fully weaponized” software flaw that is making the internet a mess. Experts warn it could pose a danger to all devices connected to the Internet. Pictured: The hacker is working on a computer [stock image]

Because the flaw can be found in many devices using Java software, it is considered serious. Security executives fear widespread misuse of this flaw because it is embedded in many programs from companies. 

Software bugs are threatening millions of online services like Netflix, Amazon and Uber, as well as cloud-based services like Apple iCloud and Android OS and Google Documents. 

The bug first surfaced on Minecraft users’ websites. On November 24, Chen Zhaojun, an employee of Chinese online giant Alibaba reported it to Apache. 

On Friday, the US sent out a warning message to the private sector regarding Apache’s Log4j vulnerability. Germany activated its national IT crisis center in response to this ‘extremely serious’ defect. 

Crowdstrike senior vice-president of intelligence Adam Meyers stated that “the internet’s on fire now.” He stated that “people are desperately trying to patch it” and that there is a wide variety of exploiters.

He stated Friday morning that the bug had been “fully weaponized” in 12 hours after it was discovered. This means malefactors have developed and distributed the tools necessary to exploit the bug.

We know everything we can about the Log4Shell bug


Developers scrambled for patches after a vulnerability was discovered in log4j2, the Java logging library.

Java continues to be one of the most used programming languages around and can be used for creating functions in an app or system. 


Hackers can gain complete control over an external server with the Log4Shell bug without authentication.

Experts warn it’s one of today’s greatest threats to modern computing.

These online apps and services use Java in their programming. This can be done either via back-end services, or user interfaces.

  • Google and Android OS
  • Netflix
  • Spotify
  • Apple’s iCloud
  • LinkedIn
  • Uber
  • Amazon
  • Minecraft 


Programmers scramble for solutions after learning of the vulnerability that could affect millions of devices.

Short-term security fixes for VPNs or firewalls may be in the works.

Experts have suggested all Log4j users should immediately look to upgrade to Log4j-2.15.0-rc2.

Internet sleuths have launched unofficial patches as well. 

Log4j has affected a lot of software, some of which may not be familiar to most people. 

As with last year’s Russian spy operation, SolarWinds was at the center of it. The ubiquity and accessibility of these programs make them excellent jumping off points for hackers. 

Apache released a partial solution to the vulnerability on Friday, but affected businesses and cyber-defenders will still need time for Log4j’s maker to fix it.

In reality, the flaw lets an outsider insert active code into the record-keeping process. The hacker then instructs the server hosting this software to run a command.

Although no public incidents of major disruption have yet been reported due to the vulnerability, researchers are seeing an alarming rise in hackers trying to exploit the flaw for spying. 

Experts now worry that this bug can be used to spread malware to either delete data or encrypt it. This is similar to what Colonial Pipeline Co, a U.S.-based pipeline operator, was able to do in May against Colonial Pipeline Co. It caused gas shortages in parts of the US.

According to the German Interior Ministry, the agency’s spokesperson is encouraging users to make their system patches as soon as they can to avoid possible attacks via the Log4J utility.

Steve Alter, a spokesman for the government, stated that the threat situation was extremely serious. “Immediate protective actions are necessary.

German authorities have documented attempts to exploit this bug throughout the globe, including unsuccessful attempts. He did not elaborate. Alter said that while no attacks have been successful against German networks or government agencies have been reported, a few have been found vulnerable.

According to him, Germany was in communication with numerous international and national partners on the subject. This weakness could be exploited to allow for complete control of affected systems.

Java continues to be one of the most used programming languages around and can be used for creating functions in an app or system. 

Unless a patch is found, criminals, spies and programming novices could gain easy access to internal networks where they can loot valuable data, plant malware, erase crucial information and much more. [stock image]

If a patch is not found, hackers, spying, and novice programming could have easy access to the internal networks, where they can steal valuable data, install malware, erase critical information, and more. [stock image]

You can still use it today, whether you need backend services or user development interfaces. It is used in many of the most well-known online applications and services such as Netflix, Amazon and Google, Spotify, LinkedIn, Uber, and Android OS. 

Hackers can gain complete control over an external server with the Log4Shell bug without authentication.  

‘I would be hard-pressed to think of a company that´s not at risk,’ said Joe Sullivan, chief security officer for Cloudflare, whose online infrastructure protects websites from malicious actors.

Log4Shell was discovered in an utility used in enterprise and cloud software across government and industry. 

It is possible for criminals, spying, and novice programming professionals to gain easy access into internal networks, where they can steal data and plant malware. They also have the ability to erase important information.

Experts believe that it has been installed on millions of servers. They also said that the impact would be difficult to determine for days. The exploit is known to have been discovered by Amazon, Twitter, and Apple’s iCloud.

Also, hackers are believed to have the ability to exploit QR codes. These QR codes were widely used throughout the NHS Test and Trace pandemic to install malicious code onto servers. 

Robert Joyce (director of cybersecurity at America’s National Security Agency) was among those who responded to the scare.

He said that the Log4j vulnerability poses a serious threat to exploitation because of its widespread inclusion in software frameworks. This includes the NSA’s GHIDRA, which is a free open-source reverse engineering tool. 

This vulnerability was called “Security 10” by the Apache Software Foundation. It is rated on a scale from 1 to 10. An exploit allows anyone to access any computer running the software that has not been patched.

Experts say the vulnerability is dangerous because it allows an attacker to access any web server with no password.

Marcus Hutchins is an internet security researcher who warned Log4Shell that its software could expose millions of apps to hackers.  

Cybersecurity experts say users of the online game Minecraft have already exploited it to breach other users' devices by pasting a short message into in a chat box

Security experts claim that Minecraft players have used the site to break into other devices. By entering a brief message into a chat box, they were able to exploit it.

New Zealand’s Computer Emergency Response Team was one of the first to reveal that the flaw was being “actively exploited” in the wild, just hours after the bug was reported publicly on Thursday.

Alibaba, a Chinese technology giant, reported the vulnerability to the foundation, Nov. 24, to report it to them. Two weeks were required to find a solution and make it available for public use.

Patching the systems across the globe can be difficult. 

Most organizations, including cloud providers, should be able easily to upgrade their web servers. However, Apache software can also be embedded in third party programs that are often not able or willing to be updated.

Minecraft was the first to show signs of this flaw being exploited. This online game is hugely loved by kids and is owned by Microsoft. 

Marcus Hutchins (security expert) and Meyers both claimed that Minecraft users already used it to install programs on computers owned by others. This was done through a simple message sent via a chat.

Microsoft stated that it has issued an urgent patch to Minecraft users. The company stated, “Customers who apply this fix are protected.”

Researchers found evidence that the vulnerability could have been exploited by servers owned or managed by Apple, Amazon and Twitter, according to researchers.