NCSC UK Profile picture
17 Dec, 19 tweets, 6 min read
🚨 Board members 🚨

You may have heard about #Log4j, a critical vulnerability that has the cyber community concerned.

Here's what it is, why people are worried, & questions you need to be asking your IT teams right now:

📖 (1/19)
#Log4j is used by developers to keep track of what happens in their software applications.

📒 It’s a huge journal of the activity of a system or application and is used by developers to keep an eye on any problems.

(2/19)
Last week, versions of #Log4j were found to have a critical vulnerability.

🕵️If left unfixed, attackers can use it to break into networks and enable malicious activity like stealing data and infecting networks.

(3/19)
What makes this so concerning is the challenge for organisations of working out:

➕ Which services use the #Log4j component
➕ Which of these services are being used
➕ Whether these services are vulnerable

(4/19)
❓How concerned should boards be?

#Log4j has the potential to cause severe impact for an organisation. As experts attempt to detect which services are vulnerable, attackers start to exploit the vulnerability. The situation is changing regularly.

ncsc.gov.uk/blog-post/log4…

(5/19)
At the moment, the majority of attacks are automated and exploratory. But should ransomware be delivered through #Log4j:

🔴business operations could be disrupted
🧑disclosures needed about personal data affected
💷costs involved with incident response & recovery

(6/19)
As such, the potential impacts range from minimal to a crippling attack on the organisation.

🤝Managing that risk requires strong leadership and working in concert with technical teams.

(7/19)
With all this in mind it's no wonder that #Log4j has the cyber community concerned.

❓ Whether you're up to speed or hearing about it for the first time, we've put together 10 questions you should be asking of your IT teams.

(8/19)
1⃣: Who's leading on this?

🐯 #Log4j is severe enough that a 'tiger team' of staff should be assembled, with a designated individual leading the response.

(9/19)
2⃣: What's our plan?

📅 There will likely be a migration to a more methodical approach to identifying how organisations are affected. Large organisations will need a phased approach to handling this issue over many weeks or months.

(10/19)
3⃣: How will we know if we're being attacked - and how can we respond?

⚔️Would your teams know if the organisation is being targeted and how prepared are they for an at-scale response?

(11/19)
4⃣: What visibility of our software/servers do we have?

🔎Your IT teams should be trying to find instances of software and #Log4j itself. This task will be easier on corporately-managed assets but less so on unmanaged assets.

(12/19)
5⃣: How are we addressing shadow IT & appliances?

🔍Many organisations won’t know all the places #Log4j might be running. Encourage teams to think about how they'll discover things that have slipped through the net.

(13/19)
6⃣: Do we know if key providers are covering themselves?

🛡️ If your organisation is dependent on any particularly key suppliers, you should have an open & honest conversation with them, acknowledging they will also be trying to understand the severity of the issue.

(14/19)
7⃣: Who internally develops Java code? What's their plan for find out if we're affected?

#⃣ Larger organisations may produce code themselves. Java developers may have used #Log4j, so it's important to ensure any software written is not vulnerable.

(15/19)
8⃣: How will people report issues they find?

📨 Many researchers are trying to detect vulnerable software right now. Should they find something on your estate, can they contact you easily?

(16/19)
9⃣: When did we last check our business continuity plans and crisis response?

📋Verify your end-to-end BCP and crisis response processes.

(17/19)
🔟: How are we preventing teams from burning out?

🩹 Remediating this is likely to take weeks, or months for larger organisations. The combination of an ever-evolving situation (& the potential for severe impacts) can lead to burnout in staff if they’re not supported.

(18/19)
📖 Learn more about mitigating the threat of #Log4j in our full guidance to board members:

ncsc.gov.uk/blog-post/log4…

(19/19)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with NCSC UK

NCSC UK Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @NCSC

14 Dec
If you've been seeing articles like this and you're wondering what #Log4j is all about, we can help.

📖 (1/8)
❓ First up, what is #Log4j?

🌍 It's a potentially Internet-wide security flaw which has the potential to affect many of the devices and services we use online every day.

(2/8)
⏲️ Let's take a step back.

🖥️ Modern software can be large, powerful and complex. It's increasingly made out of 'building blocks': rather than teams writing new code every time, they often use existing code to speed things up.

#Log4j is one of those 'building blocks'.

(3/8)
Read 8 tweets
18 Oct
Earlier this morning, Nicola Hudson, Director of Policy & Comms at the NCSC was on on #RipOffBritain talking about fake celeb scams. Catch up now on BBC iPlayer for Nicky’s tips on how to avoid falling for them – and what you can do to help us take them down 👇
Stay one step ahead of celebrity scams with the latest tips from the National Cyber Security Centre. Our very own Nicola Hudson spoke this morning with Gloria Hunniford on #RipOffBritain. Catch up now: bbc.co.uk/iplayer/live/b…
Here are just a couple of the celeb scams we’ve seen this year. The first – a fake article on how pop singer Ed Sheeran’s made millions through investing in Bitcoin.

Can you spot the big clue that all isn’t as it seems?

#RipOffBritain
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(