³Ô¹ÏÍøÕ¾

Use of Log4j vulnerabilities in ransomware activity

Australian Cyber Security Centre

Background / What has happened

The ACSC is aware of reports that ransomware groups, previously responsible for impacting Australian organisations, have been leveraging the Log4j vulnerability. For example, .

If you were to suffer a ransomware attack, loss of any data could limit the ability for your business to conduct day-to-day activities, impact to your reputation and credibility, or risk losing customers. While you might think photos and other business documents are most important, it is worth considering other data that is critical to your business operations. If left unfixed, ransomware can cause severe damage. It can hurt your reputation, and cost you money.

Mitigation / How do I stay secure?

The ACSC has published specific guidance on mitigating the Log4j vulnerability via an and information on the risks, impacts and preventative actions associated with ransomware via an additional .

The ACSC continues to monitor the situation and work with our partners. On 23 December 2021 the ACSC released a to provide further mitigation guidance on addressing vulnerabilities in Log4j software library: (known as “Log4Shell”), , and .

Assistance / Where can I go for help?

/Public Release. View in full .