• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Log4Shell: The Worst Possible Computer Bug?

You are here: Home / Security News / Log4Shell: The Worst Possible Computer Bug?

Chinese hackers have developed fully weaponized software that has started causing chaos on the web. Security professionals worldwide have been trying to fix one of the worst computer exposures that has been discovered in decades, affecting millions of servers.

It was discovered earlier this month, through a software called Log4j. This software allows applications to interact with one another through various computer networks. By manipulating the system, dubbed Log4Shell, the hackers are capable of taking control of the servers that run the network, using them for their own gain.

This means that they can steal the data that are housed on those servers, including medical records, photos and individual bank account details. They can also lock up servers belonging to organisations in a ransomware attack.

Log4Shell is considered a zero-day vulnerability because malicious actors likely knew about it and exploited it before the experts did.

Prevention Better Than Cure

Firewalls and VPNs are most likely already working to protect their customer’s online security in the short-term, programmers have been struggling to find a way to fix this bug affecting millions of servers in the long-term. Security experts have suggested that all Log4j users should immediately look to upgrade to Log4j-2.15.0-rc2 to prevent further hacking.

Attempted Attacks Increase

After news spread of the vulnerability, the numbers of cybercriminals utilising this bug have increased dramatically. Hackers all around the world are using this tool, and taking an advantage of the terrible situation for their own gain.  A summary of recent activity can be seen here:

  • 10 December – 1,000 attempted attacks were made
  • 11 December – 40,000 attempted attacks were made
  • After 24 hours, almost 200,000 attacks were conducted across the globe
  • 72 hours after the outbreak, over 800,000 attempted attacks were made

To find out how your organisation can protect itself in the long-term, contact Agilient.

Author: Mahdi Kobeissi, Cyber Security Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane