Application Security , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security

'Hack DHS' Program Expanded to Include Log4j Bug Hunters

Also, CISA Has Published an Open-Source Log4j Scanner to Aid Defenders
'Hack DHS' Program Expanded to Include Log4j Bug Hunters

A week after announcing a new bug bounty program called "Hack DHS," intended to safeguard the federal agency's systems, U.S. Department of Homeland Security Secretary Alejandro Mayorkas announced that DHS is expanding the scope of the program to include finding and patching Log4j-related vulnerabilities in the systems.

See Also: Fireside Chat | Zero Tolerance: Controlling The Landscape Where You'll Meet Your Adversaries

The Hack DHS bug bounty program is scheduled to have a phased introduction that will stretch across the entire fiscal year 2022 and will soon be adopted across different levels of the government (see: US DHS Announces New Bug Bounty Program to Safeguard Systems).

In a tweet, CISA Director Jen Easterly welcomed this move and thanked the global research community for participating in the program, especially since the Apache Log4j vulnerability is now a global-level threat.

During a press briefing on Dec.14, CISA Executive Assistant Director for Cybersecurity Eric Goldstein said that, to date, there have been no confirmed compromises of any federal agencies due to Log4j, but he called the situation "extremely concerning," according to Federal News Network.

Why Include Log4j?

The announcement that Log4j will be included in the bug bounty program comes after the report of the Belgian Ministry of Defense falling victim to a cyberattack that was linked to the exploitation of the widespread Apache Log4j vulnerability (see: Log4j: Belgian Defense Ministry Reports It Was 'Paralyzed'). The ministry confirmed that the affected systems had been isolated, but did not reveal any information on the attacker or the type of cyberattack.

Reports allege that nation-state actors from potentially hostile nations such as China, Iran, North Korea and Turkey are also trying to gain maximum benefit from the Apache Log4j vulnerability, and they appear to have actively attempted to abuse it, according to cybersecurity experts (see: Nation-State Attackers Wielding Log4j Against Targets).

An Appropriate Approach

Some experts see the use of bug bounties to catch Log4j flaws as an appropriate approach. Chris Clements, vice president of solutions architecture at security firm Cerberus Sentinel, tells Information Security Media Group the Log4j vulnerabilities are pernicious because "they are difficult to detect with traditional vulnerability scanners, are embedded in numerous applications that you might not expect, and affect systems and applications downstream from primary operational flows that are nonobvious."

He says the most effective form of detection requires scanning all files on systems to look for the vulnerable versions of the Log4j library. While there are many open-source tools to accomplish this, he says, it can be difficult for many organizations to do it at scale.

"All of these factors make these vulnerabilities ones that benefit tremendously from having more eyes available looking for potential vulnerable systems. Bug bounty programs can be especially effective at attracting exactly this volume of scrutiny by establishing a virtuous cycle aligning incentives between organizations and outside security researchers," Clements says. But he warns that detection is only the first step and says organizations must create mitigation and remediation plans to ensure that they are protected from being attacked through these vectors.

Eliminating the need to onboard resources is a particular benefit of this approach, according to James McQuiggan, security awareness advocate at KnowBe4 and education director of the Florida Cyber Alliance. "Using experts in the community alleviates the need to hire, onboard and just use [employees] as 'arms-length' contractors with a one-time payment," he says.

CISA-Recommended Log4j Scanner

CISA has published an open-sourced Log4j scanner on GitHub that has been built based on several scanners created by members of the open-source community, according to a tweet from CISA.

"This repository provides a scanning solution for the Log4j remote code execution vulnerabilities (CVE-2021-44228 and CVE-2021-45046)," the GitHub post says. It says that the information and code in the repository is provided "as is" and was assembled with the help of the open-source community and updated by CISA through collaboration with the broader cybersecurity community.

CISA credits the scanning solution to several researchers. Mazin Ahmed is one of the names that appears in the credit section of the GitHub post. Ahmed is the founder of cybersecurity startup FullHunt.

FullHunt released a detection scanner on Dec. 13 for what was then the only known Apache Log4j RCE vulnerability, tracked as CVE-2021-4428.

CISA, in its GitHub post, says that it has "slightly modified" that open-source scanner and has used "two additional projects to avoid using third-parties."

FullHunt has not yet responded to ISMG's request for information about these modifications.

For the latest news and mitigation strategies from ISMG's reporting on the Log4j vulnerability, visit the updated thread, here.


About the Author

Mihir Bagwe

Mihir Bagwe

Senior Correspondent, Global News Desk

Bagwe previously worked at CISO magazine, reporting the latest cybersecurity news and trends and interviewing cybersecurity subject matter experts.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.