{"id":21946,"date":"2022-05-18T19:08:33","date_gmt":"2022-05-18T19:08:33","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21946"},"modified":"2022-05-18T19:10:46","modified_gmt":"2022-05-18T19:10:46","slug":"log4j-vulnerability-ai-big-data-threat","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/","title":{"rendered":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk"},"content":{"rendered":"\n<p>The Apache Log4j <a href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\">Log4Shell bug<\/a> is one of the most critical vulnerabilities in the history of cybersecurity.<\/p>\n\n\n\n<p>Hundreds of millions of devices use the <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j<\/a> component for various online services, among them government organizations, critical infrastructure, companies and individuals.<\/p>\n\n\n\n<p>Actually, pretty much all software uses this library written in Java, so it&#8217;s a very widespread risk and concern. That&#8217;s also why hackers have been exploiting the bug actively since it became public last year, sometimes using public POCs (proofs of concept), which can be all too easily found on <a href=\"https:\/\/github.com\/search?q=log4shell+exploit\">GitHub<\/a>, and the exploit is notoriously easy to use.<\/p>\n\n\n\n<p>Zectonal researchers have <a href=\"https:\/\/www.zectonal.com\/blog\/an-attack-vector-for-data-supply-chains-and-data-lakes-using-data-payloads-as-exploits\/\" target=\"_blank\" rel=\"noreferrer noopener\">revealed<\/a> a new and critically important attack vector that can use the infamous bug: Data pipelines and data lakes. The researchers demonstrate how hackers could poison AI and machine learning to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">bypass detection<\/a>.<\/p>\n\n\n\n<p>The infected <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">payload<\/a> could be injected in Big Data files used to train AI. According to the researchers, such an attack is pretty hard to anticipate and catch. They tried to use the most realistic processes and cloud architectures to demonstrate the severity of the threat.<\/p>\n\n\n\n<p>The intent of the exploit is to poison the targeted AI models and associated analytics, making the whole data infrastructure ineffective. By introducing malicious payloads in the global data supply chain, hackers could inflict crippling damage on their victims.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/top-code-debugging-and-code-security-tools\/\">Top Code Debugging and Code Security Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Understanding the Big Data Attack<\/strong><\/h2>\n\n\n\n<p>No-code data pipelines used in the research are particularly attractive for an attacker, as &#8220;the data flow never transits through any type of <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewall<\/a> or scanning device before it is processed and ultimately gains access to a vulnerable system.&#8221;<\/p>\n\n\n\n<p>The researchers deliberately used common cloud-based architecture, storage systems (e.g., buckets), and ETL (extract, transform, load) applications. They also applied standard configurations and files, and hid their payload (the crafted string used to exploit the Log4Shell bug) into a single data point among the millions available:<br><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/aJ9WXgkHrDUvLKxo6zEH6V0Z-_qkaMNw5Z5w4ixexEDrQXtD40iUGgwNz3H3ztw72V95HZF4aoVDyE82qjmVdkMW2gJ5GbOTQO0j8ICkS0xMFODSFawcPQIKs_Mu6MRcxFSy0D4BE7ywFu4qVhGsop0gQ0hL\" width=\"665\" height=\"420\"><\/p>\n\n\n\n<p>The ETL process combines data from multiple sources into a single data pool. ETL applications are essential for data analytics and machine learning workstreams, as they clean and organize the data according to specific rules that meet the business intelligence needs.<\/p>\n\n\n\n<p>The researchers managed to &#8220;gain immediate <a href=\"https:\/\/www.esecurityplanet.com\/threats\/a-few-clicks-from-data-disaster-enterprise-security\/\">remote code execution<\/a> from within a private virtual cloud over the public Internet.&#8221; More precisely, they gained remote access to a no-code ETL software service with private subnet IP addresses that was part of a VPC (virtual private cloud) hosted by a public cloud provider.<\/p>\n\n\n\n<p>Such an exploit will likely inspire other attacks, as AI is used to power many advanced needs and services. Critical systems like smart vehicles, healthcare, finance and supply chains are and can be automated thanks to deep learning.<\/p>\n\n\n\n<p>Enterprises already use AI to identify patterns and trends in customer analytics to identify business opportunities. Flaws that allow such an evasive strategy access to data lakes must be addressed quickly.<\/p>\n\n\n\n<p>To exploit the Log4Shell vulnerability, the researchers attacked the Logstash component of the ELK stack (Elasticsearch, Logstash, and Kibana), a very popular open-source log management system that boasts millions of downloads.<\/p>\n\n\n\n<p>Such platforms are widely used by enterprises to extract and analyze data. While the latest versions have fixed the Log4Shell vulnerability, the researchers were able to exploit versions released immediately before the disclosure of Log4Shell in combination with Java 8.<\/p>\n\n\n\n<p>The researchers leveraged a classic combination of vectors in enterprises: multiple outdated components that ultimately lead to disaster.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Prevent AI and Open Source Exploits<\/strong><\/h2>\n\n\n\n<p>The researchers cited the Synk JVM Ecosystem Report 2021 that found that &#8220;60% of Java developers still use Java 8 in production.&#8221; Indeed, lots of corporate systems use outdated libraries, putting whole organizations at high risk.<\/p>\n\n\n\n<p>While aggressive <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management<\/a> can add significant costs and operational complexity, users and administrators need to be aware of their hardware and software that are vulnerable or need to be retired. Attackers now have access to an extensive range of advanced hacking tools that can map vulnerabilities and provide pre-configured payloads to exploit them.<\/p>\n\n\n\n<p>The software supply chain is prone to attacks, and the open-source Log4j library is a striking example. In fact, open source is increasingly a part of enterprise applications and development efforts, and securing the various associated ecosystems will not be free or easy. The dependencies are <a href=\"https:\/\/www.esecurityplanet.com\/applications\/software-supply-chain-a-risky-time-for-dependencies\/\">mind-boggling<\/a>.<\/p>\n\n\n\n<p>It might seem like a costly undertaking to secure all that, but the cost of successful cyberattacks is much higher &#8211; and in some cases putting organizations out of business.<\/p>\n\n\n\n<p>The Open Source Security Foundation (OpenSSF), a leading open-source organization associated with the Linux Foundation, recently <a href=\"https:\/\/openssf.org\/press-release\/2022\/05\/12\/the-linux-foundation-and-open-source-software-security-foundation-openssf-gather-industry-and-government-leaders-for-open-source-software-security-summit-ii\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> &#8220;an ambitious, multipronged plan with 10 key goals to better secure the entire open-source software ecosystem.&#8221; The price tag for the program is $150 million, more than $30 million of which has already been pledged by tech giants like Amazon, Ericsson, Google, Intel, Microsoft and VMWare.<\/p>\n\n\n\n<p>The plan could support developers so they can fix issues, including training, provide security audits, and encourage the use of authenticated package signing for the distribution of software components. The initiative will likely benefit many actors in the software supply chain, including public sectors.<\/p>\n\n\n\n<p>While this is not the first time the Linux Foundation has tried to help secure the open-source world, the current state of the software supply chain is finally broken to the point that key leaders are willing to do something; hopefully it&#8217;s not broken beyond the point of no return.<\/p>\n\n\n\n<p>Whether it&#8217;s developers who <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-sabotage-incident-hits-software-supply-chain\/\">self-sabotage<\/a> their component because of lack of financial support, malicious contributors who inject backdoors in popular open-source libraries, or maintainers who introduce critical bugs by accident, dependency management can be a nightmare.<\/p>\n\n\n\n<p>In addition to these threats, many dependencies use existing components to speed up development, adding an extra layer of complexity that makes the whole mess even more difficult for companies to manage.<\/p>\n\n\n\n<p>Read next:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\">Open Source Security: A Big Problem<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-hackers-compromise-the-software-supply-chain\/\">How Hackers Compromise the Software Supply Chain<\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6eedeb3bbf-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6eedeb3bbf\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6eedeb3bbf\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6eedeb3bbf\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6eedeb3bbf\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6eedeb3bbf\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6eedeb3bbf\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity. Hundreds of millions of devices use the Log4j component for various online services, among them government organizations, critical infrastructure, companies and individuals. Actually, pretty much all software uses this library written in Java, so it&#8217;s a very widespread [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21949,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,15],"tags":[2210],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,150],"class_list":["post-21946","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-threats","tag-ai","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-big-data-and-business-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T19:08:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-18T19:10:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1617\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk\",\"datePublished\":\"2022-05-18T19:08:33+00:00\",\"dateModified\":\"2022-05-18T19:10:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\"},\"wordCount\":1004,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png\",\"keywords\":[\"AI\"],\"articleSection\":[\"Applications\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\",\"name\":\"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png\",\"datePublished\":\"2022-05-18T19:08:33+00:00\",\"dateModified\":\"2022-05-18T19:10:46+00:00\",\"description\":\"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png\",\"width\":2560,\"height\":1617,\"caption\":\"log4shell AI vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet","description":"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/","og_locale":"en_US","og_type":"article","og_title":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet","og_description":"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-18T19:08:33+00:00","article_modified_time":"2022-05-18T19:10:46+00:00","og_image":[{"width":2560,"height":1617,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk","datePublished":"2022-05-18T19:08:33+00:00","dateModified":"2022-05-18T19:10:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/"},"wordCount":1004,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png","keywords":["AI"],"articleSection":["Applications","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/","url":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/","name":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png","datePublished":"2022-05-18T19:08:33+00:00","dateModified":"2022-05-18T19:10:46+00:00","description":"The critical Log4j vulnerability just keeps getting worse; now hackers can use it to hijack AI and Big Data systems.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ZectVectorZero-2.png","width":2560,"height":1617,"caption":"log4shell AI vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/log4j-vulnerability-ai-big-data-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Log4j Vulnerability Puts Enterprise Data Lakes and AI at Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21946"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21946"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21946\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21949"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21946"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21946"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21946"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}