WASHINGTON—Senior U.S. security officials said Monday they hadn’t yet seen significant disruptive or destructive cyberattacks, such as ransomware attacks, linked to a massive internet flaw discovered one month ago, but warned that the bug could aid the nefarious activity of criminals and foreign governments for months or years to come.

The Biden administration hasn’t identified any confirmed breaches of federal government agencies that relied on the flaw in the widely used software code known as Log4j, nor has it detected foreign governments developing attacks that exploit the bug to carry out a network intrusion, officials said during a press briefing.

Still, officials said the dangers posed by Log4j—a free bit of code that logs activity in computer networks and applications—were severe and likely to be a long-lasting problem for organizations big and small because of the software’s ubiquity.

“The scale and potential impact of this makes it incredibly serious,” said Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency. Despite the lack of major attacks so far, Ms. Easterly said she considered the Log4j problem “the most serious vulnerability” she has seen in her decadeslong career, and she was concerned about long-term risks to networks that control U.S. critical infrastructure.

Ms. Easterly said the flaw had so far led to “widespread criminal activity” that mostly consisted of installing cryptocurrency mining software or botnet code on vulnerable devices. She added that some hackers may be waiting undetected after entering networks to do more damage and said there were limits to what CISA may know about because victimized organizations often don’t report intrusions to the government.

Researchers have said the Log4j flaw, publicly disclosed one month ago after being discovered by a Chinese security team, was particularly worrying because the free Java-based software is used in a range of products including security software, networking tools and videogame servers. The exact number of users of Log4j is impossible to know, but the software has been downloaded millions of times, according to the organization that builds it, the Apache Software Foundation.

A public catalog of products known to have the flaw that CISA set up in the wake of its discovery has received more than 2,800 submissions detailing Log4j-related problems in different commercial products that incorporate the code, Ms. Easterly said. Hundreds of millions of individual devices are likely at risk, she said.

The administration hadn’t confirmed that hackers backed by foreign governments are exploiting the Log4j flaw, but “it is of course possible that that may change,” Eric Goldstein, executive assistant director for cybersecurity at CISA, said. Senior officials have separately said they expect such activity to be inevitable.

Ransomware attacks are increasing in frequency, victim losses are skyrocketing, and hackers are shifting their targets. WSJ’s Dustin Volz explains why these attacks are on the rise and what the U.S. can do to fight them. Photo illustration: Laura Kammermann

Multiple U.S.-based cybersecurity firms and Microsoft Corp. said in December that they had identified hackers linked to China, Iran and other governments exploiting the Log4j vulnerability. The U.S. government is often slower than private companies to formally attribute cyberattacks to foreign governments, given the added geopolitical significance of doing so.

The impact of the Log4j bug overseas has so far been more pronounced than in the U.S. The Belgian Defense Ministry has reported a breach to its systems. In addition, businesses ranging from a German chemical company to a Milwaukee-based industrial-parts supplier have rushed to shore up their networks, taking portions offline as a precaution.

The Federal Trade Commission last week urged organizations to address the Log4j flaw in products with available patches to avoid exposure to possible legal action from the agency.

Write to Dustin Volz at [email protected]

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

This post first appeared on wsj.com

You May Also Like

Teenage girls, body image and Instagram’s ‘perfect storm’

The suffering of the photo-sharing app’s users came into focus this week…

Biblical site in Israel will be opened to the public for the first time in 2,000 years 

A biblical site where Jesus is said to have healed a blind…

Vactidy Blitz V8 cordelss vacuum review and it’s under £170

SHOPPING: Products featured in this article are independently selected by our shopping…

How to delete Snapchat account

SOCIAL media users can be notoriously fickle with platforms falling in and…