{"id":42525,"date":"2021-12-22T16:27:07","date_gmt":"2021-12-22T08:27:07","guid":{"rendered":"https:\/\/version-2.com\/?p=42525"},"modified":"2022-03-07T12:01:48","modified_gmt":"2022-03-07T04:01:48","slug":"detecting-alerting-log4j-with-the-scadafence-platform","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/12\/detecting-alerting-log4j-with-the-scadafence-platform\/","title":{"rendered":"Detecting &#038; Alerting Log4J with the SCADAfence Platform"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"42525\" class=\"elementor elementor-42525\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Until two weeks ago, Log4j was just a popular Java logging framework, one of the numerous components that run in the background of many modern web applications. But since a <a href=\"https:\/\/blog.scadafence.com\/a-scadafence-update-regarding-the-log4shell-vulnerability-1\">zero-day vulnerability (CVE-2021-44228)<\/a> was published, Log4j has made a huge impact on the security community as researchers found that it\u2019s vulnerable to arbitrary code execution.\u00a0<\/p><p>The good news is that the Apache Software Foundation has already fixed and rolled out the patch for the vulnerability. On top of the patch, thanks to SCADAfence\u2019s research and R&amp;D team, our latest build supports the detection of <a href=\"\/en\/a-scadafence-update-regarding-the-log4shell-vulnerability-1\/\" rel=\"noopener\">Log4j exploit attempts<\/a>.<\/p><p><strong>Quick Recap of CVE-2021-44228 in Log4j<\/strong><\/p><p>Log4J is an unauthenticated remote code execution (RCE, code injection) vulnerability in the popular Log4j logging framework for Java. By exploiting it, the attacker can easily execute any code from a remote source on the attacked target. NIST has given this vulnerability (CVE-2021-44228) a score of 10 out of 10, which reflects its criticality.<\/p><p>Over 3 billion devices run Java, and because there are only a handful of logging libraries, many of them are likely to run Log4j. Worse still, many internet-exposed target applications can be exploited by external users without authentication.\u00a0<\/p><p>Over the past two weeks, major OT vendors disclosed the security impact of this vulnerability on their software and equipment, and additional disclosures will continue as vendors work to identify the use of Log4j across their product lines. Originally, the Log4j vulnerability made it challenging to identify potentially impacted servers on a given network. For OT networks that have incorporated network segmentation, the risk from these protocols can be mitigated to an extent.<\/p><p><strong>How To Ensure That Your Systems Are Safe<\/strong><\/p><p>First, it\u2019s important to understand that the root cause of this issue lies within the Log4j library. The Apache Software Foundation released an <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/download.html\">emergency patch<\/a> for the vulnerability. You should upgrade your systems to Log4j 2.15.0 immediately or apply the appropriate <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\">mitigations<\/a>.<\/p><p>Our OT security threat intelligence database learns about the different behavior to highlight activities attempting to leverage this vulnerability and to provide remediation guidance. Our customers are notified of log4j exploit attempts, and also on any anomaly detected by our anomalies engine. but our customers are already protected simply based on the efficacy of our anomaly detection.<\/p><p>The SCADAfence Platform, the Governance Portal, and the Multi-Site Portal do not use Log4J or the Apache server, and thus SCADAfence product installations are updated and secure from the Log4J vulnerability. Customers do not need to take action for any of our on-prem or hosted web solutions.<\/p><p>At SCADAfence, we felt network segmentation wasn\u2019t enough to fight off the critical vulnerability. The latest build of the SCADAfence Platform detects and allows SCADAfence customers to leverage our OT security threat intelligence service to ensure they can patch and mitigate this exploit in any of their OT devices.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" style=\"width: 1697px;\" src=\"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1\" sizes=\"(max-width: 1697px) 100vw, 1697px\" srcset=\"https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?width=849&amp;name=Log4J%20(6).jpg 849w, https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1 1697w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?width=2546&amp;name=Log4J%20(6).jpg 2546w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?width=3394&amp;name=Log4J%20(6).jpg 3394w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?width=4243&amp;name=Log4J%20(6).jpg 4243w, https:\/\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?width=5091&amp;name=Log4J%20(6).jpg 5091w\" alt=\"Log4J (6)\" width=\"757\" height=\"239\" \/><\/p><h6 style=\"font-size: 14px;\"><strong>The SCADAfence Platform Detects &amp; Alerts if an OT Asset is Vulnerable to the Log4Shell Vulnerability<\/strong><\/h6><p>We\u2019ve updated our log4shells\/log4j exploit detection inside the SCADAfence Platform as we have maneuvered ahead. We added CVE signatures to our database which detect and alert RCE (Remote Code Execution) exploits.\u00a0<\/p><p>The following CVEs were added to the SCADAfence database to correlate and alert of vulnerable OT assets:\u00a0<\/p><ol><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\">CVE-2021-44228<\/a><span style=\"color: #222222;\">\u00a0\u00a0\u00a0<\/span><\/li><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-45046\">CVE-2021-45046<\/a><span style=\"color: #222222;\">\u00a0<\/span><\/li><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-4104\">CVE-2021-4104<\/a><\/li><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-9488\">CVE-2020-9488<\/a><\/li><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-17571\">CVE-2019-17571<\/a><\/li><li style=\"color: #222222;\" aria-level=\"1\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5645\">CVE-2017-5645<\/a><\/li><\/ol><p><strong>How Can You Deploy The Latest Version of SCADAfence<\/strong><\/p><p style=\"text-align: justify;\">The latest version of the SCADAfence Platform which detects the CVE signatures relating to the vulnerability is available in build 6.6.1.167. To get the latest version, please contact your customer success representative.<\/p><p style=\"text-align: justify;\">If your organization is looking into securing its industrial networks, the experts at<a href=\"https:\/\/www.scadafence.com\/\"> <span style=\"color: #0000ff; text-decoration: underline;\">SCADAfence<\/span><\/a> are seasoned veterans in this space and can show you how it\u2019s done.\u00a0<\/p><p style=\"text-align: justify;\">To learn more about SCADAfence\u2019s array of OT &amp; IoT security products, and to see short product demos, click here:<a href=\"https:\/\/l.scadafence.com\/demo\"> <span style=\"color: #0000ff; text-decoration: underline;\">https:\/\/l.scadafence.com\/demo<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5987d9c elementor-widget elementor-widget-shortcode\" data-id=\"5987d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18130\" class=\"elementor elementor-18130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About SCADAfence<\/strong><br \/>SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT\/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world\u2019s most complex OT networks, including Europe\u2019s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Until two weeks ago, Log4j was just a popular Java logg [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[417,461,61],"tags":[418,462],"class_list":["post-42525","post","type-post","status-publish","format-standard","hentry","category-scadafence","category-year2021","category-press-release","tag-scadafence","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Detecting &amp; Alerting Log4J with the SCADAfence Platform - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting &amp; Alerting Log4J with the SCADAfence Platform - Version 2\" \/>\n<meta property=\"og:description\" content=\"Until two weeks ago, Log4j was just a popular Java logg [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T08:27:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T04:01:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/12\\\/detecting-alerting-log4j-with-the-scadafence-platform\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Detecting &#038; Alerting Log4J with the SCADAfence Platform\",\"datePublished\":\"2021-12-22T08:27:07+00:00\",\"dateModified\":\"2022-03-07T04:01:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/12\\\/detecting-alerting-log4j-with-the-scadafence-platform\\\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/blog.scadafence.com\\\/hs-fs\\\/hubfs\\\/Log4J%20(6).jpg?w=1697&amp;ssl=1\",\"keywords\":[\"SCADAfence\",\"2021\"],\"articleSection\":[\"SCADAfence\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/12\\\/detecting-alerting-log4j-with-the-scadafence-platform\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform\",\"name\":\"Detecting & Alerting Log4J with the SCADAfence Platform - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/blog.scadafence.com\\\/hs-fs\\\/hubfs\\\/Log4J%20(6).jpg?w=1697&amp;ssl=1\",\"datePublished\":\"2021-12-22T08:27:07+00:00\",\"dateModified\":\"2022-03-07T04:01:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/blog.scadafence.com\\\/hs-fs\\\/hubfs\\\/Log4J%20(6).jpg?w=1697&amp;ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/blog.scadafence.com\\\/hs-fs\\\/hubfs\\\/Log4J%20(6).jpg?w=1697&amp;ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/detecting-alerting-log4j-with-the-scadafence-platform#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detecting &#038; Alerting Log4J with the SCADAfence Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detecting & Alerting Log4J with the SCADAfence Platform - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform","og_locale":"en_US","og_type":"article","og_title":"Detecting & Alerting Log4J with the SCADAfence Platform - Version 2","og_description":"Until two weeks ago, Log4j was just a popular Java logg [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform","og_site_name":"Version 2","article_published_time":"2021-12-22T08:27:07+00:00","article_modified_time":"2022-03-07T04:01:48+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/12\/detecting-alerting-log4j-with-the-scadafence-platform\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Detecting &#038; Alerting Log4J with the SCADAfence Platform","datePublished":"2021-12-22T08:27:07+00:00","dateModified":"2022-03-07T04:01:48+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/12\/detecting-alerting-log4j-with-the-scadafence-platform\/"},"wordCount":677,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1","keywords":["SCADAfence","2021"],"articleSection":["SCADAfence","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/12\/detecting-alerting-log4j-with-the-scadafence-platform\/","url":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform","name":"Detecting & Alerting Log4J with the SCADAfence Platform - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1","datePublished":"2021-12-22T08:27:07+00:00","dateModified":"2022-03-07T04:01:48+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#primaryimage","url":"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1","contentUrl":"https:\/\/i0.wp.com\/blog.scadafence.com\/hs-fs\/hubfs\/Log4J%20(6).jpg?w=1697&amp;ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/detecting-alerting-log4j-with-the-scadafence-platform#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Detecting &#038; Alerting Log4J with the SCADAfence Platform"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-b3T","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=42525"}],"version-history":[{"count":19,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42525\/revisions"}],"predecessor-version":[{"id":44027,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42525\/revisions\/44027"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=42525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=42525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=42525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}