⚠️ Some features may be temporarily unavailable due to an ongoing 3rd party provider issue. We apologize for the inconvenience and expect this to be resolved soon.
TRANSCRIPTEnglish

Massive NEW Hack WARNING & Stocks | Log4J

12m 44s2,320 words353 segmentsEnglish

FULL TRANSCRIPT

0:00

this video is brought to you by

0:01

wealthfront check out their link down

0:03

below hey everyone me kevin here

0:04

yesterday crypto prices went insane on

0:07

coin market cap where all of the prices

0:10

seem to be multiplied by like 15 to 9

0:14

million which was insane everybody felt

0:16

like they were a trillionaire you had

0:18

this same issue then show up on binance

0:21

which potentially makes sense because

0:23

binance owns coin market cap after all

0:25

but you also saw the issue show up on

0:27

crypto.com other apps and even coinbase

0:31

and coinbase pro where they had to start

0:33

basically removing the appearance of

0:35

coins from people's profiles to prevent

0:37

them from thinking that they can sell

0:38

and become trillionaires folks this is

0:42

maddening the crypto disaster of

0:44

yesterday was crazy but there is also a

0:47

crazy vulnerability that exists in our

0:50

internet ecosystem right now that could

0:52

end up proving jerome powell right today

0:55

a lot of folks are going to be talking

0:56

about jerome powell but they're going to

0:58

forget what jerome powell says the

1:00

biggest vulnerability in america is and

1:02

that's not terrorism it's not a banking

1:04

crisis it's not a financial crisis it is

1:06

cyber security and folks according to at

1:09

least one cyber security ceo this right

1:12

now what we are facing is the single

1:13

biggest most critical vulnerability of

1:16

the last decade and folks who knows but

1:19

maybe it had something to do with the

1:21

crypto glitch and disaster that we saw

1:24

yesterday in this video i'm going to

1:26

break down what the latest vulnerability

1:27

is and how software and apps that you

1:29

use including things like icloud tesla

1:32

steam and millions of other servers

1:36

servers not people could be affected by

1:38

let's get right into it so first

1:40

according to sis admins across the world

1:42

this is a cis admins worst nightmare why

1:45

because what we're experiencing is a

1:47

zero day vulnerability known as the log

1:50

for shell vulnerability and it has to do

1:53

with an exploit in the log for j or log

1:57

for java

1:59

essentially portion of apache and the

2:01

purpose of log4j is data logging for

2:04

java applications data logging is

2:06

exactly what it sounds like you wait for

2:07

a system to log events that have

2:09

happened you know this could be useful

2:10

for appliance banking troubleshooting

2:12

you name it makes sense so far right

2:14

apache contains a data logging utility

2:17

called log4j and that's used for java

2:20

and currently has this major

2:22

vulnerability the apache software

2:24

foundation is in fact the one who

2:25

acknowledges that this could affect

2:27

millions of servers a world wide twitter

2:30

cloudflare icloud steam you name it

2:33

cloudflare's c chief a security officer

2:36

joe sullivan goes as far as saying i'd

2:38

be hard-pressed to think of a company

2:40

that is not at risk and so started

2:42

taking a look at what the heck this is

2:45

and here's what we know well first a

2:46

message from our sponsor good long-term

2:49

investing doesn't have to feel like a

2:51

roller coaster you can't help but feel

2:53

beat up sometimes if you're trying to do

2:55

it all yourself in time to market

2:56

there's tons of data out there that

2:58

shows that investing in globally

3:00

diversified funds and portfolios of low

3:03

cost index funds is quite simply the

3:06

best way to steadily grow your wealth if

3:09

it sounds complicated don't worry it's

3:11

much easier than it sounds regardless of

3:13

your financial knowledge wealthfront

3:15

makes it easy affordable and accessible

3:18

to invest to open a new investment

3:20

account you just need 500 and a few

3:23

minutes of your time wealthfront handles

3:25

the rest for an annual fee of just .25

3:29

which is virtually nothing when you

3:31

consider the stress savings alone once

3:34

you open and fund your account

3:36

wealthfront software will manage all of

3:38

it for you it employs strategies like

3:41

rebalancing to keep you at a desired

3:43

risk threshold and it will even look for

3:45

opportunities to lower your taxes

3:47

through tax loss harvesting all done

3:50

automatically from general savings to

3:52

retirement accounts wealthfront has you

3:54

covered you can have wealthfront create

3:56

a portfolio for you based on your risk

3:58

tolerance or if you want you can build

3:59

it from scratch as well this is great

4:01

for those who want the benefits of an

4:03

automated investing platform with more

4:05

freedom so if you want to focus more of

4:08

your money into tech or evs or maybe

4:10

healthcare you can use wealthfront to

4:12

build a portfolio based on exactly the

4:14

sectors that you really believe in so

4:16

all you have to do is check out the link

4:18

down below go to

4:20

invest.wealthfront.com

4:21

meet kevin and learn more

4:24

we know that this vulnerability is not

4:26

only widespread but it's potentially

4:27

catastrophic it basically allows

4:29

attackers to remotely execute code on

4:33

other people's servers

4:34

so in the case of crypto in theory

4:36

somebody could remotely send a ping

4:39

essentially and i'm oversimplifying here

4:41

send a ping or a message to a server and

4:43

then have a server execute a total set

4:46

of code this is a very similar exploit

4:48

but it's different from the last time we

4:50

saw a major exploit like this and this

4:52

was heartbleed back in i believe 2014.

4:56

take a look at how heartbleed would work

4:58

and it shows you how bad this is

5:00

usual server response would be hey you

5:04

send a message server send me a four

5:06

letter word if you're alive it's like a

5:08

ping send me the word

5:10

bird if you're alive let's say server

5:12

replies with bird hey i'm alive i'm

5:15

online okay now malicious usage which is

5:18

similar slightly different but similar

5:20

to this log4j exploit okay watch how bad

5:22

this is okay

5:24

server send me this 500 letter word if

5:28

you are there and then all of a sudden

5:31

uh

5:32

you know rather than replying with the

5:34

word bird which is a four-letter word

5:37

the server replies with the following

5:39

bird server master key is the following

5:42

and the user wants to change their

5:43

password to blah blah blah blah blah in

5:46

other words giving somebody potentially

5:48

unrestricted access to servers this was

5:50

so bad that folks in minecraft were able

5:53

to send messages to other people

5:56

then

5:57

just by sending a message to somebody

5:59

else force a server to make changes on

6:02

their end allowing people in minecraft

6:04

to basically get hacked through this

6:06

glitch this is crazy i mean you can

6:08

remotely execute code basically on

6:11

somebody else's server just by sending

6:13

them a message this is bad and not a lot

6:15

of people are talking about it because

6:17

it's slightly complicated but i'm not a

6:20

tech expert and this just sounds bad

6:22

this folks is one of the biggest

6:24

vulnerabilities seriously that we've

6:26

seen since heartbleed heartbleed came

6:28

out in feb 2012 but wasn't patched until

6:30

april of 2014 because folks didn't

6:32

really realize it until 2014 because

6:34

then it started getting exploited these

6:36

these vulnerabilities can exist and they

6:38

become issues when they start getting

6:39

exploited it's worth noting that cyber

6:41

security form from crowdstrike recently

6:44

updated their blog and said that

6:45

crowdstrike has identified a malicious

6:47

java class file hosted on an

6:49

infrastructure database associated with

6:52

a nation state adversary so you're

6:55

already starting to potentially get

6:57

a terrorist sponsoring states using this

7:00

exploit very bad who knows the crypto

7:04

price changes we saw yesterday could

7:05

just be the tip of the iceberg we don't

7:07

know if these are related but it's just

7:09

worth noting massive crazy crypto glitch

7:12

yesterday

7:13

which is the day after this log 4j issue

7:15

started becoming a lot more known and

7:17

now we're talking about it the day after

7:19

and who knows this could just be the

7:20

beginning i mean uh aws with amazon just

7:23

sent out another alert that they're

7:24

having an outage it's it's ridiculous

7:26

but anyway this vulnerability is huge uh

7:30

and here's here's some important things

7:32

to keep in mind cyber security agencies

7:34

around the world including the united

7:36

states cyber security and infrastructure

7:37

security agency are issuing a lot of

7:40

alerts on this and it was actually

7:41

surprisingly alibaba's a cloud security

7:44

team who first disclosed this

7:46

vulnerability this vulnerability was

7:48

initially made public though not

7:50

popularized until the last couple days

7:51

here was initially made public on the

7:53

9th and basically users have been

7:55

instructed to update their servers uh to

7:57

a to a new version or reconfigure as

7:59

soon as possible but it's not as easy as

8:01

it sounds because if you're using older

8:03

versions of java you can't just upgrade

8:05

to log4j even if your java was up to

8:07

date an update could cause downtime

8:08

which cause it could cause compliance

8:10

issues or or just functionality issues

8:13

it's not that easy to just update and so

8:16

patching this has become a very big

8:17

issue and so this is where you actually

8:20

and this is potentially a stock to keep

8:22

an eye on though the valuation's a

8:24

little wild

8:25

look at a company like cloudflare so

8:28

cloudflare acts as kind of like a

8:30

bodyguard of the internet to try to

8:33

prevent these sorts of things from

8:35

happening i'll just

8:36

quickly depict how this could look so

8:39

let's say rather than fixing the issue

8:42

over here which obviously is the

8:44

ultimate goal

8:45

let's say rather than your server

8:48

communicating directly with the client

8:50

you had a bodyguard in between and it

8:53

was called cloudflare and so basically

8:56

when a client requests information from

8:58

your server it goes to cloudflare first

9:01

and then cloudflare gets the information

9:04

checks to make sure it's not extra

9:06

information and then ultimately says no

9:08

no no we're not sending all that we're

9:10

just going to send this and then

9:11

provides what's being asked so if you

9:13

get a company like cloudflare which does

9:15

a whole host of services this being one

9:18

example of them they do cdn services or

9:19

whatever as well they can actually stand

9:21

between the client and the server to

9:23

prevent these sorts of issues once

9:25

somebody gets into your server it's bad

9:27

bad bad days that's why this

9:28

vulnerability is a big big issue and

9:30

it's one of the things that's made me

9:32

appreciate the fact that not only is

9:34

cloudflare a seven-figure investment for

9:36

me so i just want to be very transparent

9:37

i do invest in the stock but and look

9:39

there are other cyber security companies

9:41

even crowdstrike honestly crowdstrike

9:42

has probably a better forward valuation

9:45

a crowdstrike has a forward pe to 2025

9:47

of 90. cloudflare has a forward pe of

9:51

353. now it's recently come down about

9:54

30 off of all-time highs it's performed

9:56

incredibly well uh they're expecting 39

9:59

year-over-year growth with 78 gross

10:01

margins crowdstrike is expecting

10:03

somewhere around 33 year-over-year gross

10:05

with 76 gross margins so these are these

10:08

are incredible companies but more

10:09

nascent technologies so you're paying a

10:11

lot valuation-wise for these companies

10:14

but these sorts of vulnerabilities

10:16

continue to reiterate to me gosh we

10:18

gotta we really gotta pay attention to

10:20

cyber security and i feel like it's just

10:22

it's not sexy yet because we're not

10:24

seeing the big big hacks yet but i think

10:27

personally we're starting to see the red

10:29

flags the red flags are the crypto

10:31

glitch we saw yesterday the aws outages

10:33

that we keep seeing the fact that

10:35

companies like crowds cloudflare can

10:38

stand in between servers and clients to

10:39

prevent these sorts of crazy issues

10:42

cyber security is is something that

10:43

people think of when you need it it's

10:46

kind of like you don't wake up thinking

10:47

about the cops every day but you know

10:49

they're there uh no i don't want to get

10:50

political about liking cops they're not

10:52

liking cops right but the point is you

10:53

like you expect the cops to show up if

10:55

you dial 9-1-1 right imagine if you

10:57

didn't have a 9-1-1 that'd be kind of

10:59

like being naked on the internet without

11:01

uh

11:02

cyber security firms so it doesn't have

11:04

to be these companies but i highly

11:05

encourage pay attention to cyber

11:06

security going forward for this next

11:08

decade because when jay pal says that is

11:10

the biggest risk we face and we're

11:11

seeing these massive sorts of

11:13

vulnerability that could give people

11:15

access to to basically any server across

11:18

the world it's no surprise that hacks

11:19

like what we saw with uh crypto are

11:21

happening or not necessarily hacks or it

11:24

could have just been a glitch but um i

11:26

get sussed out when i think that

11:29

okay it's just a glitch that'll excuse

11:32

me then all of a sudden sorry i get

11:33

allergic and i start coughing when i

11:36

think of all the bs that this isn't

11:37

actually a hack

11:38

anyway

11:40

why do i not think it's it's uh it's a

11:42

glitch i think it's not because why all

11:44

of a sudden are we getting some random

11:46

altcoin uh called cocos uh showing up at

11:49

the top of coin market cap as the number

11:51

one most uh substantial

11:55

cryptocurrency

11:57

and we see that despite it not even

11:59

lining up price wise uh with

12:03

uh with bitcoin or ethereum after the

12:05

glitch this is a token that's ranked 483

12:08

right now on coin market cap uh it's

12:10

down three percent today but i i'm just

12:12

a little sussed out when you see if see

12:14

things that kind of leave the

12:15

fingerprints or the breadcrumbs of a

12:17

hack

12:18

it kind of makes me start thinking about

12:20

cyber security now i could be wrong

12:21

about all this it's just my opinion

12:23

about this glitch we saw we know this

12:26

massive vulnerability exists and let's

12:28

just say i'm buying the dip on

12:30

cloudflare

12:31

okay full transparency out there if you

12:33

appreciate these sorts of videos please

12:35

consider checking out my programs and

12:36

building your wealth check out that link

12:37

down below for a wealthfront and folks

12:40

we'll see in the next one thanks so much

12:41

goodbye

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.