Hundreds of millions of devices are likely affected. So far, attackers have exploited the flaw to install crypto miners on vulnerable systems, steal system credentials, burrow deeper within compromised networks, and steal data. A vulnerability in the open-source Apache logging library Log4j sent system administrators and security professionals scrambling over…