Log4j vulnerability: The perfect Trojan horse