Cybercriminals exploit Java 0-day fears to serve malware
Posted on 18.01.2013
With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look for updates for the popular computing platform.

As expected, malware peddlers were quick to exploit this development and have already set up compromised websites that supposedly offer the latest update (7u11) for download:


"The fake update in question is javaupdate11.jar, which contains javaupdate11.class that downloads and executes malicious files up1.exe and up2.exe," Trend Micro researchers shared.

The two files are the Andromeda backdoor, which connects to a remote server and makes it possible for the attacker to take control of the infected system, and a spyware variant that logs users' keystrokes and accesses other websites to download additional malware (in this case a faulty piece of ransomware).

The researchers warn users who plan to update their Java to make sure to get it from a reliable source (Oracle's website) and not third-party sites.

"The use of fake software updates is an old social engineering tactic. This is not the first time that cybercriminals took advantage of software updates," they concluded.

In fact, only a week ago they have been spotted exploiting the fact that Google released the latest version of its Chrome browser to saddle users with malware.






Spotlight

Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 2nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //