Cybercriminals exploit Java 0-day fears to serve malware
Posted on 18.01.2013
With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look for updates for the popular computing platform.

As expected, malware peddlers were quick to exploit this development and have already set up compromised websites that supposedly offer the latest update (7u11) for download:


"The fake update in question is javaupdate11.jar, which contains javaupdate11.class that downloads and executes malicious files up1.exe and up2.exe," Trend Micro researchers shared.

The two files are the Andromeda backdoor, which connects to a remote server and makes it possible for the attacker to take control of the infected system, and a spyware variant that logs users' keystrokes and accesses other websites to download additional malware (in this case a faulty piece of ransomware).

The researchers warn users who plan to update their Java to make sure to get it from a reliable source (Oracle's website) and not third-party sites.

"The use of fake software updates is an old social engineering tactic. This is not the first time that cybercriminals took advantage of software updates," they concluded.

In fact, only a week ago they have been spotted exploiting the fact that Google released the latest version of its Chrome browser to saddle users with malware.






Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //