Cybercriminals exploit Java 0-day fears to serve malware
Posted on 18.01.2013
With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look for updates for the popular computing platform.

As expected, malware peddlers were quick to exploit this development and have already set up compromised websites that supposedly offer the latest update (7u11) for download:

"The fake update in question is javaupdate11.jar, which contains javaupdate11.class that downloads and executes malicious files up1.exe and up2.exe," Trend Micro researchers shared.

The two files are the Andromeda backdoor, which connects to a remote server and makes it possible for the attacker to take control of the infected system, and a spyware variant that logs users' keystrokes and accesses other websites to download additional malware (in this case a faulty piece of ransomware).

The researchers warn users who plan to update their Java to make sure to get it from a reliable source (Oracle's website) and not third-party sites.

"The use of fake software updates is an old social engineering tactic. This is not the first time that cybercriminals took advantage of software updates," they concluded.

In fact, only a week ago they have been spotted exploiting the fact that Google released the latest version of its Chrome browser to saddle users with malware.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th