Jump to content

New Malware Exploiting Java 7 In Windows And Unix Systems


Maestro

Recommended Posts

New malware exploiting Java 7 in Windows and Unix systems

by Topher Kessler January 11, 2013 1:32 PM PST

Mal/JavaJar-B is a cross-platform exploit of a new zero-day vulnerability in the latest Java runtimes.

A new Trojan horse called Mal/JavaJar-B has been found that exploits a vulnerability in Oracle's Java 7 and affects even the latest version of the runtime (7u10).

The exploit has been described by Sophos as a zero-day attack since it has been found being actively used in malware before developers have had a chance to investigate and patch it. The exploit is currently under review at the National Vulnerability Database and has been given an ID number CVE-2013-0422, where it is still described as relatively unknown:

"Unspecified vulnerability in Oracle Java 7 Update 10 and earlier allows remote attackers to execute arbitrary code via unknown vectors, possibly related to "permissions of certain Java classes," as exploited in the wild in January 2013, and as demonstrated by Blackhole and Nuclear Pack."

Read more: http://reviews.cnet....d-unix-systems/

  • Like 1
Link to comment
Share on other sites

Thanks for this information.

Explains what happened to me three days ago.

Spent an hour getting totally rid of "Microsoft Home Security 2013" - a 'rogue' program.

Wondered where it had come from - must have been a website for a well known lighting firm that wanted to run Java.

Usually, when asked, I don't let it run, but allowed it this time!

Lesson learnt.

Link to comment
Share on other sites

My Internet connection has been awfully slow the whole day but I have now done some Google searches. Apparently, JavaJar, also spelt Java Jar or Java-Jar or Java -Jar, has been around since October last year, stands for Java Archive and is not the trojan itself, only a vehicle for the delivery of various trojans by different names (example described here: www.f-secure.com/v-descs/fortnight.shtml). Thus it seems impossible to determine if a computer is infected by JavaJar, and I am at the moment running a complete system scan with my antivirus software Avast!

I wonder if web designers could shed some light on how it works and what precautions we should take, how to check if a computer has already been affected.

Link to comment
Share on other sites

My Internet connection has been awfully slow the whole day but I have now done some Google searches. Apparently, JavaJar, also spelt Java Jar or Java-Jar or Java -Jar, has been around since October last year, stands for Java Archive and is not the trojan itself, only a vehicle for the delivery of various trojans by different names (example described here: www.f-secure.com/v-descs/fortnight.shtml). Thus it seems impossible to determine if a computer is infected by JavaJar, and I am at the moment running a complete system scan with my antivirus software Avast!

I wonder if web designers could shed some light on how it works and what precautions we should take, how to check if a computer has already been affected.

You can use a vulnerability scanner which are more efficient than antivirus (zero-day updates). I'm using BoomScan from www.boomsecurity.com (good price) for my computers and my business and it's working great.

Link to comment
Share on other sites

As a web designer (I must stress that I work with jscript, php, css and html so I am as clueless as you) I have not come across applications needing java in quite a while. It is an old heavyweight that can be used to write applications without having to worry about install routines (i.e. when an AV pops its head up). Since disabling it I have noticed nothing different on the internet. I think that Java itself is rarely called for in day to day internet usage. Google docs had some java functionality, but I think that has long gone (indeed a quick check has shown that it is still functioning normally even though I have disabled Java...probably in favour of AJAX or Flex). Roughly put I reckon that uninstalling Java will probably find us not noticing for some time, even then we might not be inclined to re-install when prompted.

Here is the link to a blog discussing the demise of Java (written in 2011). http://rothisblog.bl...ax-vs-java.html

For those that can't be bothered to find the reference it is this section

But then I learned that people had one problem with that application: It was the one-time installation of the Java plugin. First I didn't take those guys seriously: I could not believe that people are too lazy to install a plugin - once! Well: They were. Then technologies emerged pimping html with special Javascript code and all this amazing stuff was called Ajax. I even wrote an article about this new technology in the XML magazine (German). Ajax made it's way, Java applets are very old-fashioned nowadays, nobody uses them any longer.

I think the internet connection issues where something else as I suffered those for the past couple of days with a host of sites not responding/responding slowly (TVF included) for the past 48 hours. This morning everything seems to be more responsive. It was a weird selection of sites too (i.e. no common geographic location).

  • Like 1
Link to comment
Share on other sites

You dont need to uninstall Java. It is sufficient to turn off the Java browser plugins/helpers/add-ons either from the Java control panel applet or from the individual browser settings. This way you easily turn it back on if you need it for some site.

I wouldn't take the risk. Dump the shit, they are hopeless at securing it.

Link to comment
Share on other sites

It is comforting to know that Oracle plans a release to fix the Java vulnerability that was uncovered on Thursday. It is not so comforting when the only timeline given is "shortly."

A fix will be available shortly," the company said in a statement released late Friday.

The Department of Homeland Security's U.S. Computer Emergency Readiness Team (US-CERT) and computer security experts said on Thursday that the Java security bug has already been exploited in the wild. Most recommend that the safest -- and easiest -- precaution for end users to take is to uninstall Java, until a fix is issued.

Other companies have taken their own steps, with Apple blocking the use of the Java plug-in on its OS X platform, and Mozilla blocking Java use in its Firefox browser.

http://www.examiner.com/article/oracle-promises-fix-for-new-java-vulnerability-but-gives-no-timeframe

Link to comment
Share on other sites

Today is not day zero any more, so I wonder whether my AV's (avast and Avira, depending on which computer we are talking about) have the antidote already.

My home computer has a brand-new (2 weeks old) Windows 7, and as usual, I installed everything from scratch. No website has asked me to install Java yet, and I just checked for plugins on Firefox and I don't seem to have it. So, this supports daftvader's theory that not many websites use Java now.

Link to comment
Share on other sites

Today is not day zero any more, so I wonder whether my AV's (avast and Avira, depending on which computer we are talking about) have the antidote already.

My home computer has a brand-new (2 weeks old) Windows 7, and as usual, I installed everything from scratch. No website has asked me to install Java yet, and I just checked for plugins on Firefox and I don't seem to have it. So, this supports daftvader's theory that not many websites use Java now.

No, but unfortunately Oracle do!

Link to comment
Share on other sites

I noticed that installing a new Windows today.

Oracle has issued an emergency fix for its Java software, which security experts said is being exploited to carry out identity theft and other crimes — but flaws remain which can still be exploited, researchers say.

The fix, available from the Oracle website, is intended to block an exploit in Java from running in web browsers, which the US Department of Homeland Security said was being "actively exploited".

The new fix from Oracle, which updates Java to Java 7 update 11 (known as 7u11) sets the default Java security settings to "high", so users are prompted before their systems will run Java applets from an unknown source — as a hacker's code would be.

http://www.guardian.co.uk/technology/2013/jan/14/oracle-issues-emergency-fix-java

Link to comment
Share on other sites

On Twitter people are saying even the new patches have security holes so I removed JAVA and will see if I can live without it as many people are saying I can do. If I have problems, I will install the latest JAVA version if I have to.

Link to comment
Share on other sites

Today is not day zero any more, so I wonder whether my AV's (avast and Avira, depending on which computer we are talking about) have the antidote already.

My home computer has a brand-new (2 weeks old) Windows 7, and as usual, I installed everything from scratch. No website has asked me to install Java yet, and I just checked for plugins on Firefox and I don't seem to have it. So, this supports daftvader's theory that not many websites use Java now.

No, but unfortunately Oracle do!

I am not aware of using Oracle on my computer.

BTW, Avira has informed me with today's update on the home computer that they don't need to worry about the Java 7 Exploit any more.

Link to comment
Share on other sites

Just for your information. Here is my virus chest (i.e. secure storage through the antivirus) this morning after the boot-time scan. Remember that I updated my Java yesterday and Avast! updated their definitions yesterday too.

post-68756-0-91064800-1358221374_thumb.j

Forgive the black "anonymity" bar wink.png. In short - UNINSTALL. See my earlier post for a simple version of the uninstall, but I took no chances and used

http://www.revouninstaller.com/revo_uninstaller_free_download.html and used the "Advanced" option!

Link to comment
Share on other sites

Just for your information. Here is my virus chest (i.e. secure storage through the antivirus) this morning after the boot-time scan. Remember that I updated my Java yesterday and Avast! updated their definitions yesterday too.

post-68756-0-91064800-1358221374_thumb.j

Forgive the black "anonymity" bar wink.png. In short - UNINSTALL. See my earlier post for a simple version of the uninstall, but I took no chances and used

http://www.revounins...e_download.html and used the "Advanced" option!

It's unlikely that all those files just appeared there because you updated Java. Try emptying your Browser cache and scanning again.

Having already installed v11 I updated AVG and did a full scan and found nothing. In your case it's most likely stuff from dodgy sites you've visited, whereas I am purer than the driven snow.

*Blink*

Edited by Chicog
Link to comment
Share on other sites

Just for your information. Here is my virus chest (i.e. secure storage through the antivirus) this morning after the boot-time scan. Remember that I updated my Java yesterday and Avast! updated their definitions yesterday too.

post-68756-0-91064800-1358221374_thumb.j

Forgive the black "anonymity" bar wink.png. In short - UNINSTALL. See my earlier post for a simple version of the uninstall, but I took no chances and used

http://www.revounins...e_download.html and used the "Advanced" option!

It's unlikely that all those files just appeared there because you updated Java. Try emptying your Browser cache and scanning again.

Having already installed v11 I updated AVG and did a full scan and found nothing. In your case it's most likely stuff from dodgy sites you've visited, whereas I am purer than the driven snow.

*Blink*

Not a bad thought, but I must let you know that the full address is that of the Java deployment cache! It looks like they might be left over from Java 6, but surely part of the upgrade routine should be to clean up the existing problem. If not then it can't be possible to recommend upgrading to the latest version (7) to solve the problem.

Out of curiosity I have found that the only problem program I had on my computer that wanted Java was JDownloader. Sure it is a nice app, but I'm sure a little research will dig up a decent "non-Java" alternative.

Edited by draftvader
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.









×
×
  • Create New...