Posted on 01/17/2013 7:55:07 AM PST by Ernest_at_the_Beach
Unpatched Java installations may have helped spread the malware responsible for the recently uncovered "Red October" cyber-spying campaign, researchers at Seculert have revealed.
Kaspersky Labs first disclosed the existence of Red October on Monday, claiming that the program had been responsible for attacks on systems in Eastern European countries, former Soviet republics, and Central Asian nations over the last five years.
The primary vectors used to install the malware were emails containing attached documents that exploited vulnerabilities in Microsoft Word and Excel. Recipients who opened the documents became unwitting participants in the cyber-espionage scheme.
But further investigation by Seculert has revealed that Red October's masterminds had a backup plan namely, installing the malware by directing users to a web page that exploited a known vulnerability in the Java browser plugin.
In a blog post on Tuesday, Seculert researchers explained that a special folder on the Red October command-and-control servers contained a PHP page that could exploit the Java flaw, causing the hapless victim's browser to download and execute Red October's "Rocra" malware automatically.
Similar exploits have made headlines in recent months, with hackers and security researchers exposing a seemingly endless series of Java vulnerabilities that could allow attackers to compromise client machines. Occasionally, researchers have discovered sites that actively exploit these flaws in the wild.
In the case of Red October, the specific vulnerability targeted was an old one, CVE-2011-3544, which Oracle fixed with a Critical Patch Update in October 2011.
It may seem strange that Red October's authors would go after such an ancient flaw, given that their exploit code was compiled in February 2012, well after a fix had already been issued. But these Java vulns have a way of lingering around on unpatched machines.
In fact, CVE-2011-3544 was one of the Java vulnerabilities used to spread the Mac-specific Flashback Trojan in early 2012. One of the reasons that attack was so successful was because at the time, security fixes for Apple's Mac OS Xspecific version of Java tended to lag behind fixes for the mainline version.
Even Oracle has been known to take its sweet time patching potentially risky Java bugs. In August 2012, Adam Gowdiak of Polish firm Security Explorations revealed that although he had promptly informed Oracle of several serious vulnerabilities he had discovered, the database giant dragged its feet for more than four months before issuing patches, a delay that gave cyber-crooks time to discover and exploit the flaws. And even then, Oracle's fix didn't fully address the problem.
Metasploit founder HD Moore claims it will likely take Oracle two years to get its Java security house in order, given its past track record. Little wonder, then, that no less than the US Department of Homeland Security has cautioned users to disable Java in their browsers "unless it is absolutely necessary."
According to Seculert, Java flaws probably weren't involved in most Red October infections, but only because a misconfigured server disabled the PHP code that would have delivered the exploit.
If hackers were looking for a new way to keep Red October going, however, it wouldn't be hard to find one. On Sunday, security researchers announced that a new, unpatched Java security hole had already been discovered following Oracle's most recent patch, and that one enterprising hacker was offering to sell an exploit kit at a price of $5,000 a throw. ®
I have programs that are Java dependent. Oh well . . .
fyi
Do you keep personal data on the same computer?
I have always hated Java. I hate it even more now.
Mac Purists will descend on the thread in 5, 4, 3...
Yes I do.
Post #9 was a ping to the second half of my ping list.
Thank you.
Bookmark.
I suggest that everyone install the add-on “QuickJava” for their browser. I know it is available for FireFox, and is likely available for others.
It provides a row of buttons on the bottom edge of the browser window for each of: Java, JavaScript, Flash, Silverlight, CSS, and some others. It is a snap to enable/disable those features for any web site.
I almost always run with Java disabled, but occasionally will allow it. I have never enabled Silverlight. It is often interesting to disable CSS. Disabling Flash provides some better security for some pages, as well as faster loading times. For some sites, loading with “images” disabled greatly speeds up access.
Try QuickJava - I bet you will like it and hate Java less!
I’m not high tech at all. What do I now with this Java problem? Seems like a lot of stuff needs Java to run properly.
Bump
Now Ive got a popup to install Java 1.7.0_11. Should I or should I not install?
Im not high tech at all.
What should I do with this Java problem? Seems like a lot of stuff needs Java to run properly.
NO NO NO NO NO
DO NOT INSTALL JAVA THROUGH THE POPUP
IT IS A VIRUS EXPLOIT !!!!!
Sorry I didn’t see this earlier. I hope I am in time.
See link here:
http://dottech.org/93867/beware-of-fake-java-update-patch-it-contains-malware/
Seems like I need Java for all the video stuff I watch on the computer. Awhile back, I disabled Java and all the video stuff (live streaming, YouTube, weather.com, MLB, NFL, etc.) had problems. When I reinstalled/reenabled Java, things seemed to run better.
So it seems like Java helps things to run, but it sounds like there are some kind of virus risks with Java. Down to either my computer doesn't work well without Java or gets a virus with Java and doesn't work at all. Not good choices here. Any suggestions?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.