The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Build Apps 5x Faster
For Half the Cost Enterprise Cloud Computing
On Force.com
You are here: Home / Cybercrime / Phony Java Patch Pushes Malware
Gartner's #1 for endpoint backup
Phony Java Patch Pushes Malware
Phony Java Patch Pushes Malware
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
JANUARY
18
2013


With all the Java security problems, it's hardly surprising that malware authors would move to take advantage of the whirlwind. Ironically, a new ransomware campaign is targeting consumers looking to download the latest Java patch to keep their systems safe.

Trend Micro has warned of malware that poses as Java Update 11, created by an unknown publisher. According to Trend Micro, the fake update in question is javaupdate21.jar and it downloads and executes malicious files.

"Once executed, this backdoor connects to a remote server that enables a possible attacker to take control of the infected system," Paul Pajares, a fraud analyst at Trend Micro, wrote in the company's Security Intelligence Blog.

"Though the dropped malware does not exploit CVE-2012-3174 or any Java-related vulnerability, the bad guys behind this threat are clearly piggybacking on the Java zero-day incident and users' fears. The use of fake software updates is an old social engineering tactic."

Not a New Trick

Pajares noted that this is not the first time that cybercriminals took advantage of software updates. Last year, we reported about malware disguised as Yahoo Messenger, which Trend Micro found in time for Yahoo's announcement of its update for Messenger.

"During our analysis, this ransomware locks users' screen and attempts to access specific sites to display its notification to users," Pajares said. "However, the malware we analyzed failed to download the said notification, thus the user is possibly left with a blank page."

Richard S. Westmoreland, Level III security analyst and team leader at Perimeter E-Security, told us social engineering is still the most successful way of breaching systems.

"Updates, patches and hot-fixes should always come directly from the vendor," Westmoreland said. "Companies should remind their employees to wait for instructions from their management and IT administrators and not try to 'solve' their own computer problems in ways that have not already been authorized."

Malware Is Big Business

Alex Horan of CORE Security said that if you ever wanted proof that malware is an active business, look how quickly the malware providers respond to events.

"They leverage trending events -- like Hurricane Sandy, relief drives, elections -- to increase the likelihood of a victim interacting with their malware and exposing themselves to risk," Horan told us.

"'Trust but verify' should be the maxim for dealing with any messages or requests you receive. Even if it makes perfect sense for the IT department to be warning you of the Java exploit and sending you a link to download the patch, you should still call and verify it is truly an e-mail from them and not from an attacker."

Tell Us What You Think
Comment:

Name:

Paul:

Posted: 2013-01-23 @ 8:01pm PT
Very informative. Thank you for letting people know Java has no update, info on a fix is a fraud.

Spade:

Posted: 2013-01-19 @ 3:38pm PT
This again?!
What does Malware even want with us?! I see no reason for them to attack us!
WHAT THE HECK DID WE- THE USERS- EVEN DO?

Here I am, a day after gettind Java Version 7 Update 11 and hear THIS.
YEA, WE'RE PRETTY DARN DOOMED FOR NO REASON.
STUPID MALWARE.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN CYBERCRIME
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 

Enterprise Hardware Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Mobile Technology Spotlight
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.