Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Cybercrime
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Phony Java Patch Pushes Malware
Phony Java Patch Pushes Malware

By Jennifer LeClaire
January 18, 2013 10:46AM

Bookmark and Share
"Updates, patches and hot-fixes should always come directly from the vendor," said analyst Richard S. Westmoreland of the fake Java patch. "Companies should remind their employees to wait for instructions from their management and IT administrators and not try to 'solve' their own computer problems in ways that have not already been authorized."
 


With all the Java security problems, it's hardly surprising that malware authors would move to take advantage of the whirlwind. Ironically, a new ransomware campaign is targeting consumers looking to download the latest Java patch to keep their systems safe.

Trend Micro has warned of malware that poses as Java Update 11, created by an unknown publisher. According to Trend Micro, the fake update in question is javaupdate21.jar and it downloads and executes malicious files.

"Once executed, this backdoor connects to a remote server that enables a possible attacker to take control of the infected system," Paul Pajares, a fraud analyst at Trend Micro, wrote in the company's Security Intelligence Blog.

"Though the dropped malware does not exploit CVE-2012-3174 or any Java-related vulnerability, the bad guys behind this threat are clearly piggybacking on the Java zero-day incident and users' fears. The use of fake software updates is an old social engineering tactic."

Not a New Trick

Pajares noted that this is not the first time that cybercriminals took advantage of software updates. Last year, we reported about malware disguised as Yahoo Messenger, which Trend Micro found in time for Yahoo's announcement of its update for Messenger.

"During our analysis, this ransomware locks users' screen and attempts to access specific sites to display its notification to users," Pajares said. "However, the malware we analyzed failed to download the said notification, thus the user is possibly left with a blank page."

Richard S. Westmoreland, Level III security analyst and team leader at Perimeter E-Security, told us social engineering is still the most successful way of breaching systems.

"Updates, patches and hot-fixes should always come directly from the vendor," Westmoreland said. "Companies should remind their employees to wait for instructions from their management and IT administrators and not try to 'solve' their own computer problems in ways that have not already been authorized."

Malware Is Big Business

Alex Horan of CORE Security said that if you ever wanted proof that malware is an active business, look how quickly the malware providers respond to events.

"They leverage trending events -- like Hurricane Sandy, relief drives, elections -- to increase the likelihood of a victim interacting with their malware and exposing themselves to risk," Horan told us.

"'Trust but verify' should be the maxim for dealing with any messages or requests you receive. Even if it makes perfect sense for the IT department to be warning you of the Java exploit and sending you a link to download the patch, you should still call and verify it is truly an e-mail from them and not from an attacker."
 

Tell Us What You Think
Comment:

Name:

Paul:

Posted: 2013-01-23 @ 8:01pm PT
Very informative. Thank you for letting people know Java has no update, info on a fix is a fraud.

Spade:

Posted: 2013-01-19 @ 3:38pm PT
This again?!
What does Malware even want with us?! I see no reason for them to attack us!
WHAT THE HECK DID WE- THE USERS- EVEN DO?

Here I am, a day after gettind Java Version 7 Update 11 and hear THIS.
YEA, WE'RE PRETTY DARN DOOMED FOR NO REASON.
STUPID MALWARE.



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Cybercrime
1.   Can Google Stop Zero Day Flaws?
2.   FBI Cyber-Expert's Humble Start
3.   Chinese Man Charged with Hacking
4.   Russian Hackers Attack CNET
5.   Kansas Won't Release Test Data


advertisement
Can Google Stop Zero Day Flaws?
Security top priority for search giant.
Average Rating:
Russian Hackers Attack CNET
Getting to the bottom of exploit is key.
Average Rating:
Kansas Won't Release Test Data
After cyberattacks and other problems.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Juniper DDoS Solution Aims at High-IQ Networks
In the face of more complex attacks, Juniper Networks is boosting its DDoS Secure solution to help companies mitigate the threats with more effective security intelligence throughout the network fabric.
 
Large-Volume DDoS Attacks Hit Record in 2014
The number of distributed denial-of-service (DDoS) attacks set a record in the first half of 2014, according to a report by Arbor Networks. The number of attacks over 20 GB/sec doubled.
 
U.N.: Nations Hide Rise in Private Digital Snooping
Governments on every continent are hiding an increasing reliance on private companies to snoop on citizens' digital lives, the U.N. human rights office says, with grave concerns about privacy.
 

Enterprise Hardware Spotlight
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.