Attackers Pounce on Zero-Day Java Exploit

Discussion in 'malware problems & news' started by siljaline, Aug 27, 2012.

Thread Status:
Not open for further replies.
  1. siljaline

    siljaline Registered Member

    Joined:
    Jun 29, 2003
    Posts:
    6,617
  2. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,653
    Blog by Dutch security company Fox-IT from a few days ago:
    "Observations on the recent Java 0-day exploits in the wild"
    http://blog.fox-it.com/2012/08/30/observations-on-the-recent-java-0-day-exploits-in-the-wild/

    May I quote just only one interesting part because it links to Dorifel :

     
    Last edited: Sep 1, 2012
  3. mick92z

    mick92z Registered Member

    Joined:
    Apr 27, 2007
    Posts:
    548
    Location:
    Nottingham
    I have java on my computers. I have no idea how much, or if its used at all. There are other users that constantly play games/videos, that's why i keep it. I guess Sandboxie would protect me anyway, however I have removed it, and will see if I actually need it at all
     
  4. iammike

    iammike Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    342
    Location:
    SE Asia
    I am the same, I have been installing Java on every computer when it still was called Microsoft Java Virtual Machine and I always thought it was necessary, but just since a couple of days ago (discovering the first Zero Day Exploit) I have uninstalled Java and I am surprised to have learned that not that many Websites (in my case that is) use Java. My personal guess is that the problem will be a lot greater when a Zero Day exploit is to be found in Flash. But then again Java and Flash are the first things people install on their PC ;)
     
    Last edited: Sep 2, 2012
  5. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    For users of FireFox, SeaMonkey, PaleMoon, and other Mozilla browsers, the PrefBar extension provides an easy way to enable java, flash, javascript, and other options. This is one of the simplest ways to mitigate the risk from vulnerable extensions like java. You can leave java, flash, etc disabled by default and allow it only when needed on sites that you trust.
    prefbar.gif
     
  6. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Java Exploit info

    So as usual, those of us with AntiExe etc software, and/or default/deny policies, have Nothing to fear :D
     
  7. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Java 0day analysis (CVE-2012-4681)


    -http://immunityproducts.blogspot.ca/2012/08/java-0day-analysis-cve-2012-4681.html-

    I don't understand most of the technicalities, but in short: the exploit is able to execute with full permissions!
     
    Last edited: Sep 3, 2012
  8. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  9. Longboard

    Longboard Registered Member

    Joined:
    Oct 2, 2004
    Posts:
    3,238
    Location:
    Sydney, Australia
  10. Dundertaker

    Dundertaker Registered Member

    Joined:
    Oct 17, 2009
    Posts:
    391
    Location:
    Land of the Mer Lion
    In addition to disabling Java in browsers, are there any firewall settings that can be set for additional protection..?
     
  11. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    If you are using an application outbound control firewall, the trojan should not be able to download other malicious payloads. See Rmus' post #37 this thread:

    -http://www.wilderssecurity.com/showpost.php?p=2107470&postcount=37-
     
  12. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    With Java disabled, then the Java exploit code cannot execute, and the firewall would not come into the picture.

    Now, if Java is enabled, one possibility to have the firewall protect is if the exploit uses the Java engine to connect out.
    If the user doesn't have the Java.exe application white listed in the Firewall list, then the Firewall will alert:

    java_ff_1.jpg

    NOTE: This site hosts the Blackhole Exploit Kit which has an "updated" version of the exploit which does run against my Java v. 6

    If I deny the outbound connection, then an error message appears:


    java_ff_2a.jpg

    So, the Java exploit fails to run.

    But the user may not be out of danger just yet! The Blackhole Exploit Kit will serve up another exploit if the Java exploit fails.

    The post that wat0114 links to shows the scenario on a site that hosted the Blackhole Kit, where the Zero-Day Java Exploit code did not execute against Java 6 on my computer (the plugin was enabled).

    Then, the exploit code on the site served up another exploit, the one that targets the Microsoft Help Center.

    That application (helphost.exe) attempting to connect out causes the Firewall to alert (that application is not authorized by me -- non-white listed).

    For testing, I permitted the connection out to snag the executable payload.

    regards,

    -rich
     
    Last edited: Sep 3, 2012
  13. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Java Still Not Safe, Security Experts Say.

    -- Tom
     
  14. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    LOL @ that guy going through all those steps. The best solution is to nuke the hard drive and reinstall fresh (after backing up of course). This should be the one and only step you take when faced with a rootkit.
     
  15. sandals

    sandals Registered Member

    Joined:
    Sep 25, 2012
    Posts:
    1
    Location:
    USA
    Does anyone know if ESET protects against this exploit? Or, is this the same threat that Microsoft issued an update for at http://support.microsoft.com/kb/2736233
    ? Any information appreciated!
     
  16. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Yes it does :thumb:
     
  17. boombastik

    boombastik Registered Member

    Joined:
    Oct 7, 2010
    Posts:
    272
    Location:
    Greece
    If we have installed java on our computer and we disable from our browser (from example mozilla) , we are safe?
     
  18. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Yes. You are safe if you disable the plugin.
     
  19. PJC

    PJC Very Frequent Poster

    Joined:
    Feb 17, 2010
    Posts:
    2,959
    Location:
    Internet
    This JAVA= Just Another Vulnerability Added...:mad:
    Where is it going to stop? o_O
    Unfortunately, many sites and Apps require this necessary "evil"...:mad:
     
  20. CyberMan969

    CyberMan969 Registered Member

    Joined:
    Apr 21, 2011
    Posts:
    589
    Damn right... Java (and Adobe Flash) should be simply called ...SecurityHoleware! Thank god for Sandboxie/Shadow Defender keeping the real system safe from such crap, even when antiexecution is not present or active for some reason.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.