Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New Java Exploit Spotted in the Wild

Security researchers from FireEye have discovered a new zero-day Java vulnerability that is being targeted in the wild.

According to FireEye researcher Atif Mushtaq, the latest version of Java 7 is vulnerable, but some reports say Java 6 and earlier versions may not be vulnerable.

Security researchers from FireEye have discovered a new zero-day Java vulnerability that is being targeted in the wild.

According to FireEye researcher Atif Mushtaq, the latest version of Java 7 is vulnerable, but some reports say Java 6 and earlier versions may not be vulnerable.

Java Zero Day Vulnerability“In my lab environment, I was able to successfully exploit my test machine against latest version of Firefox with JRE version 1.7 update 6 installed,” he wrote on the company blog

The exploit was found on a server in China, and if it successfully attacks a given endpoint, the payload that is delivered is hosted on the same server. While the IP address associated with the malicious box has been known to serve malware in the past, it isn’t responding to browser connections. Nevertheless, the IP is live.

“It’s just a matter of time that a POC will be released and other bad guys will get hold of this exploit as well. It will be interesting to see when Oracle plans for a patch, until then most of the Java users are at the mercy of this exploit. Our investigation is not over yet; more details will be shared on a periodic basis.” Mushtaq concluded.

And Mushtaq was correct in his assumptions. 

On Monday, the Metasploit Exploit team at Rapid7 said they found the PoC and had developed a working exploit that they say enables a successful attack against a fully patched Windows 7 SP1 with Java 7 Update 6.

“As a user, you should take this problem seriously, because there is currently no patch from Oracle. For now, our recommendation is to completely disable Java until a fix is available,” a blog post from Rapid7 notes.

According to Jaime Blasco from AlienVault, the malware appears to be a Poison Ivy variant and connects to hello.icon.pk port 80 which resolves to 223.25.233.244.

Advertisement. Scroll to continue reading.

Once again, it’s wise to remove Java if it isn’t absolutely needed in your environment. Most home users have little need for the software these days, and most experts agree the risk outweighs the reward when it comes to installing it.

If you must have Java installed, be sure to be relentless about patching with the latest security updates. Additionally, AlienVault’s Blasco reminds that it is a good idea search logs for connections to the Domains/IPs related to this attack.

Related InsightBlackHole Exploit – A Savvy Cyber Gang Driving a Massive Wave of Fraud

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.