Java Attacks Spiking

Researchers see increase in malicious Trojans favoring built-in Java functionality over application-related vulnerabilities.

Mathew J. Schwartz, Contributor

January 11, 2011

2 Min Read
Dark Reading logo in a gray background | Dark Reading

Top 10 Security Stories Of 2010

Top 10 Security Stories Of 2010


(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Attackers are increasingly relying on Java to execute drive-by attacks.

According to a recently released report from Kaspersky Lab, "in the latter stages of a drive-by attack" a fast-growing class of Trojan applications are using Java functionality, rather than operating system or application vulnerabilities, to help infect computers with more malicious code.

In particular, attackers "employ the OpenConnection method of a URL class" to deliver an Internet connection to their Trojan application, according to Kaspersky's Vyacheslav Zakorzhevsky. "Instead of exploiting vulnerabilities, [they] use standard Java functionality to download and run files from the Web. This is currently one of the prime download methods for malicious programs written in Java."

It's also quite prevalent, with two OpenConnection Trojans placing among the top 10 most-seen malicious programs last month. "At the height of their activity the number of computers on which these programs were detected in a 24-hour period exceeded 40,000," he said.

Attackers have also recently been polishing the TDSS rootkit, which Zakorzhevsky describes as "one of today's most complex malicious programs." Last month, its creators modified it to take advantage of a task scheduler vulnerability in Microsoft Windows 7, Vista, and Server 2008, which was discovered by security researchers who were analyzing Stuxnet. The related vulnerability was patched by Microsoft in December.

If some attackers continue to push the envelope with Java and cutting-edge rootkits, others are still relying on what's tried and true, such as attacks against social networks and e-mail spam.

On the spam front, a report released by Sophos on Tuesday found that the United States continues to lead the world when it comes to relaying spam. In fact, from October to December 2010, 19% of all spam was relayed via the United States.

Interestingly, global spam volumes uncharacteristically dipped at Christmastime, with some industry watchers reporting that the normally prolific Rustock botnet appeared to be spewing less spam than usual.

But the dip suggests that "the bad guys are now using the botnet for other activities," said Graham Cluley, senior technology consultant at Sophos. "For instance, installing revenue-generating pop-up adverts or [practicing] identity theft [on] unsuspecting home users."

Furthermore, the dip was short-lived. As of Monday, said Cluley, the volume of spam being served by Rustock had returned to its pre-holiday levels.

About the Author

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights