Unpatched Java vulnerability exploited in Blackhole-based attacks
Attacks exploiting a new Java vulnerability have become widespread, Kaspersky researchers say
IDG News Service - Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from antivirus vendor Kaspersky Lab.
"The first victim regions to be hit with the Blackhole stuff were the U.S., the Russian Federation, Belarus, Germany, the Ukraine and Moldova," Kaspersky senior security researcher Kurt Baumgartner said Tuesday in a blog post.
Blackhole is one of the most popular of the commercial exploit toolkits that cybercriminals use to automatically infect computers with malware when their owners visit malicious or compromised websites.
Blackhole is sold on the underground market and comes packed with a variety of exploits for known vulnerabilities in browser plug-ins such as Java, Adobe Reader and Flash Player.
After a reliable exploit for the new Java vulnerability -- now identified as CVE-2012-4681 -- was released on Monday, many security researchers warned that cybercriminals would soon start targeting the flaw on a large scale.
Rumors that the exploit had been integrated into Blackhole started circulating on Tuesday morning after the toolkit's creator allegedly posted an announcement about it on an underground forum.
"SophosLabs has seen samples of [the exploit] from Blackhole and are analyzing them now to determine if they actually work," Chester Wisniewski, a senior security adviser at antivirus firm Sophos, said Tuesday via email. "So, yes, we can confirm it has been added, but still working out if they did it right."
Security researchers from antivirus vendor ESET also confirmed via email that Blackhole now includes the exploit.
Kaspersky's new report shows that not only has the exploit been added to Blackhole, but the toolkit's customers have already started using it.
"In relation to the other exploits included in the pack, victims are getting hit only a fair number of times with the 0day [the unpatched vulnerability]," Baumgartner said.
This might be because, according to reports from various vulnerability researchers, this new flaw only affects Java 7. "Java 7 is not as widely deployed as other vulnerable versions of frequently attacked client-side software," Baumgartner said Tuesday via email.
This means that there might be, for example, more computers on the Internet that run outdated installations of Java 6 that are vulnerable to older Blackhole exploits, than computers running Java 7.
Most security researchers advised users to uninstall or disable the Java Web plug-in from their browsers. However, other options are also available to users who can't afford to do this because they use Java-based applications on a regular basis.
"Oracle needs to step it up and deliver an OOB [out-of-band] patch, which historically they have failed to do," Baumgartner said in the blog post. "Maybe this event will provide even more pressure to step up their security update delivery process."
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- HTTP Status Code Cheat Sheet Look at the Graph, Find the Code and Boom - You're Solving Problems. Identifying and understanding common HTTP status codes can go a...
- Architects lead the next generation of data-driven applications Read this whitepaper to find out how application architects can quickly and confidently deliver long-lasting applications that minimize cost, complexity, and risk while...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Desktop Apps White Papers | Webcasts