Hackers exploit new Java zero-day bug
Song lyrics site redirects users to Russian attack server, which attacks IE, Firefox users
Computerworld - Just five days after a Google researcher published information of an unpatched Java bug, a compromised song lyrics site is sending users to a Russian attack server exploiting the flaw to install malware, an antivirus firm said today.
Last Friday, Google's Tavis Ormandy posted details of the Java vulnerability to the Full Disclosure security mailing list, spelling out how attackers could run unauthorized Java programs on a victim's machine by using a feature designed to let developers distribute their software. According to Ormandy, all versions of Java for Windows since SE 6 update 10 -- which debuted two years ago -- are vulnerable. Other operating systems running Java are unaffected, he said.
Roger Thompson, chief research officer at AVG Technologies, said Songlyrics.com was unwittingly redirecting users to a Russian attack server feeding Ormandy's exploit to victims.
Songlyrics.com includes an IFRAME that shunts visitors to the Russian site, where users are subjected to assault from both Ormandy's exploit as well as a larger-scale exploit toolkit. "Typically, they throw a whole bunch [of exploits at victims] at once and see what sticks," said Thompson via instant message, talking about the multi-stage attack that includes the Java exploit.
Songlyrics.com, which provides lyrics for tracks by the likes of Lady Gaga, Rihanna, Usher and Miley Cyrus, was apparently compromised by hackers, who added the redirecting IFRAME to the site, said Thompson. E-mails to the site's administrator have gone unanswered, he added.
Windows users running Microsoft's Internet Explorer (IE) and Mozilla's Firefox are at risk if they have the Java browser plug-in installed. "Chrome seems to be safe, but that's not guaranteed," Thompson said.
That hackers quickly jumped on the Java bug didn't shock him. "The code involved is really simple, and that makes it easy to copy, so it's not surprising that just five days later, we're detecting that code," Thompson said, referring to the attack code Ormandy published on the mailing list. He also figures that others will rapidly follow suit. "It's so easy to use and copy that I would expect that it'll be in the [exploit tool]kits in a few days."
Although Ormandy reported the flaw to Sun -- now part of Oracle -- he said the company declined to rush out a patch. "They informed me they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle," Ormandy wrote on the mailing list. "I explained [to them] that I did not agree, and intended to publish advice to temporarily disable the affected control until a solution is available."
Oracle patched Java last week; its next regularly-scheduled update is slated for July.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts