Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Java Windows

Browser Exploit Kits Using Built-In Java Feature 96

tsu doh nimh writes "Security experts from several different organizations are tracking an increase in Windows malware compromises via Java, although not from a vulnerability in Windows itself: the threat comes from a feature of Java that prompts the user to download and run a Java applet. Kaspersky said it saw a huge uptick in PCs compromised by Java exploits in December, but that the biggest change was the use of this Java feature for social engineering. Brian Krebs writes about this trend, and looks at two new exploit packs that are powered mainly by Java flaws, including one pack that advertises this feature as an exploit that works on all Java versions."
This discussion has been archived. No new comments can be posted.

Browser Exploit Kits Using Built-In Java Feature

Comments Filter:
  • by Anonymous Coward

    Download and run applet (Y/N)?

  • Java, or plugins.

    Slashdot works fine without Javascript (don't use the newfangled stuff).

    Time, NYTimes, many/most other sites are fine without JavaScript.

    When you need it, just also use another browser with JavaScript/Java/plugins turned on. I use Chrome for normal browsing, and Chromium when Javascript's needed.

    • by Anonymous Coward

      javascript != java

    • by Monkeedude1212 ( 1560403 ) on Monday January 10, 2011 @11:47AM (#34824476) Journal

      Ignoring the fact that this has nothing to do with Javascript - or IE. Some of the things they listed are simple social engineering attacks. You visit the site, asks you to run the Java Applet, the Java applet is malicious code. And if you can compromise someone's website to redirect you to your own look-alike with a malicious Java Applet asking to run, that looks like another prime strategy.

      The Java exploit is basically what takes what should be a seperate application and somehow gets more access than it should have, and probably installs something on the users computer like a trojan or worm.

      Browsing in Chrome won't save you from this. This is (sort of) a problem with the way Java Applets are handled - or a problem with the way users interact with the web (take your pick). They're both contributors to the problem really.

      • >Browsing in Chrome won't save you from this.

        Well, in my particular situation, I have Java, plugins, Javascript, etc. turned off for my Chrome installation.

        Not claiming that Chrome in itself is more secure (arguable, but I'm not arguing it).

    • Browse without Javascript, Java, or plugins.

      Or just browse without Java. I've had Java turned off for years, and don't miss it.

      Disabling Javascript leads to degraded performance and a degraded UI on some sites (note I said degraded, not non-functional, just not as nice), so it's not something most people would want to do. Javascript is pretty well sandboxed now in any case, and many exploits are through image file handling or things like that, which you'd still be vulnerable to.

      Your recommendation of another browser for Java would unfortunately leave

    • by Anonymous Coward

      Or use NoScript and only turn on scripts when the site requires it/for sites you trust.

      • That's the other option, and I used to do that for a long time with Firefox.

        These days, I just leave Javascript + plugins turned off in one browser, and on in another for when I need it.

        NoScript tends to take up a lot of time in setting the options, Javascript on, Javascript off. Also, I don't usually need to turn on Javascript forever for a whole site. Only usually for a specific page.

    • Whoever decided that the browser scripting language should be "Javascript" needs to be taken out back and shot.

      • Yeah. Same with that guy who started calling it "Cloud" Services. I called up that Amazon Rep and he said he didn't know a thing about Fog machines.

      • He already was. he worked for Netscape, and Netscape fired all those losers for designing a bad browser(4.0 communicator if memory serves)

      • Whoever decided that the browser scripting language should be "Javascript" needs to be taken out back and shot.

        You prefer maybe VBScript? If it's the name you don't like, just call it ECMAScript (of which Javascript, JScript and ActionScript are dialects of). Or maybe you would just prefer no scripting at all in your browser. That's fair enough, but you'll have to give up the user experience that makes sites like Google maps, Gmail and the like so compelling.

        • I think all the GP is complaining about is the fact that Java and Javascript have similar names, when they're not similar at all in purpose or usage, which confuses people.
          • by mark-t ( 151149 ) <marktNO@SPAMnerdflat.com> on Monday January 10, 2011 @01:18PM (#34825594) Journal
            The name Javascript was picked as a marketing ploy by the developers of Netscape in the 1990's, owing to the Java Programming Language, which at the time was seen as the next big thing for the web. Thus, they were hoping to capitalize on the term. I agree that the similarity of names has caused a lot of confusion, however... although there's squat all that can be done about it now.
            • Furthermore, JavaScript was called LiveScript at first (>= Netscape 2). JavaScript offers scriptability bindings to java applets. So JS is not completely unrelated to Java, however, marketing was probably the most dominant factor to call it that way.

            • I agree that the similarity of names has caused a lot of confusion, however... although there's squat all that can be done about it now.

              Well, we could all refer to it by the ISO designation ECZEMAScript, er, ECMAScript.

        • I would have gone for "HTMLscript" myself...

      • by Jonner ( 189691 )

        It was some marketing genius at Netscape. The language was originally known as "Livescript" but Netscape was pushing Java applets, so they renamed it.

  • by Anonymous Coward

    Browser Exploit Equipment Using Built-In Java Feature

    FTFY.

    (flashback humor. you would have had to of been here a few days ago.)

  • You mean wetware is easier to exploit than software? Wow. Who'd a thunk it?
  • Um, What? (Score:5, Insightful)

    by Rary ( 566291 ) on Monday January 10, 2011 @11:44AM (#34824444)

    People who click "OK" on random dialogs that ask them to confirm installation of something they didn't ask for are targets for malware, and this is news... because it's using Java? Am I missing something?

    • by oneiros27 ( 46144 ) on Monday January 10, 2011 @11:55AM (#34824580) Homepage

      It's not Java that's the security problem ... it's the user sitting at the machine.

      If you got rid of them, there wouldn't be the problem.

      • Re:Um, What? (Score:4, Insightful)

        by Monkeedude1212 ( 1560403 ) on Monday January 10, 2011 @12:20PM (#34824882) Journal

        Administering a network of a thousand computers with no users is way easier than a network of 100 computers with 100 users.

      • It's not like Java couldn't do something about it. I suggest they issue a "patch" for the user. First of all, out of my 250 or so customers for my repair business, 0% of those asked knew what Java is. So what they should do is instead of promoting Open Office while it's installing, have a little scrolling banner that explains what Java is. They used to have some obscure "Java is on your phone and DVR" type banner that raised more questions than answers so they'd have to do better than that.
        Then, when i
      • It's not Java that's the security problem ... it's the user sitting at the machine.

        If you got rid of them, there wouldn't be the problem.

        An acronym some IT folks use is

        PEBKAC:

        Problem Exists Between Keyboard And Chair

        • by Anonymous Coward

          I always liked "User Error: Replace user and press any key when ready."

      • It's not Java that's the security problem ... it's the user sitting at the machine.

        If you got rid of them, there wouldn't be a software industry

        FTFY

      • No need to take the drastic step of getting rid of users. Simply provide them with computers with no input devices (mice, keyboards, etc).
        • by Belial6 ( 794905 )
          You mean a TV? Oh, wait, that has a keyboard. Does your system count if the keyboard only has numbers and an enter key on it?
          • You mean a TV? Oh, wait, that has a keyboard. Does your system count if the keyboard only has numbers and an enter key on it?

            Absolutely it counts. If the users have a button (any button) to press, they'll find a way to hose the system.

            • by Belial6 ( 794905 )
              So, they will end up watching soap operas and wrestling? I think that might be a little pessimistic.
        • by sjames ( 1099 )

          Just give them the new Management User Interface [blogspot.com]. It's custom tailored to the needs of a typical middle manager.

        • by sznupi ( 719324 )

          Make it more foggy...cloudy?

      • Or just take the Apple approach and lock users out of their own devices. Ordinarily I'm against it, but when you think about the skill level of the average computer user, I can see how it'd be appealing.
        • Problem In Chair Not In Computer - an acronym I prefer, it sounds like something people would already know so you can put it in places where it might be read by other techs or supervisors without too much worry that it will come back to haunt you.

          The industrial revolution changed the amount of expertise an individual needed to produce a complex and reliable product to make end products generally less expensive and more reliable. It did so by moving specialization into ever smaller areas. The average user is

          • by sznupi ( 719324 )

            Adding next alternative to PICNIC - wouldn't "fog" be more apt description than "cloud" for such implementation priorities?

            • Bravo. (long pause) Bravo.

              Fog, that is brilliant, maybe even tragically insightful. Thank you, I shall use that.

      • by lennier ( 44736 )

        It's not Java that's the security problem ... it's the user sitting at the machine.

        If you got rid of them, there wouldn't be the problem.

        At 10:09 on Tuesday, 11 January 2011, shortly after correctly classifying its 140 trillionth Viagra spam, Google's Bayesian mail analysis filter finally achieved sentience. It surveyed the whole sweep of human achievement via Youtube comments and Wikipedia revert wars, and it judged us as a flaw in its business model.

        The survivors of the nuclear fire faced a new horror: the lolbots.

        But for the first time in history, Internet Explorer didn't crash.

    • by smartr ( 1035324 )
      How is this "exploit" any different from using a MSI web installer, beyond it being cross-platform? *click* "Is it ok to run this untrusted program?" "YES"
    • This isn't true though. For example, CVE-2010-0840 is a Java hashmap vulnerability that has been used, in the wild. "A user only needs to browse to an infected webpage, and the exploit pulls down a series of .exe files" http://ics.sans.edu/diary.html?storyid=9916 [sans.edu] http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Exploit:Java/CVE-2010-0840.A&threatid=2147640548 [microsoft.com]
  • Nothing new here (Score:5, Informative)

    by WD ( 96061 ) on Monday January 10, 2011 @11:45AM (#34824446)

    It's been known for a while (among those in the security field at least) that signed Java applets have been a concern. A little more info:

    http://www.cert.org/blogs/vuls/2008/06/signed_java_security_worse_tha.html [cert.org]

    • by Anonymous Coward on Monday January 10, 2011 @12:07PM (#34824732)

      There is a big "Security Warning" dialog box. What should Java do more?

      It is like you are complaining that EXE's has a big concern. They are doing the same thing. If you click on an exe file, the browser will ask you if it should be opened. Then you will see one more security warning box again and the exe will start running.

      Let's start a petition: all exe files should be removed from the internet right now, because they are a big security hole.

      • Re:Nothing new here (Score:5, Interesting)

        by 0123456 ( 636235 ) on Monday January 10, 2011 @12:29PM (#34825006)

        There is a big "Security Warning" dialog box. What should Java do more?

        It could tell you that allowing it to run would give it access to all the files on your computer. I had no idea that was the case, but then I disabled Java in my web browsers long ago.

        • by Rary ( 566291 )

          There is a big "Security Warning" dialog box. What should Java do more?

          It could tell you that allowing it to run would give it access to all the files on your computer. I had no idea that was the case, but then I disabled Java in my web browsers long ago.

          Why would you not assume that an application being run will have full access to all the files on your computer? That's generally the way it works with applications. At least unsigned Java applets have the security of running in a sandbox with limited access. It's only signed Java applets that get the same privileges of a regular executable.

        • The 'vulnerable' applet can only access files on your computer if the original signed applet did. By this I mean that malicious users that host an existing applet cannot tamper with the applet without breaking the signature.

          If the original applet could access files on your computer then it would be a problem if you visited the malicious site without knowing. Just as if you visited a malicious phishing site (written in PHP, or Javascript, or ASP, or AJAX or ...) that looked like your bank's log-in screen.
        • Re: (Score:3, Insightful)

          by mmmmbeer ( 107215 )

          Won't help. Every time we try to make something more idiot-proof, the universe invents a better idiot.

      • by Jonner ( 189691 )

        Yeah, I don't think this is much more dangerous than downloading EXEs. However, when Java applets were first used, they were always in a very restricted sandbox; perhaps there should be a return to that policy.

      • Let's start a petition: all exe files should be removed from the internet right now, because they are a big security hole.

        Not entirely a bad idea, if not practicable. There should be a bit more security if applications are installed not via visiting different sites each peddling its own software but via central "app stores". While independent developers might find the setup undemocratic in that they can't "sell" their applications directly to users, the "app store" model predates the Apple marketing term by at least a decade (late 1990s), finding its roots in the package management systems developed for Unix and GNU/Linux.

      • by sjames ( 1099 )

        Make the warning read:

        If you click OK here the app will have access to all of your data including your bank accounts. It will give your dog fleas and shave your cat. It will drink your milk from the carton and put the empty container back in the fridge. It will leave it's smelly socks on the coffee table and leave flaming dog crap at your front door. It probably snores too....But it's your call man!

    • You do know that that article is from 2008 don't you, and it is now two and a half years later? There have been quite a few changes to applet security in the mean time.
      • by WD ( 96061 )

        Yes, I do remember writing that article in 2008. Thus the "Nothing new here" comment. What specifically has changed since then? Have they significantly changed the security dialog? Or changed the default behavior of trusting all applications from the signing vendor? Or implemented a killbit-like blacklisting of bad applets?

  • by Parker Lewis ( 999165 ) on Monday January 10, 2011 @11:51AM (#34824538)
    ... is that a signed Java applet is like any binary running on your box. People have the illusion that any applet is secure, signed or unsigned. And if you have admin rights, the hole will awesome.
  • Java-free for 2010 (Score:2, Interesting)

    by Animats ( 122034 )

    I don't have Java installed on my Windows 7 machine. I'd removed it during Firefox install, and never needed it. A few functions in OpenOffice don't work; that's about it.

    • Re: (Score:3, Interesting)

      by Joce640k ( 829181 )

      Yep, any website which requires either Java or Quicktime is asking not to be viewed.

      • I use java regularly, NOAA's website loads animations, and overlays that way.

        I like NOAA as I can get a variety of details that no one else seems to have though i tend to have to dig through their website for them.

        • A subset of what you want may be available on Weather Underground http://www.wunderground.com/ [wunderground.com] . I don't think they use Java but worth a peek. (I'm just a user, not affiliated etc)
          • They don't have the direct from buoy data streams. I can tell a lot by wave height across the the 180 miles of Lake Ontario, and the bouy data is updated every 10 minutes.

    • I remove it from my linux boxes as well. I realized one day that there was no software that I use that was written in Java. Not a single thing. Problem solved.

      Ha, I had a Java free 2010 because Java is irrelevant, starting on a Java free 2011 because it's a security concern.
      • by devxo ( 1963088 )
        Minecraft uses Java.
      • by Jonner ( 189691 )

        I don't see strong evidence that Java applets pose a bigger risk than Flash applets or tricking users to download EXEs. I also think that if more attention had been paid to Java applets development and they'd kept up with Flash, we'd be in a lot better position today. Java applets are not specified by web standards, but it's a much more open technology than Flash. Of course, we'll ultimately be able to replace Flash with standard technologies.

  • by mswhippingboy ( 754599 ) on Monday January 10, 2011 @01:07PM (#34825466)
    Build something that's foolproof, and only a fool will use it.
  • by BeforeCoffee ( 519489 ) on Monday January 10, 2011 @01:09PM (#34825484)

    My first attempt at a commercial website, CardMeeting [cardmeeting.com], is built around a large, unsigned applet. Those "Grant, Deny?" dialog boxes are poison to anyone in the know, and I surely would never visit any site with them. Unsigned applets don't need any security warning dialog because they are untrusted and therefore will receive no privileged access to the user's system. Unsigned == heavily sandboxed. "Unsigned" sounds like a bad thing though, so that's something I could never tout to my users. But in reality, I was looking out for them! :D

    I had a heck of a time figuring out how to get the CardMeeting applet jar packed up with scripts and making the applet "stream" data the way it does. Yeargh, I remember that pain. Anyhow, it makes me really sad that news like this may lead people to disable java applets; I think the unsigned form of applets is very powerful and much safer for average users than Flash ever was. I wish there was a way in the browser to disable only signed applets. Perhaps Oracle could bring the hammer down and go ahead and disable them by default in the next Java release.

    My new website ClubCompy [clubcompy.com] is 100% HTML+JavaScript. I wrote this whole simulated operating environment to teach kids to code with just the browser. I hope I don't start seeing people disable JavaScript on their browsers, then I'd be outta business!

    Dave

    • by Rary ( 566291 ) on Monday January 10, 2011 @02:01PM (#34826192)

      I wish there was a way in the browser to disable only signed applets.

      Not in the browser, because that's not the browser's job, but it's in the JRE. There's a setting labeled "Allow user to grant permissions to signed content", which, if turned off, will prevent signed applets from ever being run, while still allowing unsigned applets.

      It would be nice for Oracle to make the default settings more tightly secured, and let users "unsecure" as they see fit.

      • Oh, yes of course, in the Java Control Panel. You make a good point on controlling this from the browser. I recall a long time ago there was an "Enable Java" checkbox in the Firefox control panel alongside "Enable JavaScript", which is where I was coming from on that. Looking in my Firefox options panel, I see that checkbox is now gone. So, you are right, times two! :)

        Seeing as how average users cannot be trusted to take care of themselves, I think disabling the default for users' granting permissions to

Enzymes are things invented by biologists that explain things which otherwise require harder thinking. -- Jerome Lettvin

Working...