Categories: SecurityWorkspace

The Rise Of Java Vulnerabilities

While Java has enjoyed a position as one of the most widely used software platforms, running on an estimated three billion devices globally, its success is also what makes it a risk.

The fact that  Java runs on a large number of operating systems and is used extensively by the likes of Oracle means it provides attackers with a large number of victims. Those ‘victims’ might sit anywhere from the finance team to the sales division giving cyber criminals access to sensitive data across an entire business. In addition, the software does not automatically update by default and so leaves older versions unprotected on many devices.

The rhino in the room

One of the most prevalent exploits that has been observed to date is JavaRhino, which takes advantage of a vulnerability in the Java Runtime Environment (JRE), Rhinoscript.

Unfortunately it is not straightforward to patch the JRE on a weekly or even a bi-monthly basis and the delay is likely to result in occasions where systems and people are not working effectively. This is partly why this particular exploit has proved to be very effective at infecting systems by running unauthorised code and executing malicious payload in insecure environments.

The last 12 months have seen an increase in the number of exploits delivered through Javascript and we have noticed that the majority of these were delivered inside the infamous Blackhole Exploit kit.  The inclusion of Rhino into the Blackhole exploit (and various other exploit kits) means that the Rhino exploit can be used to automatically infect users via drive-by download attacks.

The fact that Blackhole developers were able to update the framework with a module to easily compromise PCs that were only one month old, demonstrates how complex Java is to secure. With different language versions and bit rate versions to work through, an exploit in Java could remain effective for months, especially as most PC users and businesses can take months to update third-party software.

In addition, we are seeing criminals integrating exploits for new Java vulnerabilities at a much faster pace than ever before. Attackers are even re-using exploit code after patches are distributed, and by modifying that code and applying different obfuscation techniques; attackers are able to avoid detection.

To uninstall or not to uninstall?

It would be logical to call on users to disable Java altogether. Un-patched Java is responsible for a large proportion of successful browser attacks. So why not just remove the vector by uninstalling it?

For those who do not use Java, this would be the appropriate call to action as it reduces the area of attack for exploits and their authors. For others, including many enterprises and banks, a lot of software still runs on Java and so possess known vulnerabilities. This fact requires that users remain diligent about keeping patches updated and protecting themselves by using browsers such as Chrome and Firefox with automatic defences.

In addition, serious action is needed from developers to signify to the cybercriminal community that efforts are being made to protect vulnerable users who continue to be a target. Software developers that deploy plug-ins like Java and Flash or Adobe readers must assume the responsibility to provide timely Java patches to ensure users remain secure. They should consider providing automated updates by default to ensure their large user base remains protected.

In the absence of third-party action, it has been encouraging to see browsers such as Firefox and Chrome starting to prompt the user before allowing Java code to run. These browsers have also started blocking content if a user is running an out-dated version of Java which is providing a welcome layer of defence. For users who want to remain vigilant against these exploits, the best protection is to ensure the latest version of the Java JRE is used (currently version 7, update 5 released in June 2012). It is also essential to run an antivirus to ensure you have a strong layered defence in place to protect against these exploits.

What we are seeing now is the maturity in the exploit kit framework model for malicious code delivery. The Blackhole exploit kit has gained a huge amount of exposure within the media and the underground and is by far the most popular exploit kit available, allowing for infections to be deployed to a large number of end users with ease.

We will continue to see cyber criminals refine the exploit kit delivery model, making exploits more effective as well as making it easier and more accurate to target specific types of traffic. For the time being, the best route to Java protection would be to patch it, disable it or demand for better protection.

Jacques Erasmus is chief information security officer at Webroot.

Think you’re a security pro? Try our quiz!

TechWeekEurope Staff

View Comments

Recent Posts

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

47 mins ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

16 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

18 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

20 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

21 hours ago