Sunday, September 29, 2013

Java favorite target platform for Hacker this Year


Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure's new threat report.

"Of the top five most targeted vulnerabilities, four are found in the Java development, either the Runtime Environment (JRE) or the browser plug-in," according to the report, based on information about attacks detected through F-Secure's sensors and telemetry systems. The company notes that it's not surprising Java is an appealing target since "next to the Windows operating system (also a popular target for exploits), Java is probably the second most ubiquitous program in an organization's IT setup."

Analysis of attacks shows the top five exploited vulnerabilities accounting for 95 percent of all attacks, with the U.S. the geographic location most targeted. F-Secure estimates 78 out of every 1000 users in the U.S. saw a detection identifying an exploit of a specific vulnerability in the last six months. Germany also saw a fairly high number of attacks with about 60 out of 1000 users hit within the same time frame.

"Unfortunately, removing either the runtime or plug-in may not be a feasible option for companies that use Java in business-critical instances," the F-Secure report points out. Defense and mitigation strategies might involve something more complicated than uninstalling a program, such as "some combination of tweaking Java's security settings, configuring web browser settings to minimize unwanted applet execution (or installing other third-party plug-ins to do so) and monitoring network traffic."

F-Secure says 70 percent of the exploit-related attacks are carried out by means of five kits: BlackHole, SweetOrange, Crimeboss, Styx, and Cool. All of these remain under active development.

Another security threat to be reckoned with in the first half of 2013: Mac malware. F-Secure reports it saw the "first Mac malware signed with a valid Apple Developer ID," an ominous event because this allowed the malware to bypass Apple's first line of defense. After independent researcher Jacob Appelbaum identified the malware, Apple was swift in revoking the misused developer ID attributed to "Rajinder Kumar" (hence this malware has been dubbed "Kumar in the Mac").

While this is noteworthy, malware targeting Android continued to dominate mobile threats in the first half of the year, according to the report. Of interest is the discovery of Android malware dubbed Stels, which is designed for distribution via spam e-mails and a bot that uses Twitter to update its command-and-control server addresses.

2 comments: