Oracle's efforts to patch the Java security flaws plaguing users have become complicated by a phishing campaign that sends messages masquerading as official updates with attachments that hijack computers instead. In the meantime, the flaws that Oracle is attempting to patch continue to be exploited. Reporters Without Borders was the target of the latest attack.
For Oracle and its
Java programming language, the hurt just keeps on coming.
Fresh vulnerabilities have been discovered less than a week after
Oracle updated Java to address two security flaws being exploited by
hackers -- but wait, there's more. Net bandits launched a phishing
campaign pushing bogus security updates for the software.
Meanwhile, a tech journalist and Harvard Business School professor lambasted Oracle's actual security updates as unethical.
The two new vulnerabilities were discovered in the latest version of
Java, release 7 update 11 (7u11) by veteran vulnerability finder Adam
Gowdiak, founder and CEO of
Security Explorations.
"We have successfully confirmed that a complete Java security sandbox
bypass can still be gained under the recent version of Java 7 Update
11," Gowdiak wrote to subscribers of the Full Disclosure mailing list.
"As a result, two new security vulnerabilities (51 and 52) were
spotted in a recent version of Java SE 7 code and they were reported to
Oracle today," he added. Since April 2012, Gowdiak has discovered 52
security bugs in Java 7.
Not Playing Nice in Sandbox
Sandboxes are a technique used by software writers to make applications
more secure. Running the app in a sandbox can isolate the program's
execution -- and if it's infected, reduce its ability to contaminate a
system.
Java's sandbox is a popular target of miscreants, according to HD Moore, chief security officer of
Rapid7
"A single failure in Java's sandbox turns into another exploit that
wouldn't be a problem in programs like Chrome, Flash and Acrobat because
it's so hard to skip the sandbox in those programs," he told
TechNewsWorld.
While Oracle scrambled to fix Java, phishers began exploiting public awareness of Oracle's security update for their own gains.
"It's a social engineering approach, taking advantage that this Java
exploit is being talked about in the media," George Tubin, a senior
security strategist with
Trusteer.
Publicity Attracts Phishers
The phishing campaign was first discovered by Trend Micro, which last
week found messages purporting to be security updates from Oracle
circulating the Internet with attachments containing malware. The
malware doesn't exploit any Java vulnerabilities -- it infects a
computer and takes control of it.
"This method of infection has become very, very popular in the past
few years," Barry Shteiman, a senior security strategist with
Imperva, told TechNewsWorld.
In addition to the direct delivery of malware via email, miscreants
are also using emails containing links to websites promising to install a
new version of Java, which actually install ransomware on a system
instead, said Bogdan Botezatu, a senior e-threat analyst at
Bitdefender.
"These fake updates do not exploit any flaws in Java," he told
TechNewsworld. "They just install a Windows-based piece of malware that
currently installs ransomware -- a type of malware that locks the users'
computer screen and demands payment to return control to the user."
Attacks on Activists
While there is no evidence yet that the new vulnerabilities in Java are
being exploited by hackers, old ones continue to be exploited, according
to Jindrich Kubec, a security researcher with
Avast.
Kubec has been tracking a series of attacks against social activist
websites that exploit previously patched vulnerabilities in Java and
several versions of Microsoft Internet Explorer. The latest assault in
the campaign was discovered Tuesday at the website for Reporters Without
Borders.
The attacks are designed to collect information about visitors to the sites, Kubec explained.
"I believe this serves as intelligence collection on the enemies of the Chinese state," he told TechNewsWorld.
It allows the Chinese to track what its perceived enemies do, as well
as with whom they communicate. It also lets them identify websites that
may have been overlooked by Chinese censors, Kubec noted.
"We've seen more than 40 sites in the latest wave, as of [Wednesday].
Most of them are still infected and under at least partial control of
attackers," he added.
Vulnerability as Business Opportunity
Although Oracle has received kudos from some security experts for its
rapid action on the latest round of vulnerabilities in Java, its update
process drew criticism from tech writer Ed Bott, of Cnet, and Ben
Edelman, an associate professor at the Harvard Business School.
In a column published Tuesday, Bott knocked Oracle for pushing
third-party software with its updates and for being slow to notify
users that updates were available.
"Oracle uses the updater to patch security flaws, which is proper,
but to push third-party advertising software -- that's quite unusual"
Edelman told TechNewsWorld.
"Security updates are supposed to be strictly business. You're
supposed to use it to fix an urgent, genuine, technical problem and
nothing else," he maintained. "Oracle is taking a security vulnerability
and flipping it around into a business opportunity."