105 captures
21 Oct 2010 - 26 Jan 2022
May
SEP
Jan
21
2011
2012
2014
success
fail
About this capture
COLLECTED BY
Organization:
Internet Archive
The Internet Archive discovers and captures web pages through many different web crawls. At any given time several distinct crawls are running, some for months, and some every day or longer. View the web archive through the
Wayback Machine
.
Collection:
Wide Crawl started September 2012
Web wide crawl with initial seedlist and crawler configuration from September 2012.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20120921140402/http://blogs.technet.com/b/mmpc/archive/2010/10/18/have-you-checked-the-java.aspx
Sign In
Microsoft Malware Protection Center
Threat Research & Response Blog
Options
Blog Home
About
Share this
RSS for posts
Atom
Search Blogs
Advanced search options...
Search In:
Everything
Blogs
Forums
People
Groups
Places
Pages
Date range:
All Time
Last Year
Last 6 Months
Last 3 Months
Last Month
Last Week
Last Two Days
Tags
Adobe
botnets
conference
conficker
exploits
Facebook
guidance
Java
Malicious Software Removal Tool
malware research
Microsoft Security Essentials
MMPC
MSRT
passwords
phishing
piracy
research
rogue
Security Intelligence Report
SIR
SIR v11
SIR v9
spam
telemetry
trojan
Partner Links
Microsoft Safety Scanner
The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.
Microsoft Security Response Center
The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to Microsoft software security vulnerabilities.
Microsoft Security Essentials
Get high-quality, hassle-free antivirus protection for your home PC now.
Microsoft Forefront
Microsoft Forefront: a comprehensive security product portfolio.
Windows Defender
Windows Defender Homepage
Microsoft AntiSpam
Microsoft AntiSpam
Industry Links
ICSA Labs
Virus Bulletin
Virus Bulletin: Independent Malware Advice
West Coast Labs
West Coast Labs (WCL) is one of the world's leading independent test facilities.
AV-Test
AV-Test.org - Tests of Anti-Virus and Security-Software
AV-Comparatives
Independent comparatives of Anti-Virus Software
Partner Blogroll
Forefront Client Security Team Blog
The scoop from the FCS engineering team.
Forefront Team Blog
Information about what's happening with the entire Microsoft Forefront Family of products.
Microsoft Security Research & Defense Blog
Information from Microsoft about vulnerabilities, mitigations and workarounds, active attacks, and other related guidance.
The Microsoft Security Response Center Blog
Working to help protect customers from vulnerabilities in Microsoft software.
Trustworthy Computing Blog
Perspectives on security, privacy, online safety and reliability topics.
MMPC Links
Microsoft Malware Protection Center
The Microsoft Malware Protection Center (MMPC) Portal.
Microsoft Security Intelligence Report
Microsoft Security Intelligence Report
Archive
Archives
September 2012
(3)
August 2012
(7)
July 2012
(9)
June 2012
(4)
May 2012
(4)
April 2012
(6)
March 2012
(9)
February 2012
(5)
January 2012
(8)
December 2011
(5)
November 2011
(8)
October 2011
(8)
September 2011
(7)
August 2011
(8)
July 2011
(9)
June 2011
(10)
May 2011
(13)
April 2011
(6)
March 2011
(11)
February 2011
(9)
January 2011
(4)
December 2010
(7)
November 2010
(5)
October 2010
(12)
September 2010
(10)
August 2010
(8)
July 2010
(7)
June 2010
(6)
May 2010
(5)
April 2010
(5)
March 2010
(9)
February 2010
(7)
January 2010
(3)
December 2009
(4)
November 2009
(9)
October 2009
(6)
September 2009
(8)
August 2009
(4)
July 2009
(5)
June 2009
(7)
May 2009
(8)
April 2009
(18)
March 2009
(10)
February 2009
(8)
January 2009
(5)
December 2008
(11)
November 2008
(7)
October 2008
(12)
September 2008
(8)
August 2008
(11)
July 2008
(4)
June 2008
(3)
Have you checked the Java?
TechNet Blogs
>
Microsoft Malware Protection Center
>
Have you checked the Java?
Have you checked the Java?
Rate This
mmpc2
18 Oct 2010 10:00 AM
Comments
0
Whilst working on our normal data pull and analysis for the Microsoft Security Intelligence Report (
v9 - released last week
), I embarked on a mini discovery mission on the exploit data that MMPC detects with our antimalware technology. Although the main focus of antimalware software is on traditional malware families, antimalware technologies can do a good job when it comes to file exploits that require a lot of parsing, such as exploit-laden movies, documents, and ... Java.
What I discovered was that some of our exploit "malware" families were telling a scary story - an unprecedented wave of Java exploitation. In fact, by the beginning of this year, the number of Java exploits (and by that I mean attacks on vulnerable Java code,
not
attacks using JavaScript) had well surpassed the total number of Adobe-related exploits we monitored. See chart below for details:
The Java spike in Q3 is primarily driven by attacks on three vulnerabilities, which all, by the way, have had patches available for them for some time now. The first two, in particular, have gone from hundreds of thousands per quarter to millions:
CVE
Attacks
Computers
Description
CVE-2008-5353
3,560,669
1,196,480
A deserialization issue in vulnerable versions of JRE (Java Runtime Environment) allows remote code execution through Java-enabled browsers on multiple platforms, such as Microsoft Windows, Linux, and Apple Mac OS X.
CVE-2009-3867
2,638,311
1,119,191
Another remote code execution, multi-platform issue caused by improper parsing of long file:// URL arguments.
CVE-2010-0094
213,502
173,123
Another deserialization issue, very similar to CVE-2008-5353.
The spike in exploitation was surprising to say the least, and I wondered why no one else appeared to be noticing. And, to be fair, it wasn't entirely true that no one else noticed.
Back in 2008, the number of Java vulnerabilities started increasing dramatically (one report noted a jump of
264%
from 2007 to 2008). Curious, I thought at the time. The main focus of vulnerability protection back then was moving from the OS to the browser, with the next frontiers being malicious documents and movies. I wondered—could Java be on the horizon?
Indeed it was. Should we have expected otherwise? Java is ubiquitous, and, as was once true with browsers and document readers like Adobe Acrobat, people don't think to update it. On top of that, Java is a technology that runs in the background to make more visible components work. How do you know if you have Java installed or if it's running?
More recently, the exploitation of Java vulnerabilities has been coming to light. Scott Wu, who presented at Virus Bulletin recently, listed some of the more heavily exploited vulnerabilities in his
presentation
. Also, in the
one-year anniversary post
for Microsoft Security Essentials, exploits for a Java vulnerability pushed that family to the top of the list for all families (malware and exploits) detected in the US.
Looking back at the chart above, you can see that this exploitation has been happening for some time. So, why has no one been talking about Java-based exploits? (Well, almost no one.
Brian Krebs broke the ice last week
.)
I have a theory about why almost no one has noticed this sharp rise in attacks on Java. IDS/IPS vendors, who are typically the folks that speak out first about new types of exploitation, have challenges with parsing Java code. Documents, multimedia, JavaScript - getting protection for these issues is challenging to get right. Now, think about incorporating a Java interpreter into an IPS engine? The performance impact on a network IPS could be crippling. So, the people that we expect to notice increases in exploitation might have a hard time seeing this particular spectrum of light. Call it Java-blindness.
So, if the antimalware people can see it, why aren't
they
talking about it? Well, looking at the numbers, Java exploits (and most exploits for that matter) are very low-volume in comparison to the volume of common malware families like Zbot (a family for which we
added detection in MSRT just last week
). What we have to remember is that, with exploits, it's not just about volume - they happen in a flash and you have to catch them in the act (with a real-time protection product such as Microsoft Security Essentials) before they open the door to lots of malware. So, even small numbers, especially when they're against unpatched vulnerabilities, matter a lot.
Now that our eyes are open, it is time for us to start reassessing yet another ubiquitous technology that attackers have found they can exploit. Considering that these vulnerabilities all have available updates from Oracle that would prevent these attacks from being successful, this data is a reminder that, in addition to running real-time protection, it is imperative to apply all security updates for software, no matter what your flavor might be.
- Holly Stewart, MMPC
PS:
Special thanks to our incredible analysts, Marian Radu, Rodel Finones, Michael Johnson, Chris Stubbs, Dan Kurc, Patrik Vicol, Jaime Wong, and Shawn Wang, who worked on our Java coverage for customers and had the foresight to create this protection long before this escalation in attacks.
Security Intelligence Report
,
SIR v9
,
CVE-2008-5353
,
exploits
,
CVE-2009-3867
,
Java
,
Adobe
,
CVE-2010-0094
Comments