New Java-based Web attack discovered

IASI, ROMANIA  – A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux and Mac computers, according to security researchers from antivirus vendors F-Secure and Kaspersky Lab.
 
The attack was detected on a compromised website in Colombia, F-Secure senior analyst Karmina Aquino, said in a blog post on Monday. When users visit the site, they are prompted to run a Java applet that hasn’t been signed by a trusted certificate authority.
 
If allowed to run, the applet checks which operating system is running on the user’s computer — Windows, Mac OS X or Linux — and drops a malicious binary file for the corresponding platform.
 
The files are detected by F-Secure as “Backdoor:OSX/GetShell.A,” “Backdoor:Linux/GetShell.A” and “Backdoor:W32/GetShell.A.” Their purpose is to connect to a command-and-control server and look for additional malicious code to download and execute.
 
However, since F-Secure researchers began monitoring the attack, the remote control server hasn’t pushed any additional code, Aquino said.
 
It appears that the attack uses the Social Engineer Toolkit (SET), a publicly available tool designed for penetration testers, Aquino said Tuesday via email. However, the chances of this being a penetration test sanctioned by the website’s owner are relatively low.
 
“I don’t think it’s a penetration test,” Costin Raiu, director of the global research and analysis team at antivirus vendor Kaspersky Lab, said Tuesday via email.
 
Kaspersky’s researchers are monitoring two separate Web sites that contain this malware, Raiu said. One is the Colombian website also found by F-Secure, while the second belongs to a water park in Barcelona, Spain.
 
The presence of the malware on a second website in Spain indicates that this attack is not specific to Colombia or a particular entity, Raiu said.
 
Kaspersky’s researchers are in the process of analyzing the backdoor-type malware downloaded by the malicious shell code on Windows and Linux.
 
“The Win32 backdoor is large, about 600KB; the Linux backdoor is over 1MB in size,” Raiu said. “Both appear to contact very complex code which communicates encrypted with other servers.”
 
This is not the first time that security researchers have discovered a multi-platform attack. In 2010, a similar Java-applet-based social engineering attack capable of executing malicious code on Windows, Mac OS X and Linux computers, was used to distribute the Boonana Trojan program.
 
“Such multiplatform attacks indicate the fact that Linux and Mac OS X are becoming interesting targets for cybercriminals,” Raiu said.
 
Other malware authors might move to this type of attacks in the future because it allow them to target more users and distribute their creations more widely, Aquino said.
 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now