- dotTech - http://dottech.org -
Beware of fake Java update patch — it contains malware
Posted By Ashraf On January 18, 2013 @ 10:44 AM In Windows | 7 Comments
There are two groups in this world that are notoriously quick to react to technological change — the porn industry and hackers. The porn industry is known for pioneering new technology to try to increase revenue. For example, porn websites were one of the first websites that started accepting payments online. Hackers — typically the scumbag type, crackers — are also quick to adapt to technological current events. For example, last year Microsoft started sending out official emails informing people about changes to Microsoft Services Agreement. Crackers quickly took advantage, copied the exact email but included a malicious file attachment  to infect whoever is stupid enough to open it. So, you can only imagine what sort of field day crackers have with Java .
As I’m sure most of you know, recently Java was hit with (yet another) major vulnerability . So big was this vulnerability, it hit headlines for all major news organizations and tech blogs; it even had the US Department of Homeland Security calling for people to disable Java . Luckily, Oracle quickly issued a patch  once the vulnerability was made public. However, crackers beat Oracle to the punch.
Security firm Trend Micro is reporting the discovery of a fake malware Java update patch that is circulating the Internet and targeting Windows users. Crackers are obviously taking advantage of desperate Java users looking for an update to fix the latest vulnerability; this malware poses as a Java update, asking you to run a Java applet called ‘javaupdate11′. If you are foolish enough to run the applet, your computer is infected with:
Ironically, this particular fake Java update does not exploit the latest Java vulnerability that Oracle just patched. It simply takes advantage of the fear created by the discovery of the Java vulnerability and tricks people into downloading an infected Java applet; it takes advantage of naive users who are looking to update their Java to stay safe.
Luckily, the malware that comes with this fake Java update is known and any competent anti-virus/anti-malware program  should block it, in case you do accidentally run the infected Java applet.
Goes to show you — either have Java disabled  or uninstalled , or be damn sure you know what a Java applet is before you run it. Oh and also be sure to only update Java through Java’s official website .
[via Trend Micro ]
Article printed from dotTech: http://dottech.org
URL to article: http://dottech.org/93867/beware-of-fake-java-update-patch-it-contains-malware/
URLs in this post:
 Image: http://dottech.org/wp-content/uploads/2013/01/fake_java_update.gif
 copied the exact email but included a malicious file attachment: http://dottech.org/81442/fake-microsoft-e-mail-is-spreading-malware-be-careful/
 Java: http://dottech.org/tag/java
 major vulnerability: http://dottech.org/92636/new-java-zero-day-exploit-hits-the-internet-is-massively-exploited-in-the-wild-disable-java-now/
 US Department of Homeland Security calling for people to disable Java: http://dottech.org/92964/firefox-and-apple-have-blocked-java-while-u-s-homeland-security-recommends-everyone-disable-it-because-of-vulnerabilities/
 issued a patch: http://dottech.org/93274/oracle-issues-java-update-to-fix-latest-exploit-but-security-experts-say-to-still-stay-away/
 competent anti-virus/anti-malware program: http://dottech.org/14151/windows-best-free-antivirus-antimalware-program-microsoft-security-essentials-vs-avira-vs-avast-vs-avg/
 disabled: http://dottech.org/78082/how-to-uninstall-remove-java-from-firefox-chrome-internet-explorer-opera/
 uninstalled: http://dottech.org/78080/how-to-remove-java-from-windows-guide/
 official website: http://java.com
 Trend Micro: http://blog.trendmicro.com/trendlabs-security-intelligence/malware-poses-as-an-update-for-java-0-day-fix/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29
© 2008-2012 dotTech.org | All content is the property of its rightful owner.