Java vulnerabilities increasingly targeted by attackers, researchers say

Web exploit toolkit developers are focusing on Java exploits

Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to security researchers who will talk about Java-based attacks at the Black Hat USA 2012 security conference.

A large number of computers get infected today through drive-by-download attacks performed with the help of Web exploit toolkits -- malicious Web applications designed to exploit vulnerabilities in widespread browser plug-ins like Flash Player, Adobe Reader or Java.

Java was acquired by Oracle as part of its 2010 acquisition of Sun Microsystems.

A couple of years ago the most targeted browser plug-ins were Flash Player and Adobe Reader, but many of today's Web exploit toolkits rely heavily on Java exploits, said Jason Jones, a security researcher with HP DVLabs, Hewlett-Packard's vulnerability research division.

Jones has monitored the development of some of the most commonly used Web exploit toolkits, like Blackhole or Phoenix, and will present his findings at Black Hat on Thursday.

One clear trend is that Web exploit toolkit developers are increasingly focusing on Java exploits, Jones said. They are also integrating exploits for new Java vulnerabilities at a much faster pace than before.

In some cases attackers reuse exploit code that gets published online by security researchers after Oracle patches the vulnerabilities. However, they modify it and apply different obfuscation techniques to it in order to evade detection by security products.

"Overall we have seen the amount of Java malware increasing over time, based on our telemetry," Jeong Wook Oh, a researcher with Microsoft Malware Protection Center, said via email. Oh is scheduled to talk about recent Java exploitation trends and malware at Black Hat on Thursday.

Cybercriminals are attracted to Java exploits because they can have very high success rates. For example, one particular exploit integrated into Blackhole in 2011 had an over 80 percent success rate, Jones said.

This is because users are not deploying the available security updates in a timely fashion, which is going to be an even greater problem now that attackers are targeting new Java vulnerabilities faster.

Adobe dealt with similarly low patch adoption rates for Flash Player and Adobe Reader by improving the update mechanisms for those products and even implementing automatic updates for Flash Player.

Those changes had a direct impact on the overall frequency of attacks targeting the two products and so did other in-depth security measures taken by the company, like the introduction of a security development cycle (SDL) -- a series of code security reviews and development practices that aim to reduce the number of vulnerabilities -- or the implementation of sandboxing technologies, said Carsten Eiram, the chief security specialist at vulnerability management firm Secunia.

Java already has a sandbox that should theoretically keep third-party code contained. However, a single vulnerability can break this security model and allow attackers to execute malicious code directly on the system, Oh said.

Java has some pretty big security problems at the code level, Eiram said. Many of the vulnerabilities found in Java are basic ones that could be prevented by a good SDL program, he said.

Eiram researched the effects that Microsoft's SDL program had on Microsoft Office over the years and found that it has led to a significant decline in the number of traditional buffer overflow vulnerabilities found in the product to the extent that they are almost non-existent in Office 2010.

The researchers agree that Oracle needs to take actions that would make Java a less attractive target for attackers.

"Automatic background update will provide a lot of benefit if it is implemented by Oracle," Oh said. "The attackers are abusing the time gap between patch release and user updates."

The majority of Java exploits used by attacker right now target vulnerabilities that have already been patched by Oracle. However, Eiram believes that this will change and attackers will soon start targeting unpatched (zero-day) Java vulnerabilities instead of Flash ones, which are currently a favorite target for zero-day attacks.

Oracle could have a hard time dealing with such attacks, because they're not one of the most responsive vendors at the moment, Eiram said. They avoid communicating openly about security issues or confirming their existence, even to security researchers who report vulnerabilities to them, he said.

Software vendors that develop widely deployed browser plug-ins like Java, Flash or Adobe Reader, have a responsibility to make them as secure as possible and respond to security incidents as fast as possible, Eiram said. Adobe made a lot of improvements regarding this in the last few years, but Oracle remains too slow and unresponsive he said.

"Any 3rd party software with a large user base can be a possible target in the future," Oh said. "But as long as you don't put any efforts to make your software more secure and your software has a large user base, there is no reason for the bad guys to stop abusing the vulnerabilities found in your software. It is especially true when the bad guys can have high success rate with those vulnerabilities."

In the absence of better action from plug-in developers, some browser vendors have built defenses at the browser-level in order to protect their users.

Google Chrome automatically disables outdated plug-ins that are known to be vulnerable. Mozilla has a plug-in blacklist for Firefox and actually used it to block vulnerable Java plug-ins in April in response to widespread attacks targeting a vulnerability in older versions.

Click-to-play is another browser feature that can prevent plug-in attacks because it prevents the automatic playback of plug-in-based content. The feature is already present in Chrome and is currently being built into Firefox.

Jones recommended that users enable click-to-play when available in their browser. Another defensive approach is to delete the Java plug-in completely if not needed, he said.

Unfortunately, not everyone can do this, especially in a business environment, where Java is needed for many internal applications. For example, some banks still have their e-banking systems built around Java, Eiram said.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles


PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?