Java vulnerabilities increasingly targeted by attackers, researchers say

Web exploit toolkit developers are focusing on Java exploits

Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to security researchers who will talk about Java-based attacks at the Black Hat USA 2012 security conference.

A large number of computers get infected today through drive-by-download attacks performed with the help of Web exploit toolkits -- malicious Web applications designed to exploit vulnerabilities in widespread browser plug-ins like Flash Player, Adobe Reader or Java.

Java was acquired by Oracle as part of its 2010 acquisition of Sun Microsystems.

A couple of years ago the most targeted browser plug-ins were Flash Player and Adobe Reader, but many of today's Web exploit toolkits rely heavily on Java exploits, said Jason Jones, a security researcher with HP DVLabs, Hewlett-Packard's vulnerability research division.

Jones has monitored the development of some of the most commonly used Web exploit toolkits, like Blackhole or Phoenix, and will present his findings at Black Hat on Thursday.

One clear trend is that Web exploit toolkit developers are increasingly focusing on Java exploits, Jones said. They are also integrating exploits for new Java vulnerabilities at a much faster pace than before.

In some cases attackers reuse exploit code that gets published online by security researchers after Oracle patches the vulnerabilities. However, they modify it and apply different obfuscation techniques to it in order to evade detection by security products.

"Overall we have seen the amount of Java malware increasing over time, based on our telemetry," Jeong Wook Oh, a researcher with Microsoft Malware Protection Center, said via email. Oh is scheduled to talk about recent Java exploitation trends and malware at Black Hat on Thursday.

Cybercriminals are attracted to Java exploits because they can have very high success rates. For example, one particular exploit integrated into Blackhole in 2011 had an over 80 percent success rate, Jones said.

This is because users are not deploying the available security updates in a timely fashion, which is going to be an even greater problem now that attackers are targeting new Java vulnerabilities faster.

Adobe dealt with similarly low patch adoption rates for Flash Player and Adobe Reader by improving the update mechanisms for those products and even implementing automatic updates for Flash Player.

Those changes had a direct impact on the overall frequency of attacks targeting the two products and so did other in-depth security measures taken by the company, like the introduction of a security development cycle (SDL) -- a series of code security reviews and development practices that aim to reduce the number of vulnerabilities -- or the implementation of sandboxing technologies, said Carsten Eiram, the chief security specialist at vulnerability management firm Secunia.

Java already has a sandbox that should theoretically keep third-party code contained. However, a single vulnerability can break this security model and allow attackers to execute malicious code directly on the system, Oh said.

Java has some pretty big security problems at the code level, Eiram said. Many of the vulnerabilities found in Java are basic ones that could be prevented by a good SDL program, he said.

Eiram researched the effects that Microsoft's SDL program had on Microsoft Office over the years and found that it has led to a significant decline in the number of traditional buffer overflow vulnerabilities found in the product to the extent that they are almost non-existent in Office 2010.

The researchers agree that Oracle needs to take actions that would make Java a less attractive target for attackers.

"Automatic background update will provide a lot of benefit if it is implemented by Oracle," Oh said. "The attackers are abusing the time gap between patch release and user updates."

The majority of Java exploits used by attacker right now target vulnerabilities that have already been patched by Oracle. However, Eiram believes that this will change and attackers will soon start targeting unpatched (zero-day) Java vulnerabilities instead of Flash ones, which are currently a favorite target for zero-day attacks.

Oracle could have a hard time dealing with such attacks, because they're not one of the most responsive vendors at the moment, Eiram said. They avoid communicating openly about security issues or confirming their existence, even to security researchers who report vulnerabilities to them, he said.

Software vendors that develop widely deployed browser plug-ins like Java, Flash or Adobe Reader, have a responsibility to make them as secure as possible and respond to security incidents as fast as possible, Eiram said. Adobe made a lot of improvements regarding this in the last few years, but Oracle remains too slow and unresponsive he said.

"Any 3rd party software with a large user base can be a possible target in the future," Oh said. "But as long as you don't put any efforts to make your software more secure and your software has a large user base, there is no reason for the bad guys to stop abusing the vulnerabilities found in your software. It is especially true when the bad guys can have high success rate with those vulnerabilities."

In the absence of better action from plug-in developers, some browser vendors have built defenses at the browser-level in order to protect their users.

Google Chrome automatically disables outdated plug-ins that are known to be vulnerable. Mozilla has a plug-in blacklist for Firefox and actually used it to block vulnerable Java plug-ins in April in response to widespread attacks targeting a vulnerability in older versions.

Click-to-play is another browser feature that can prevent plug-in attacks because it prevents the automatic playback of plug-in-based content. The feature is already present in Chrome and is currently being built into Firefox.

Jones recommended that users enable click-to-play when available in their browser. Another defensive approach is to delete the Java plug-in completely if not needed, he said.

Unfortunately, not everyone can do this, especially in a business environment, where Java is needed for many internal applications. For example, some banks still have their e-banking systems built around Java, Eiram said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?