Unpatched Java vulnerability exploited in Blackhole-based attacks

Attacks exploiting a new Java vulnerability have become widespread, Kaspersky researchers say

Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from antivirus vendor Kaspersky Lab.

"The first victim regions to be hit with the Blackhole stuff were the U.S., the Russian Federation, Belarus, Germany, the Ukraine and Moldova," Kaspersky senior security researcher Kurt Baumgartner said Tuesday in a blog post.

Blackhole is one of the most popular of the commercial exploit toolkits that cybercriminals use to automatically infect computers with malware when their owners visit malicious or compromised websites.

Blackhole is sold on the underground market and comes packed with a variety of exploits for known vulnerabilities in browser plug-ins such as Java, Adobe Reader and Flash Player.

After a reliable exploit for the new Java vulnerability -- now identified as CVE-2012-4681 -- was released on Monday, many security researchers warned that cybercriminals would soon start targeting the flaw on a large scale.

Rumors that the exploit had been integrated into Blackhole started circulating on Tuesday morning after the toolkit's creator allegedly posted an announcement about it on an underground forum.

"SophosLabs has seen samples of [the exploit] from Blackhole and are analyzing them now to determine if they actually work," Chester Wisniewski, a senior security adviser at antivirus firm Sophos, said Tuesday via email. "So, yes, we can confirm it has been added, but still working out if they did it right."

Security researchers from antivirus vendor ESET also confirmed via email that Blackhole now includes the exploit.

Kaspersky's new report shows that not only has the exploit been added to Blackhole, but the toolkit's customers have already started using it.

"In relation to the other exploits included in the pack, victims are getting hit only a fair number of times with the 0day [the unpatched vulnerability]," Baumgartner said.

This might be because, according to reports from various vulnerability researchers, this new flaw only affects Java 7. "Java 7 is not as widely deployed as other vulnerable versions of frequently attacked client-side software," Baumgartner said Tuesday via email.

This means that there might be, for example, more computers on the Internet that run outdated installations of Java 6 that are vulnerable to older Blackhole exploits, than computers running Java 7.

Most security researchers advised users to uninstall or disable the Java Web plug-in from their browsers. However, other options are also available to users who can't afford to do this because they use Java-based applications on a regular basis.

"Oracle needs to step it up and deliver an OOB [out-of-band] patch, which historically they have failed to do," Baumgartner said in the blog post. "Maybe this event will provide even more pressure to step up their security update delivery process."

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts