Persistence of outdated JRE 6 helps Java dominate Web attacks: Cisco

Java continues to be the dominant attack vector for Web-based security exploits, facilitated by continuing enterprise use of the end-of-life and highly-compromised Java 6 platform, Cisco Systems has warned in its 2014 Annual Security Report.

The report, compiled with data from both Cisco and the FireAMP online monitoring tool of its recently-acquired security specialist firm Sourcefire, found that Java exploits account for 91 percent of Web-based threats – eclipsing the threat posed by other vectors such as PDF files (3 per cent) and Microsoft Excel spreadsheets (3 per cent), Word documents (2 per cent) and PowerPoint files (1 per cent).

Even where exploits are built to cascade between different attack vectors, Java is typically the first that malware authors choose, the report noted, because of the ubiquity of Java makes it an attack surface “that is too big for criminals to ignore”.

The size of the attack surface is also being maintained thanks to the continuing use of Java Runtime Environment (JRE) version 6, which was long ago superseded by the JRE 7 that is now found in 90 per cent of enterprises.

However, despite installing the newer and more-secure version, 76 per cent of enterprises are continuing to use JRE 6 as well – generally to ensure compatibility with applications that may not have been updated to support the new environment.

“With more than three-fourths of the enterprises surveyed by Cisco using an end-of-life solution with vulnerabilities that may never be patched publicly, criminals have ample opportunity to exploit weaknesses,” the report's authors warn.

The persistence of Java vulnerabilities helped contribute to steady growth in the overall volume of security alerts seen during 2013, which increased 14 per cent year on year compared with 2012 according to Cisco's ongoing monitoring efforts.

Oracle and independent security researchers have been working full time to keep up with the discovery of new Java flaws, with new zero-day exploits regularly discovered, new exploits being added to exploit kits as quickly as they're discovered, and Oracle regularly offering dozens of patches to fix discovered security problems.

It's not just the presence of Java alone opening users to attack, however: Cisco's figures suggest particular types of companies are particularly vulnerable to targeting by cyber criminals, with electronics manufacturers, agricultural and mining companies being hit by malware six times as frequently as other vertical industries.

Cisco also noted an increase in 'watering hole' attacks targeting specific industry-related Web sites, and saw indicators suggesting many network compromises remain undetected for long periods of time. Buffer errors were the most common type of threat, comprising 21 percent of attacks.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: java, JRE 6, Java Runtime Environment (JRE)

Review: File Recovery Tools

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Solutions-GigaVUE-420

In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.