Researchers link latest Java zero-day exploit to Bit9 hack

The remote access malware used in both cases connected to the same control server, Symantec researchers said

The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor Symantec.

Security researchers from FireEye, who found the new Java attacks last week, said that the Java exploit installs a remote access piece of malware called McRAT.

The threat, which Symantec products detect as Trojan.Naid, connects back to a command-and-control (C&C) server using the 110.173.55.187 IP (Internet Protocol) address, Symantec researchers said Friday in a blog post.

"Interestingly, a Trojan.Naid sample was also signed by the compromised Bit9 certificate discussed in the Bit9 security incident update and used in an attack on another party," they said. "This sample also used the backchannel communication server IP address 110.173.55.187."

Last month, Bit9, a company that sells security products using whitelisting technology, announced that hackers broke into one of its servers and used one of the company's digital certificates to sign malware. That malware was then used in attacks against a few U.S. organizations, the company said.

"In the subsequent attacks on the three target organizations, the attackers appeared to have already compromised specific Websites (a watering hole style attack, similar to what was recently reported by Facebook, Apple and Microsoft)," Bit9's CTO Harry Sverdlove said in a blog post last Monday. "We believe the attackers inserted a malicious Java applet onto those sites that used a vulnerability in Java to deliver additional malicious files, including files signed by the compromised certificate."

One of those malicious files connected back to IP address "110.173.55.187" over port 80, the Bit9 CTO said. The IP is registered to an address in Hong Kong.

"The Trojan.Naid attackers have been extremely persistent and have shown their sophistication in multiple attacks," the Symantec researchers said. "Their primary motivation has been industrial espionage on a variety of industry sectors."

The attacks they launch usually involve zero-day vulnerabilities. In 2012 they conducted a watering hole attack -- an attack where a website frequently visited by the intended targets is infected -- that exploited a zero-day vulnerability in Internet Explorer, the Symantec researchers said.

Oracle has yet to reveal its patching plans for this latest Java vulnerability. The next Java security update was scheduled for April, but the company might decide to release an emergency update before then.

Security researchers have advised users who don't need access to Web-based Java content to remove the Java plug-in from their browsers. The latest version of Java -- Java 7 Update 15 -- provides an option through its control panel to disable the Java plug-ins or to force a confirmation prompt before Java applets are allowed to run inside the browser.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags online safetysymantecBit9securityFireEyespywareExploits / vulnerabilitiesmalwareOracleintrusion

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?