Microsoft warns users to be wary of fake Java updates

Cybercriminals set malware trap for users worried by Java zero-day exploits.

Malware on binary

Microsoft is warning users to be on the lookout for fake Java updates that will download malware onto their computers.

The cybercriminals behind the malware seem to be tapping into the current awareness of problems with Java, after several exploits were found in web browser versions of the plug-in.

"Cybercriminals often use fake virus alerts to lure you into buying fraudulent antivirus software," said Microsoft employee Eve Blakemore in a post on the company's blog.

Users must seriously consider their use of Java. Do they really need it?

"In the case of the fake Java updates, cybercriminals are taking advantage of news about security vulnerabilities in Java and recommendations to update Java immediately.

"We agree that if you use Java on your device you should update it directly from the Oracle website," Blakemore added.

The problem was first reported by anti-virus giant Trend Micro, which said it had been alerted to a piece of malware posing as Java Update 11.

Paul Pajares, fraud analyst at Java, said in a blog post: "The fake update in question is javaupdate11.jar (detected as JAVA_DLOADER.NTW), which contains javaupdate11.class that downloads and executes malicious files up1.exe and up2.exe.

"Once executed, this backdoor connects to a remote server that enables a possible attacker to take control of the infected system."

Trend Micro also observed JAVA_DLOADER try, unsuccessfully, to download a ransomware Trojan to the user's computer.

Pajares claims while the malware installed via the fake update does not exploit any java-related vulnerability, it is "clearly piggybacking on the Java zero-day incident and users' fears."

Pajares said users might be better off ditching Java completely.

"In light of the recent events surrounding Java, users must seriously consider their use of Java. Do they really need it?" he said.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021