Lucian Constantin
CSO Senior Writer

Researchers link latest Java zero-day exploit to Bit9 hack

news
Mar 4, 20133 mins

The remote access malware used in both cases is connected to the same control server, Symantec researchers say

The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor Symantec.

Security researchers from FireEye, who found the new Java attacks last week, said that the Java exploit installs a remote access piece of malware called McRAT.

The threat, which Symantec products detect as Trojan.Naid, connects back to a command-and-control (C&C) server using the 110.173.55.187 IP (Internet Protocol) address, Symantec researchers said Friday in a blog post.

“Interestingly, a Trojan.Naid sample was also signed by the compromised Bit9 certificate discussed in the Bit9 security incident update and used in an attack on another party,” they said. “This sample also used the backchannel communication server IP address 110.173.55.187.”

Last month, Bit9, a company that sells security products using whitelisting technology, announced that hackers broke into one of its servers and used one of the company’s digital certificates to sign malware. That malware was then used in attacks against a few U.S. organizations, the company said.

“In the subsequent attacks on the three target organizations, the attackers appeared to have already compromised specific Websites (a watering hole style attack, similar to what was recently reported by Facebook, Apple and Microsoft),” Bit9’s CTO Harry Sverdlove said in a blog post last Monday. “We believe the attackers inserted a malicious Java applet onto those sites that used a vulnerability in Java to deliver additional malicious files, including files signed by the compromised certificate.”

One of those malicious files connected back to IP address “110.173.55.187” over port 80, the Bit9 CTO said. The IP is registered to an address in Hong Kong.

“The Trojan.Naid attackers have been extremely persistent and have shown their sophistication in multiple attacks,” the Symantec researchers said. “Their primary motivation has been industrial espionage on a variety of industry sectors.”

The attacks they launch usually involve zero-day vulnerabilities. In 2012 they conducted a watering hole attack — an attack where a website frequently visited by the intended targets is infected — that exploited a zero-day vulnerability in Internet Explorer, the Symantec researchers said.

Oracle has yet to reveal its patching plans for this latest Java vulnerability. The next Java security update was scheduled for April, but the company might decide to release an emergency update before then.

Security researchers have advised users who don’t need access to Web-based Java content to remove the Java plug-in from their browsers. The latest version of Java — Java 7 Update 15 — provides an option through its control panel to disable the Java plug-ins or to force a confirmation prompt before Java applets are allowed to run inside the browser.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author