Sunday, December 18, 2011

Cyber-Attackers Successfully Exploiting Java Flaw in Outdated Software

Cyber-Attackers Successfully Exploiting Java Flaw in Outdated Software

SUMMARY: Here's more proof that people aren't regularly patching software: Most of the attacks in the first half of 2011 exploited Java bugs that Oracle had patched over a year...

Published: November 30

http://j.mp/tBuUwv

This article was sent from the eWEEK App.

SUMMARY: Here's more proof that people aren't regularly patching software: Most of the attacks in the first half of 2011 exploited Java bugs that Oracle had patched over a year ago.



Cyber-attackers continue to target vulnerabilities in Java, even the ones that Oracle has already patched, because end-user systems aren't being properly updated, Microsoft warned.

"Between one-third and one-half" of all attacks detected and blocked by Microsoft's security software from the beginning of July 2010 to the end of June 2011 were Java-based, Tim Rains, a director of Microsoft's Trustworthy Computing group, wrote Nov. 28 on the Microsoft Security blog. Microsoft's anti-malware technologies blocked more than 27.5 million Java exploits over a 12-month period, many of which had been patched at least a year ago, Rains said.

Microsoft researchers have noted in previous Security Intelligence Reports that attacks targeting Java exploits have been increasing, and they surpassed Adobe-related attacks in volume last year. The latest volume of the Microsoft Security Intelligence Report, volume 11, found that the most commonly observed type of exploits in the first half of 2011 targeted Oracle's Java Runtime Environment (JRE), Java Virtual Machine (JVM) and Java SE in the Java Development Kit (JDK).

"Attackers have been aggressively targeting vulnerabilities in Java because it is so ubiquitous," Rains said, noting that Oracle claims over 3 billion devices run Java.

The most commonly blocked attack in the first half of 2011 exploited a JRE bug discovered and patched in March 2010. The exploits first appeared during the fourth quarter of 2010, at least six months after the patch was released, and increased "tenfold" in the first quarter of 2011, according to Rains. The second most commonly blocked exploit relied on a JVM flaw that allowed an unsigned Java applet to gain elevated privileges outside the Java sandbox and exists in JVM 5 up to update 22 and in JVM 6 up to update 10. It was patched in December 2008. Others on the list included a JVM bug patched by Sun Microsystems in November 2009 and a different JRE flaw patched by Oracle in March 2010.

"Once attackers develop or buy the capability to exploit a vulnerability, they continue to use the exploit for years, presumably because they continue to get a positive return on investment," Rains said, noting that this tactic is not unique to Java flaws, but in "all prevalent software."

System administrators and users should regularly update Java and keep up with the updates, Rains said. Some environments may have systems running different versions of Java, as well.

Some security experts recommend not installing Java by default and limiting the installation to only those systems that actually require it. "Most people aren't using Java these days, and it reduces the attack surface for exploits delivered over the Internet," said Chester Wisniewski, a senior security adviser at Sophos. "Less software plugged" into the browser means less chances for an attack to succeed, he said.

Security analyst and writer Brian Krebs recently uncovered an instance of malware exploiting an already patched Java flaw, with the resulting exploit being bundled with a crimeware kit available for sale on criminal underground forums.

The new Java exploit is being distributed as a free add-on to existing owners of the BlackHole crimeware kit, or priced at $4,000 for new owners. A three-month license for the crimeware kit itself costs $700, and hosted servers running the malware toolkit are also available, according to the post on Krebs on Security.

Java exploits are "notoriously successful" when bundled with commercial exploit packs, according to Krebs. Cyber-attackers can use the BlackHole kit, which extensively uses Java flaws, to launch malicious Websites that can download malware on unsuspecting site visitors running an outdated version of Java, he said. Even though it is a relatively new malware toolkit, BlackHole has become one of the more popular exploit kits this year, according to security experts.

This particular vulnerability exists in the Java Runtime Environment Component in older versions of Oracle Java, namely Oracle Java SE JDK and JRE 7 and Java 6 Update 27 and earlier. Users with the latest version of Java, such as Java 6 Update 29 or Java 7 Update 1, are not affected. Oracle patched this flaw in mid-October with 19 other script engine bugs.




Five Key Enterprise Development Trends

Five Key Enterprise Development Trends

SUMMRY: eWEEK identifies major areas on which developers should concentrate. As we head into 2012, enterprise developers will need to focus on some major themes, including the emergence of HTML5,...

Published: December 5

http://j.mp/vUf9ZA

This article was sent from the eWEEK App.

SUMMRY: eWEEK identifies major areas on which developers should concentrate.


As we head into 2012, enterprise developers will need to focus on some major themes, including the emergence of HTML5, "big data" and analytics, and Agile Application Lifecycle Management (ALM). They should also continue to concentrate on Web, mobile and cloud development, and take advantage of advances in languages and integrated development environments (IDEs).

HTML5 is going like gangbusters. Microsoft has adopted HTML5 for Windows 8, Internet Explorer 9 and upcoming versions of the browser and other products. And there are indications that Microsoft may shelve future development of Silverlight, a development framework for building Web and mobile applications, after Silverlight 5 or a subsequent point release.

The onset of HTML5 also drove Adobe to halt its development of its Flash technology for mobile browsers.

"HTML5 is coming on strong as a standard, accelerated by the speed of change of hardware devices," said Al Hilwa, an analyst with IDC. "By 2013, we will reach a point where 90 percent of smartphones and tablets will sport HTML5-capable browsers."

However, Hilwa notes that it is important to remember that the need for a Flash browser plug-in continues on the desktop. "We don't expect 90 percent of desktop browsers to be capable of HTML5 until 2015," he said. "So the differentiation that Flash provides in high-end graphics and video protection continues, and Adobe will continue to invest in it."

Web-based development environments, such as the Eclipse Orion, Cloud9 IDE, eXo Cloud IDE and others, are becoming more and more popular. "Web-based tools will become more important as development moves into the cloud," said Mike Milinkovich, executive director of the Eclipse Foundation. "However, we should expect a new way of thinking about Web-based IDEs. Trying to fit something like Eclipse into a Web browser just won't scale. The nice thing about Orion is, it attempts to make the browser your IDE."

The big data and analytics craze will continue to grow due to the explosion of data coming from intelligent devices, social media and other sources. According to IDC, the market for intelligent systems will grow substantially in the next few years, from 800 million units today to more than 2.3 billion by 2015. Shipments of embedded devices already exceed those of cell phones and PCs, and IDC predicts the market for intelligent systems will soon represent a $520 billion industry.

"Data has become the new currency," said Kevin Dallas, Microsoft's Windows Embedded general manager. As proof of how hot big data has become, venture capital firm Accel Partners launched a $100 million big data fund at the recent Hadoop World 2011 conference.

Meanwhile, "One of the most important trends in 2012 will be the maturation of Java PaaS [platform as a service]," said Mik Kersten, CEO of Tasktop Technologies. "While the transition will be a long one, Oracle's Java Cloud culminates key announcements around PaaS offerings in 2011, and sends a signal that Java developers [should] start considering PaaS solutions as the deployment destination of new applications."

The Eclipse Foundation's Milinkovich said he believes the concept of Agile Application Lifecycle Management is becoming a reality. Developers are integrating new tools chains to support Agile development and a faster release process, he said.

"On the ALM side, a key trend to watch [in] 2012 is the open-source-powered tidal wave changing how developers work and collaborate," Tasktop's Kersten added.