Cyber attackers are, above all else, opportunists—malware and viruses require time and resources to develop and are therefore created with the greatest returns in mind. In terms of operating systems, Windows typically gets a bad rap for security—the price of popularity, as it were. But as other OS platforms have whittled down Windows' market share in recent years, cyber attackers have had an increasingly broad playing field for exploitation.
Cross-platform Threats on the Horizon
Last week, researchers at Kaspersky Lab discovered a few families of malware that ship as Java JAR file executables, marking the first appearance of cross-platform malware on the cyber threat landscape. This is, of course, Java's main value proposition: write once, run anywhere. It seems that hackers have taken this and utilized it for nefarious purposes; new Java-based threats coming down the pipe can equally run on Mac, Linux, Windows, and even Android devices.
This week, Apple’s App Store and iTunes Store suffered a downtime of about 10 hours. For the better part of the day, customers were unable to access the stores, purchase music or apps, or make payments using the Apple Pay payment system. The problem has been attributed to “a configuration blunder” of its DNS setup.
The only caveat is that the Java Runtime Environment (JRE) must exist on the target system. Given the ubiquity of the Java platform, however, exploitable targets abound—according to Java.com, 97% of enterprise desktops and 89% of desktops in the U.S. run Java. As a technology, Java has been much maligned in recent years, with many security researchers callling for its complete eradication from the internet.
The spam campaigns delivering the malware JAR files have been detected using the following names:
It's worth noting that Kaspersky researchers only discovered the existence of cross-OS malware droppers, not complete standalone malware programs. Malware droppers are small pieces of software that avoid antivirus detection through their limited functionality. The purpose of a dropper is to gain entry into the system and download/install malware later from a central server hosted by the attacker. Security researchers warn that fully-fledged cross-OS malware programs are likely to soon follow.
Equal Opportunity Cyber Threats
Cross-platform ransomware. Source: Emsisoft.com.
Again, the key incentives for cross-platform malware development are economic: the rise in popularity of OS X and other Windows desktop alternatives has led to malware designed modularly for for wide distribution. Automated scanning for exposed server headers can be done with a simple script - signaling the continuing rise of automated hacking.
Whether your remediation efforts involve removing Java across your organization entirely or identifying/patching vulnerable versions of the JVM, UpGuard can ensure that exploitable flaws in your infrastructure are eliminated before reaching production environments. Our platform for cyber resilience can automatically monitor your environment for software packages—like Java—that could lead to security compromises.
Companies spent hundreds of billions of dollars last year as a result of cybersecurity incidents.
Read Blog >
Access to free vulnerability assessment should be a basic right in a world where computing is integral to social and economic life.
Read Blog >
Even today, the risk of data breaches in particular threaten to hamper business innovation. So what is cyber risk, and what can be done about it?
Read Blog >