Security researchers from FireEye, AlienVault, and DeependResearch have intercepted targeted malware attacks utilizing the latest Java zero day exploit. The vulnerability affects Java 7 (1.7) Update 0 to 6. It does not affect Java 6 and below.
Based on related reports, researchers were able to reproduce the exploit on Windows 7 SP1 with Java 7 Update 6. There's also a Metasploit module available.
Upon successful exploitation, the campaign drops MD5: 4a55bf1448262bf71707eef7fc168f7d - detected by 28 out of 42 antivirus scanners as Gen:Trojan.Heur.FU.bqW@a4uT4@bb; Backdoor:Win32/Poison.E
Users are advised to consider browsing the Web, and interacting with emails in an isolated environment, or to to block Java in their Web browsers until Oracle ships a patch for the security flaw.
Although what we've got here is a clear indication of an ongoing malicious attack utilizing a zero day flaw, on the majority of occassions cybercriminals wouldn't necessarily rely on a zero day flaw in order to infect as many users as possible. Instead, they would stick to using outdated and already patched vulnerabilities taking into consideration the fact that end and corporate users aren't patching their third-party software and browser plugins.
Find out more about Dancho Danchev at his LinkedIn profile.