European stock market graphic illustrating flat trading amid industrial gains - Global Banking & Finance Review
This image depicts the European stock market trends, reflecting recent fluctuations. It highlights the balance between rising industrial shares and healthcare losses, relevant to the article on European financial markets.
Top Stories

TRUSTEER COMMENT ON JAVA-BASED MALWARE INFILTRATION

Published by Gbaf News

Posted on January 16, 2014

3 min read
Add as preferred source on Google

Chinese-Linked Attacks Using Java Malware

It has been reported that a group of cyber attackers, believed to have ties to the Chinese government, have infiltrated U.S. companies and established a long-term presence using Java-based malware, Javafog.

Dana Tamir, director of enterprise security at Trusteer

Dana Tamir, director of enterprise security at Trusteer

Trusteer Security Expert Response

Dana Tamir, director of enterprise security at Trusteer, an IBM company, commented:
“Java offers powerful capabilities for businesses. Today almost every organisation relies on Java applications. But Java is a high risk application that exposes organisations to advanced attacks. Java has numerous vulnerabilities that can be exploited to deliver malware and compromise users’ machines. Malware written in Java code, like the Javafog Trojan, is extremely difficult to detect and therefore can remain stealthy for longer periods of time. The Java protections that are available today are very limited in their capabilities, especially against zero-day threats. Because organisations can’t eliminate Java from their environments, it is not surprising that adversaries and cyber-criminals are using malicious Java code to infiltrate them.

Mitigation Strategies Against Java Exploits

To prevent Java exploits and malware-based infiltrations, it is important to restrict execution only to known trusted Java files. Since organisations struggle to manage and maintain a complete list of all known trusted files, they should at least restrict execution to files that have been signed by trusted vendors, or downloaded from trusted domains. Otherwise untrusted Java files should not be allowed to freely execute within the enterprise environment. Restriction of untrusted Java allows organisations to safely run their business without exposing themselves to such risk.”

It has been reported that a group of cyber attackers, believed to have ties to the Chinese government, have infiltrated U.S. companies and established a long-term presence using Java-based malware, Javafog.

Dana Tamir, director of enterprise security at Trusteer

Dana Tamir, director of enterprise security at Trusteer

Dana Tamir, director of enterprise security at Trusteer, an IBM company, commented:
“Java offers powerful capabilities for businesses. Today almost every organisation relies on Java applications. But Java is a high risk application that exposes organisations to advanced attacks. Java has numerous vulnerabilities that can be exploited to deliver malware and compromise users’ machines. Malware written in Java code, like the Javafog Trojan, is extremely difficult to detect and therefore can remain stealthy for longer periods of time. The Java protections that are available today are very limited in their capabilities, especially against zero-day threats. Because organisations can’t eliminate Java from their environments, it is not surprising that adversaries and cyber-criminals are using malicious Java code to infiltrate them.

To prevent Java exploits and malware-based infiltrations, it is important to restrict execution only to known trusted Java files. Since organisations struggle to manage and maintain a complete list of all known trusted files, they should at least restrict execution to files that have been signed by trusted vendors, or downloaded from trusted domains. Otherwise untrusted Java files should not be allowed to freely execute within the enterprise environment. Restriction of untrusted Java allows organisations to safely run their business without exposing themselves to such risk.”

Key Takeaways

  • Java, widely used in organisations, poses high security risks due to numerous exploitable vulnerabilities.
  • Java-based malware like Javafog is hard to detect, enabling attackers to maintain long-term stealth access.
  • Zero‑day threats in Java environments are particularly difficult to defend against with current protections.
  • Restricting Java execution to signed files or trusted domains can significantly reduce exploitation risk.

References

Frequently Asked Questions

What is Javafog?
Javafog is a Trojan written in Java, difficult to detect, used by attackers to maintain long‑term access inside enterprise environments.
Why is Java considered high risk?
Because it’s widely used and has many vulnerabilities that adversaries can exploit to deliver stealthy malware like Javafog.
What makes Javafog hard to detect?
Being written in Java and exploiting zero‑day vulnerabilities allows it to evade standard detection tools and remain stealthy.
How can organisations mitigate Java‑based threats?
By restricting execution to Java files signed by trusted vendors or downloaded from trusted domains, and blocking all untrusted Java code.

Tags

Related Articles

More from Top Stories

Explore more articles in the Top Stories category