Microsoft Warns Java Exploits Hit 'Unprecedented Wave' - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Enterprise Architecture

Microsoft Warns Java Exploits Hit 'Unprecedented Wave'

With more than 6 million attacks on vulnerable code in the third quarter, Microsoft is urged to distribute a patch.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
The third quarter saw more than 6 million Java and PDF exploit attempts, according to the Microsoft Malware Protection Center. That number marked a sharp increase from 2009 and early 2010, when such attacks were more on the order of hundreds of thousands per quarter -- not millions.

However, despite the sharp increase -- mostly involving just three Java vulnerabilities, long since patched -- almost no one has been discussing this trend, said Holly Stewart of the Microsoft Malware Protection Center.

Why is that? The likely scenario is because IDS and IPS vendors, "who are typically the folks that speak out first about new types of exploitation, have challenges with parsing Java code," she said.

Stewart added, "Think about incorporating a Java interpreter into an IPS engine. The performance impact on a network IPS could be crippling. So, the people that we expect to notice increases in exploitation might have a hard time seeing this particular spectrum of light. Call it Java-blindness."

The second reason it hasn't been getting much attention, she said, is that Java exploits make up only a fraction of malware attacks, such as those involving Zeus. But they're still a threat. "What we have to remember is that, with exploits, it's not just about volume -- they happen in a flash and you have to catch them in the act … before they open the door to lots of malware," she said. "So, even small numbers, especially when they're against unpatched vulnerabilities, matter a lot." The problem is also that Java users largely don't patch, at least not quickly. Indeed, according to Wolfgang Kandek, CTO of Qualys, his company's research has found that 80% of workstations have Java installed, and half of those use a version with known critical vulnerabilities. Accordingly, that makes Java not only "the most vulnerable plug-in of all," but also gives malware "an excellent chance to install itself and control the targeted machine," he said.

What can be done to eliminate insecure Java? Kandek suggests more collaboration among vendors. "A possible solution is to include Java in an existing automated update process," said Kandek. "It would be ideal if Oracle/Sun could collaborate with Microsoft" and, in particular, use Windows Server Update Services to distribute Java fixes.

In fact, "if this mechanism could then be extended to all major software vendors, the Internet would become increasingly safer to use for all of us," he said.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
10 Ways to Prepare Your IT Organization for the Next Crisis
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/20/2020
News
IT Spending Forecast: Unfortunately, It's Going to Hurt
Jessica Davis, Senior Editor, Enterprise Apps,  5/15/2020
Commentary
Helping Developers and Enterprises Answer the Skills Dilemma
Joao-Pierre S. Ruth, Senior Writer,  5/19/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll