Java server malware targets Windows systems

Share this article:

Researchers have discovered a backdoor delivered by a malicious JavaServer Page (JSP), which targets vulnerable Java-based HTTP servers and allows an attacker to hijack infected systems.

The malware, called “JavaWar,” infects victims via drive-by download or as a file dropped by other malware, and targets Windows operating systems, including 7, Vista, XP, Server 2003 and 2000. So far, however, in-the-wild instances of the threat have been limited.

To launch an attack, saboteurs use a password-cracking tool to gain administrator access to JSP, where they can then delete, edit, download or copy files from the infected server, according to research from Trend Micro, which discovered the threat.

In a blog published last Thursday to Trend Micro's site, researchers said attackers could also gain access to servers by targeting a Java Servlet container, like Apache Tomcat, or by exploiting the Tomcat Web Application Manager used in websites powered by Tomcat, an open source web server that provides software applications for users.

“Aside from gaining access to sensitive information, an attacker gains control of the infected system through the backdoor and can carry out more malicious commands onto the vulnerable server,” the blog post said.

Trend Micro advised users to implement strong passwords to thwart attacks executed with password-cracking tools, as well as visit only trusted sites and maintain software updates.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

NIST finalizes cloud computing roadmap

NIST finalizes cloud computing roadmap

The NIST architecture is designed to accelerate the adoption of cloud computing.

Chinese MitM attack targets iCloud users

Chinese MitM attack targets iCloud users

The attack used a false certificate to trick iCloud users into handing over personal data and login credentials. With an attack of this size, some experts and researchers believe the ...

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.