Users are being duped into running a malicious Java applet that was signed with a stolen digital certificate and designed to look like a security update.
Security researcher Eric Romang on Tuesday blogged about the malicious file, which appears to victims as a “Java ClearWeb Security Update” – as shown in a screen cap he posted. The applet was discovered on a German online dictionary site, which was compromised by an exploit kit called “g01pack.”
According to Romang, the stolen private key used to sign the applet belongs to CLEAResult Consulting, an Austin, Texas-based energy efficiency firm. The company is listed as the publisher of the application in the fake "security update" that Romang screen-grabbed.
Jindrich Kubec, director of threat intelligence at AVAST, a Czech Republic-based security software company, said default security settings in Java exacerbated the threat for users. There is no word yet on what Java vulnerability was being exploited, though there have been a number of bugs in the platform that recently have surfaced.
“My Java has ‘check certificates for revocation,' turned off,” Kubec tweeted, referencing the issue. “[It] also has ‘enable granting elevated access to self-signed apps,' [set] to on.”
On Monday, Oracle released an update to patch other vulnerabilities in its widely used Java software. The update for Java SE 5, 6 and 7 addressed two flaws, CVE-2013-0809 and CVE-2013-1493. The latter bug was exploited in the wild by attackers to spread the McRAT executable.
SCMagazine.com reached out to Oracle concerning the malicious Java applet, but did not immediately hear back.