Analyzing the Pawn Storm Java Zero-Day – Old Techniques Reused

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Java used to be a favored vulnerability target for cybercriminals. However, in recent years that has not been the case. The now-fixed Java zero-day that was used in the Pawn Storm campaign was, in fact, the first time in nearly two years that a zero-day had been found and reported in Java.
This can be attributed, in part, to stepped up security measures for Java. As Oracle notes on the Java home page itself, out of date Java plugins are now disabled by major browsers. In addition, Java 7 Update 51 (released in January 2014) tightened the rules on what kind of applets could be run. By default, self-signed and unsigned applets (the ones most likely to be used by attackers) would not run by default in browsers. JRE also has click-to-play protection for all applet (signed and unsigned). Taken together, these have made Java a far less attractive platform for attackers.
Analyzing the Pawn Storm Java Zero-Day - Old Techniques Reused
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top