Jump to content

Is this bad? :|


Noxx

Recommended Posts

I just ran a scan on my laptop before opening RS, and i found something.

A description of the item found is in the link.

For those of you who do not wish to click on the link ill copy/paste it:

 

 

Exploit:Java/CVE-2012-0507.D!ldr (?)

 

Encyclopedia entry

Updated: Apr 17, 2012 | Published: Mar 29, 2012

 

Aliases

Not available

 

Alert Level (?)

Severe

 

Antimalware protection details

Microsoft recommends that you download the latest definitions to get protected.

Detection last updated:

Definition: 1.125.174.0

Released: Apr 20, 2012 Detection initially created:

Definition: 1.123.583.0

Released: Mar 28, 2012

 

On this page

Summary|Symptoms|Technical Information|Prevention|Recovery

 

 

 

Summary

Exploit:Java/CVE-2012-0507.D!ldr is a detection for an obfuscated malicious Java class component stored within a Java Archive (.JAR), that uses its elevated privileges to download and execute other malware.

 

 

Top

 

 

Symptoms

There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms.

 

Top

 

 

Technical Information (Analysis)

Exploit:Java/CVE-2012-0507.D!ldr is a detection for an obfuscated malicious Java class component stored within a Java Archive (.JAR), that uses its elevated privileges to download and execute other malware.

 

Web browsers that use vulnerable versions of Java may be exposed to this kind of threat.

 

The vulnerability exploits a flaw in the deserialization of "AtomicReferenceArray" objects, which allows remote attackers to call, without proper "sandboxing", system level Java functions via the ClassLoader of a constructor that is being deserialized. This means it is able to perform actions outside of its "sandbox" that its not usually able to do.

 

Installation

 

This component usually arrives together with another Java class applet, detected as Exploit:Java/CVE-2012-0507.D, that triggers the vulnerability discussed in CVE-2012-0507.

 

In the wild, the malicious Java package may contain the following malicious Java class files:

 

Lion.class detected as Exploit:Java/CVE-2012-0507.D

ka.class - detected as Exploit:Java/CVE-2012-0507.D!ldr

Payload

 

Downloads arbitrary files

 

Exploit:Java/CVE-2012-0507.D!ldr is used in drive-by download attacks. In the wild, we have observed Exploit:Java/CVE-2012-0507.D!ldr downloading variants of PWS:Win32/Zbot and Backdoor:Win32/Kelihos.F.

 

Analysis by Rodel Finones

 

 

Top

 

 

Prevention

Update vulnerable applications

 

This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links:

 

CVE-2012-0507

Java updates

Take the following steps to help prevent infection on your computer:

 

Enable a firewall on your computer.

Get the latest computer updates for all your installed software.

Use up-to-date antivirus software.

Limit user privileges on the computer.

Use caution when opening attachments and accepting file transfers.

Use caution when clicking on links to webpages.

Avoid downloading pirated software.

Protect yourself against social engineering attacks.

Use strong passwords.

Enable a firewall on your computer

 

Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.

 

How to turn on the Windows Firewall in Windows 7

How to turn on the Windows Firewall in Windows Vista

How to turn on the Windows firewall in Windows XP

Get the latest computer updates

 

Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites. Instructions on how to download the latest versions of some common software is available from the following:

 

Microsoft Malware Protection Center - Updating Software

You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.

 

How to turn on Automatic Updates in Windows 7

How to turn on Automatic Updates in Windows Vista

How to turn on Automatic Updates in Windows XP

Use up-to-date antivirus software

 

Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software, such as Microsoft Security Essentials, that is updated with the latest signature files. For more information, see http://www.microsoft.com/windows/antivirus-partners/.

 

Limit user privileges on the computer

 

Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges. This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run.

 

You can configure UAC in your computer to meet your preferences:

 

User Account Control in Windows 7

User Account Control in Windows Vista

Applying the Principle of Least Privilege in Windows XP

More on User Account Control

Use caution when opening attachments and accepting file transfers

 

Exercise caution with email and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.

 

Use caution when clicking on links to webpages

 

Exercise caution with links to webpages that you receive from unknown sources, especially if the links are to a webpage that you are not familiar with, unsure of the destination of, or suspicious of. Malicious software may be installed in your computer simply by visiting a webpage with harmful content.

 

Avoid downloading pirated software

 

Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information, see 'The risks of obtaining and using pirated software'.

 

Protect yourself from social engineering attacks

 

While attackers may attempt to exploit vulnerabilities in hardware or software to compromise a computer, they also attempt to exploit vulnerabilities in human behavior to do the same. When an attacker attempts to take advantage of human behavior to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted computer. For more information, see 'What is social engineering?'.

 

Use strong passwords

 

Attackers may try to gain access to your Windows account by guessing your password. It is therefore important that you use a strong password one that cannot be easily guessed by an attacker. A strong password is one that has at least eight characters, and combines letters, numbers, and symbols. For more information, see http://www.microsoft.com/security/online-privacy/passwords-create.aspx.

 

 

Top

 

 

Recovery

To detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat:

 

Microsoft Security Essentials

Microsoft Safety Scanner

For more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/.

 

Update vulnerable applications

 

This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links:

 

CVE-2012-0507

Java updates

It may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information.

 

Remove older versions of Java

 

http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Exploit%3aJava%2fCVE-2012-0507.D!ldr&threatid=2147655409

Link to comment
Share on other sites

Moved to Keylogger Help :).

Supporter of Zaros | Quest Cape owner since 22 may 2010 | No skills below 99 | Total level 2595 | Completionist Cape owner since 17th June 2013 | Suggestions

99 summoning (18th June 2011, previously untrimmed) | 99 farming (14th July 2011) | 99 prayer (8th September 2011) | 99 constitution (10th September 2011) | 99 dungeoneering (15th November 2011)

99 ranged (28th November 2011) | 99 attack, 99 defence, 99 strength (11th December 2011) | 99 slayer (18th December 2011) | 99 magic (22nd December 2011) | 99 construction (16th March 2012)

99 herblore (22nd March 2012) | 99 firemaking (26th March 2012) | 99 cooking (2nd July 2012) | 99 runecrafting (12th March 2012) | 99 crafting (26th August 2012) | 99 agility (19th November 2012)

99 woodcutting (22nd November 2012) | 99 fletching (31st December 2012) | 99 thieving (3rd January 2013) | 99 hunter (11th January 2013) | 99 mining (21st January 2013) | 99 fishing (21st January 2013)

99 smithing (21st January 2013) | 120 dungeoneering (17th June 2013) | 99 divination (24th November 2013)

Tormented demon drops: twenty effigies, nine pairs of claws, two dragon armour slices and one elite clue | Dagannoth king drops: two dragon hatchets, two elite clues, one archer ring and one warrior ring

Glacor drops: four pairs of ragefire boots, one pair of steadfast boots, six effigies, two hundred lots of Armadyl shards, three elite clues | Nex split: Torva boots | Kalphite King split: off-hand drygore mace

30/30 Shattered Heart statues completed | 16/16 Court Cases completed | 25/25 Choc Chimp Ices delivered | 500/500 Vyrewatch burned | 584/584 tasks completed | 4000/4000 chompies hunted

Link to comment
Share on other sites

To me, it sounds like a fairly run of the mill virus. It looks like all it does is use a security exploit to download other programs and run them, which is bad. Reading all that, it seems that you visited some site which had a script to sneak this onto your computer (a drive by). I would assume you just have WSE remove it, or remove it yourself if the antivirus can't for some reason, then run a full system scan to make sure it, and everything it might have downloaded on your behalf, are all gone.

Link to comment
Share on other sites

  • 2 months later...

Are you sure it is a keylogger? One of the simplest techniques used to detect a Keylogger is doing the following:

Type CTRL + ALT + DELETE, it will open your Task Manager, Processes tab look for BKP. exe or AKL. exe, if you find the BKP. AKL exe or. exe's why you have keylogger.

* Remembering that if you can not always detect Keylogger by CTRL + ALT + DELETE.

For those who have a little more technical knowledge, it also noted the hint of how good the performance of the processor. If it is working continuously even if the computer does not have many applications running is a sign that the machine can produce something suspicious.

Love me, love my dog.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.