Noxx Posted May 8, 2012 Share Posted May 8, 2012 I just ran a scan on my laptop before opening RS, and i found something.A description of the item found is in the link.For those of you who do not wish to click on the link ill copy/paste it: Exploit:Java/CVE-2012-0507.D!ldr (?) Encyclopedia entryUpdated: Apr 17, 2012 | Published: Mar 29, 2012 AliasesNot available Alert Level (?)Severe Antimalware protection detailsMicrosoft recommends that you download the latest definitions to get protected.Detection last updated: Definition: 1.125.174.0Released: Apr 20, 2012 Detection initially created: Definition: 1.123.583.0Released: Mar 28, 2012 On this pageSummary|Symptoms|Technical Information|Prevention|Recovery SummaryExploit:Java/CVE-2012-0507.D!ldr is a detection for an obfuscated malicious Java class component stored within a Java Archive (.JAR), that uses its elevated privileges to download and execute other malware. Top SymptomsThere are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptoms. Top Technical Information (Analysis)Exploit:Java/CVE-2012-0507.D!ldr is a detection for an obfuscated malicious Java class component stored within a Java Archive (.JAR), that uses its elevated privileges to download and execute other malware. Web browsers that use vulnerable versions of Java may be exposed to this kind of threat. The vulnerability exploits a flaw in the deserialization of "AtomicReferenceArray" objects, which allows remote attackers to call, without proper "sandboxing", system level Java functions via the ClassLoader of a constructor that is being deserialized. This means it is able to perform actions outside of its "sandbox" that its not usually able to do. Installation This component usually arrives together with another Java class applet, detected as Exploit:Java/CVE-2012-0507.D, that triggers the vulnerability discussed in CVE-2012-0507. In the wild, the malicious Java package may contain the following malicious Java class files: Lion.class detected as Exploit:Java/CVE-2012-0507.Dka.class - detected as Exploit:Java/CVE-2012-0507.D!ldrPayload Downloads arbitrary files Exploit:Java/CVE-2012-0507.D!ldr is used in drive-by download attacks. In the wild, we have observed Exploit:Java/CVE-2012-0507.D!ldr downloading variants of PWS:Win32/Zbot and Backdoor:Win32/Kelihos.F. Analysis by Rodel Finones Top PreventionUpdate vulnerable applications This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links: CVE-2012-0507Java updatesTake the following steps to help prevent infection on your computer: Enable a firewall on your computer.Get the latest computer updates for all your installed software.Use up-to-date antivirus software.Limit user privileges on the computer.Use caution when opening attachments and accepting file transfers.Use caution when clicking on links to webpages.Avoid downloading pirated software.Protect yourself against social engineering attacks.Use strong passwords.Enable a firewall on your computer Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall. How to turn on the Windows Firewall in Windows 7How to turn on the Windows Firewall in Windows VistaHow to turn on the Windows firewall in Windows XPGet the latest computer updates Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites. Instructions on how to download the latest versions of some common software is available from the following: Microsoft Malware Protection Center - Updating SoftwareYou can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet. How to turn on Automatic Updates in Windows 7How to turn on Automatic Updates in Windows VistaHow to turn on Automatic Updates in Windows XPUse up-to-date antivirus software Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software, such as Microsoft Security Essentials, that is updated with the latest signature files. For more information, see http://www.microsoft.com/windows/antivirus-partners/. Limit user privileges on the computer Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges. This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run. You can configure UAC in your computer to meet your preferences: User Account Control in Windows 7User Account Control in Windows VistaApplying the Principle of Least Privilege in Windows XPMore on User Account ControlUse caution when opening attachments and accepting file transfers Exercise caution with email and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources. Use caution when clicking on links to webpages Exercise caution with links to webpages that you receive from unknown sources, especially if the links are to a webpage that you are not familiar with, unsure of the destination of, or suspicious of. Malicious software may be installed in your computer simply by visiting a webpage with harmful content. Avoid downloading pirated software Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information, see 'The risks of obtaining and using pirated software'. Protect yourself from social engineering attacks While attackers may attempt to exploit vulnerabilities in hardware or software to compromise a computer, they also attempt to exploit vulnerabilities in human behavior to do the same. When an attacker attempts to take advantage of human behavior to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted computer. For more information, see 'What is social engineering?'. Use strong passwords Attackers may try to gain access to your Windows account by guessing your password. It is therefore important that you use a strong password one that cannot be easily guessed by an attacker. A strong password is one that has at least eight characters, and combines letters, numbers, and symbols. For more information, see http://www.microsoft.com/security/online-privacy/passwords-create.aspx. Top RecoveryTo detect and remove this threat and other malicious software that may be installed on your computer, run a full-system scan with an appropriate, up-to-date, security solution. The following Microsoft products detect and remove this threat: Microsoft Security EssentialsMicrosoft Safety ScannerFor more information on antivirus software, see http://www.microsoft.com/windows/antivirus-partners/. Update vulnerable applications This threat exploits a known vulnerability in the Java Runtime Environment (JRE). To prevent your computer from being vulnerable to this malware, make sure that you install the updates available from the vendor. You can read more about this vulnerability from the following links: CVE-2012-0507Java updatesIt may be necessary to remove older versions of Java that are still present. Keeping old and unsupported versions of Java on your system presents a serious security risk. To read more about why you should remove older versions of Java, see the following information. Remove older versions of Java http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Exploit%3aJava%2fCVE-2012-0507.D!ldr&threatid=2147655409 Link to comment Share on other sites More sharing options...
Quyneax Posted May 9, 2012 Share Posted May 9, 2012 Moved to Keylogger Help :). Supporter of Zaros | Quest Cape owner since 22 may 2010 | No skills below 99 | Total level 2595 | Completionist Cape owner since 17th June 2013 | Suggestions 99 summoning (18th June 2011, previously untrimmed) | 99 farming (14th July 2011) | 99 prayer (8th September 2011) | 99 constitution (10th September 2011) | 99 dungeoneering (15th November 2011) 99 ranged (28th November 2011) | 99 attack, 99 defence, 99 strength (11th December 2011) | 99 slayer (18th December 2011) | 99 magic (22nd December 2011) | 99 construction (16th March 2012) 99 herblore (22nd March 2012) | 99 firemaking (26th March 2012) | 99 cooking (2nd July 2012) | 99 runecrafting (12th March 2012) | 99 crafting (26th August 2012) | 99 agility (19th November 2012) 99 woodcutting (22nd November 2012) | 99 fletching (31st December 2012) | 99 thieving (3rd January 2013) | 99 hunter (11th January 2013) | 99 mining (21st January 2013) | 99 fishing (21st January 2013) 99 smithing (21st January 2013) | 120 dungeoneering (17th June 2013) | 99 divination (24th November 2013) Tormented demon drops: twenty effigies, nine pairs of claws, two dragon armour slices and one elite clue | Dagannoth king drops: two dragon hatchets, two elite clues, one archer ring and one warrior ring Glacor drops: four pairs of ragefire boots, one pair of steadfast boots, six effigies, two hundred lots of Armadyl shards, three elite clues | Nex split: Torva boots | Kalphite King split: off-hand drygore mace 30/30 Shattered Heart statues completed | 16/16 Court Cases completed | 25/25 Choc Chimp Ices delivered | 500/500 Vyrewatch burned | 584/584 tasks completed | 4000/4000 chompies hunted Link to comment Share on other sites More sharing options...
Randox Posted May 10, 2012 Share Posted May 10, 2012 To me, it sounds like a fairly run of the mill virus. It looks like all it does is use a security exploit to download other programs and run them, which is bad. Reading all that, it seems that you visited some site which had a script to sneak this onto your computer (a drive by). I would assume you just have WSE remove it, or remove it yourself if the antivirus can't for some reason, then run a full system scan to make sure it, and everything it might have downloaded on your behalf, are all gone. Link to comment Share on other sites More sharing options...
mashia Posted July 24, 2012 Share Posted July 24, 2012 Are you sure it is a keylogger? One of the simplest techniques used to detect a Keylogger is doing the following:Type CTRL + ALT + DELETE, it will open your Task Manager, Processes tab look for BKP. exe or AKL. exe, if you find the BKP. AKL exe or. exe's why you have keylogger.* Remembering that if you can not always detect Keylogger by CTRL + ALT + DELETE.For those who have a little more technical knowledge, it also noted the hint of how good the performance of the processor. If it is working continuously even if the computer does not have many applications running is a sign that the machine can produce something suspicious. Love me, love my dog. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now