Posted on 09/03/2012 10:05:45 AM PDT by Ernest_at_the_Beach
Closer inspection of the infection revealed deep network penetration that the installed antivirus applications were completely unable to cope with. The chief financial officer of the company relies on cloudy applications that require Java-in-the-web-browser. Contrary to early reports that we should only fear Java 7, this beauty crawled in through a fully up-to-date Java 6 browser plugin and installed some friends.
I have no idea what the initial vector was beyond the swift appearance and disappearance of some malicious Java archive files; the primary delivery mechanism scrubbed itself clean (along with significant chunks of the browser history) right after it downloaded its payload onto the compromised Microsoft Windows PC.
The payload: a software nastie called Sirefef. This itself is actually irrelevant; even Microsoft Security Essentials can find and kill most variants. The purpose of Sirefef is to serve as the staging component for the coup de grace: the highly sophisticated Zeroaccess rootkit (Sirefef downloaded some other friends too, but once the rootkit is dealt with, they are easily dispatched.)
Zeroaccess is a nightmare. It creates a hidden partition to run components from, deletes the BITS and Windows Update services, infects system restore and then removes the system restore interface from Windows. It locks you out of various sections of your file system it has decided to secrete backup copies of itself into. (C:\Windows\Temp, C:\Windows\System32\Config\Systemprofile and so forth.)
Zeroaccess knows all the standard tricks; it hides itself from Trend Micro's virus scanner Housecall, kills industrial-strength bleach Combofix (attempting to run this tool will freeze the system), resists cleaning by SurfRight's Hitman Pro, Symantec's resident AV and so forth. If you delete the hidden partition after booting from a Linux Live CD, chances are you didn't get every last remnant of the thing and it will be back in due time. It also prevents remote support app Teamviewer from starting properly with Windows.
If any residue of the rootkit lingers, or if Sirefef and/or its downloaded friends remain, they will all download and reinstall one another and we get to play whack-a-malware one more time. Bonus points were awarded for exploiting known Windows 7 vulnerabilities to infect every other machine on the network; that was a nice touch that really made my Friday.
So what's the solution? It turns out that some combination therapy kills the Zeroaccess variant in question. The solution I have settled upon is this:
If you are infected with Zeroaccess, exercise extreme caution. Someone is actively versioning this rootkit. I detected at least three different variants on one network alone. More to the point, the little friends that serve as satellite malware are also seeing some rapid evolution; what worked for me today may not work a week from now.
This incident should serve to underscore exactly how serious the Java exploits in question are. If you can, uninstall Java. If you must use Java, keep it as up-to-date as possible and see if you can disable or remove the plugins for your browsers. (In an attempt to help resolve the current crisis, Ninite is offering free access to the pro version for a limited time; it can really help with the updating.) If you absolutely must use Java-in-the-browser then it's time to start taking security very seriously; break out the tinfoil and start making some shiny hats.
Java-in-the-browser absolutely must be treated as "already compromised". There is no wiggle room here. Do not under any circumstances run Java in the browser on any production system or any client system in which any other application is used. Go buy another Windows licence and put Java inside a virtual machine.
Ring-fence the virtual machine by placing it on its own VLAN and subnet. Keep that virtual machine's traffic as separate from the rest of your network and system as you possibly can: Java-in-the-browser is a live grenade and you can't afford to have it go off inside your network. If you can, deploy the virtual machine from a managed template; the ability to destroy it at the end of the day and revert to a "known good" is a huge advantage when dealing with a threat of this magnitude.
Even if Oracle gets its act together and solves the immediate issues, this is only the latest in a long line. Java is simply is not developed with an adequate "security first" approach; Oracle is used to dealing with large corporations, not consumers. It doesn't have the experience to fight these kinds of rapidly escalating arms races, and it shows.
There isn't time to wait for Oracle to overcome its corporate inertia. It is time for systems administrators to act. It is our duty to depopulate Java with extreme prejudice. ®
I would disable Sun Java if you are running it. That is the program that will be exploited.
While in internet explorer, click tools, internet options, programs tab, manage add ons, look for Sun Java in the list, disable it if it is there. This is for windows 7.
Thanks. I disabled it in both IE & Firefox.
Microsoft is aware of this rootkit and has a page on it in the Malware Protection site:
Lot’s of good tips to protect your computer from it and from fixing your PC if you get it. They are not, however, recommending disabling Java. Note in the article originally posted the business executive had to have Java in the browser to track finances. This is true for a lot of people. I’m not sure that disabling Java is going to work with a lot of my users.
bookmark
sfl
My only concern about the Microsoft link is the fact that it’s so old. November of 2011. So I did a search in the Malware Protection site for “Java Rootkit” and got the following, sorted by date:
Looks bad. Every day another new one.
Still, as I said, we have several major apps we support that uses Java, and getting rid of them would be a sure PITA and a possible show stopper.
As a stopgap, ALWAYS ensure you antivirus/anti-spyware software is running always, and updated everyday!!!!!
Bookmark !
Microsoft is sue-happy. Lawyers pretty much call all the shots.
If they just recommend disabling Java, I’m pretty sure Oracle would get legal. And that costs MSFT money even if they win.
Then again, if a few major corporate players get hacked bad they’ll be talking to counsel.
So it’s generic, pappy, we-told-you-so remodies.
This is the crap I fight everyday. In the end, the corp bigwigs hold IT responsible. That crap rolls downhill to us administrators. We’re on the line in more ways than one.
Me? I pray a lot!
Java is crap.
All the things they said Java would never do, they now do with ease. Like infect you.
I have Noscript installed w/Firefox, the problem is there are tons of Java junkies out there who think it is the answer to everything, and half the websites I go to don’t work.
It was a flash in the pan and ought to be replaced by a new HTML standard.
It would help if MS would clean up there buffer problems and application security.... yeah, like that’s gonna happen!
Read the Technical paper for some real hair-raising detail.....
What a mess...
Like I said, pray! :-)
*****************************************************
Link :
Lightweight Portable Security---DOD
******************************
The Abstract from Distrowatch above......
*******************************************
Lightweight Portable Security (LPS) is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.
Man oh Man....glad I retired from the Main Frame business....
Guess I have a question ...if an enterprise is running Virtual machines hosting linus apps and windows apps...does that help ...in detection?
BTTT.
Got that right!
I did manage to find the equivalent of a “Windows Live” CD.
You burn it and boot from CD.
Problem is, zero installed software, I can’t remember if IE is even installed, so except for tweaking registries, recovering hard drives, etc., it’s basically useless.
Can’t remember the name exactly... something like “Windows Presentation Manager” or some such crap.
Sure would be nice if MS worried as much about my rights to not have my machine infected as they do worrying about DRM for Katy Perry or WTF...
***********************************EXCERPT*********************************************
ZeroAccess is a rootkit that uses advanced techniques to conceal itself and thwart your PC security software. Afterwards, ZeroAccess may also be used to open a backdoor on your system in the fashion of a backdoor Trojan. As is true of other rootkits that SpywareRemove.com malware researchers have analyzed, ZeroAccess has negligible symptoms of its activities, although you may be able to find ZeroAccess by watching for malfunctions in your anti-malware and security programs. ZeroAccess has been updated several times throughout its life and is sufficiently advanced and potentially damaging that only specialized and up-to-date anti-malware programs should be used to delete any ZeroAccess infection on your PC. Refraining from doing so will leave your computer open to attack by criminals and other forms of harmful software, and can cause lose of private information or destruction of files on your PC.
************************************
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.