24h購物| | PChome| 登入
2014-07-25 16:26:33| 人氣214| 回應0 | 上一篇 | 下一篇

two more exploits are being found that make use of the runti

推薦 0 收藏 0 轉貼0 訂閱站台


Guild Wars 2 Power Leveling on http://rmtbuddy.com/guild-wars-2-gold-us-powerleveling.html
view more:   http://rmtbuddy.com/guild-wars-2-gold-us-powerleveling.html
More Java-based malware plagues the cross-platform runtime
Java cannot seem to get a break. Only a few days after patching the last zero-day vulnerability, two more exploits are being found that make use of the runtime. One, as noted by Kaspersky, is a recent exploit of the latest runtime's attempts to install a McRAT executable by overwriting memory in the JVM that will trigger the executable to run.Once installed, the McRAT malware will attempt to contact command and control servers and copy itself into dll files in Windows systems.This malware is specifically Windows-based; however, a second one outlined by Intego, is a Minecraft password-stealing Trojan that masks as a Java exectutable called gw2 power leveling rmtbuddy "Minecraft Hack Kit." This kit is distributed as a tool to help Minecraft users perform moderating tasks such as kicking or banning other users in the game.When run, however, the program will install three new applets along with a Launch Agent http://www.rmtbuddy.com/guild-wars-2-gold-us-powerleveling.html script that keeps them persistently running in the background. These secondary payload programs then attempt to steal Minecraft credentials and send them to various Hotmail accounts.These new threats are relatively low in severity, with the Minecraft one being quite specific for those who play the Minecraft game (and who have Java installed), and who furthermore attempt to gain advantages in the game through a promised hack; however, both of these threats will run on a system that has the latest Java versions installed. Unlike the McRAT malware, however, the Minecraft attack does not attempt to exploit the Java Web plug-in and instead only tricks users to download and run the software, so even with a properly managed Java plug-in it will still run.For this and similar threats in OS X, you can install a reverse firewall such as Little Snitch that will monitor outbound connection attempts and notify you of them. In addition, setting up a monitoring service for the system's LaunchAgent and LaunchDaemon folders will help prevent programs from unknowingly setting up scripts that could have malware running in the background.Questions? Comments? Have a fix? Post them below or !Be sure to check us out on Twitter and the CNET Mac forums.
More Java-based malware plagues the cross-platform runtime

台長: guild wars 2 power levelingdcfv
人氣(214) | 回應(0)| 推薦 (0)| 收藏 (0)| 轉寄
全站分類: 彩虹同志(同志心情、資訊)

是 (若未登入"個人新聞台帳號"則看不到回覆唷!)
* 請輸入識別碼:
請輸入圖片中算式的結果(可能為0) 
(有*為必填)
TOP
詳全文