Zero-Day vulnerability is not fixed yet.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Every day more and more people give preferences to the virtual life instead of a real one. The Internet is turned into the place where people make acquaintances, communicate each other. One can buy and sell goods and services via Internet. Some persons work on the web and make their money. There are a lot of entertainments for all tastes. To be short they spend much time on the Internet. At the same time the Web space is not a safe place. There are a lot of catches prepared by cyber criminals, such as computer viruses, rogues, worms, spyware, ransomware etc. All these parasites get their points of destinations via vulnerabilities available in software installed on a computer. If there are such holes on your computer, you can face such problems as stolen credit cards and passwords and other private information. The vulnerabilities were spotted in Foxit Reader, Adobe Flash Player, Adobe Reader, Microsoft Exchange Server etc.

The vulnerabilities of software which are not learned and fixed yet are actively used by frauds to compromise the systems. We draw your attention to the latest one. It is known under the name of Oracle Java JRE. This problem is called as Java zero-day vulnerability. By means of this vulnerability the system can be remotely infected with the threats of any kinds and natures. All malicious processes are carried out without being noticed by the PC owner. We have seen this unpatched exploit being used in limited targeted attacks. Most of the recent Java run-time environments i.e., JRE 1.7x are vulnerable. The test machine was successfully exploited against latest version of FireFox with JRE version 1.7 update 6 installed. Initial exploit is hosted on a domain named ok.XXX4.net. Currently this domain is resolving to an IP address in China. A successful exploit attempt can result in a dropper (Dropper.MsPMs) getting installed on infected systems. The dropper executable is located on the same server. http://ok.XXX4.net/meeting/hi.exe Dropper.MsPMs further talks to its own CnC domain hello.icon.pk which is currently resolving to an IP address 223.25.233.244 located in Singapore.
To sum up the afore-said no one is safe surfing on the Web. If you an active Internet user we recommend you regularly scanning your system for different insecure items presence. GridinSoft Trojan Killer, a power-full anti-virus solution, will help you in it. Make sure to update virus data base before launching it. If any questions arise, contact us, we gladly answer them.

(Visited 224 times, 1 visits today)

Related posts:

Leave a Comment

*