A sophisticated group of hackers known for targeting military, government and media organizations is currently using an exploit for a vulnerability in Java that hasn’t been patched by Oracle.
The zero-day exploit was recently observed by researchers from antivirus vendor Trend Micro in attacks against the armed forces of an unnamed NATO country and a U.S. defense organization. Those targets received spear-phishing emails that contained links to Web pages hosting the exploit.
The cyberespionage group, known as APT28 and Pawn Storm, has been active since at least 2007. Some security vendors believe that it operates out of Russia and has ties to that country’s intelligence services.
The group has been targeting NATO members and governments in Europe, Asia and the Middle East, as well as defense contractors and media organizations. It typically sends rogue emails to its victims with malicious links to supposed articles about geopolitical events.
The newly found exploit affects the latest version of the Java runtime environment, Java 8 Update 45, which was released in April, researchers from Trend Micro said in a blog post.
Surprisingly, the exploit doesn’t affect the older Java 7 and Java 6 versions, which no longer receive public security patches from Oracle.
A couple of years ago Java was the most frequently attacked browser plug-in, which prompted Oracle to beef up security in Java 8.
This is the first Java zero-day exploit reported in nearly two years, the Trend Micro researchers said.
Zero-day exploits are those that target previously unknown vulnerabilities for which patches are not yet available.
Although unrelated, this exploit’s discovery comes at a time when security researchers found three zero-day exploits for Flash Player in data leaked from a surveillance software maker called Hacking Team.
Disabling both Flash Player and Java is advisable until these vulnerabilities are patched, the Trend Micro researchers said in a separate blog post. “Extra caution should be exercised for the foreseeable future and special attention paid for the possibility of compromised ad servers.”
“Flash and Java vulnerabilities are particularly well-suited for malvertising attacks, so we could possibly see these vulnerabilities incorporated into exploit kits that, in turn, are used to attack ad servers,” the researchers said.
In fact, two of the newly found Flash Player exploits have already been integrated into exploit kits that are used in malvertising attacks.