A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on
Windows, Linux and Mac computers, according to security researchers from antivirus vendors F-Secure and Kaspersky
The attack was detected on a compromised website in Colombia, F-Secure senior analyst Karmina Aquino, said in a
blog post on Monday. When users visit the site,
they are prompted to run a Java applet that hasn’t been signed by a trusted certificate authority.
If allowed to run, the applet checks which operating system is running on the user’s computer — Windows, Mac OS
X or Linux — and drops a malicious binary file for the corresponding platform.
The files are detected by F-Secure as “Backdoor:OSX/GetShell.A,” “Backdoor:Linux/GetShell.A” and
“Backdoor:W32/GetShell.A.” Their purpose is to connect to a command-and-control server and look for additional
malicious code to download and execute.
However, since F-Secure researchers began monitoring the attack, the remote control server hasn’t pushed any
additional code, Aquino said.
It appears that the attack uses the Social Engineer Toolkit (SET), a publicly available tool designed for
penetration testers, Aquino said Tuesday via email. However, the chances of this being a penetration test
sanctioned by the website’s owner are relatively low.
“I don’t think it’s a penetration test,” Costin Raiu, director of the global research and analysis team at
antivirus vendor Kaspersky Lab, said Tuesday via email.
Kaspersky’s researchers are monitoring two separate websites that contain this malware, Raiu said. One is the
Colombian website also found by F-Secure, while the second belongs to a water park in Barcelona, Spain.
The presence of the malware on a second website in Spain indicates that this attack is not specific to Colombia
or a particular entity, Raiu said.
Kaspersky’s researchers are in the process of analyzing the backdoor-type malware downloaded by the malicious
shell code on Windows and Linux.
“The Win32 backdoor is large, about 600KB; the Linux backdoor is over 1MB in size,” Raiu said. “Both appear to
contact very complex code which communicates encrypted with other servers.”
This is not the first time that security researchers have discovered a multi-platform attack. In 2010, a similar
Java-applet-based social engineering attack capable of executing malicious code on Windows, Mac OS X and Linux
computers, was used to distribute the Boonana Trojan
“Such multiplatform attacks indicate the fact that Linux and Mac OS X are becoming interesting targets for
cybercriminals,” Raiu said.
Other malware authors might move to this type of attacks in the future because it allow them to target more
users and distribute their creations more widely, Aquino said.