In the course of researching and preparing volume 9 of the Security Intelligence Report, Microsoft analysts discovered an interesting trend. According to Microsoft's findings, attacks against Java have recently surged to unprecedented levels--dwarfing attacks against Adobe PDFs.
Microsoft is accustomed to being a prime target for malware attacks, and Adobe has been hogging center stage for a while as well. But, a post on the Microsoft Malware Protection Center (MMPC) blog notes, "by the beginning of this year, the number of Java exploits (and by that I mean attacks on vulnerable Java code, not attacks using JavaScript) had well surpassed the total number of Adobe-related exploits we monitored":
http://blogs.technet.com/b/mmpc/archive/2010/10/18/have-you-checked-the-java.aspxJava runs in the background under the radar and vulnerabilities may be left unpatched and exposed. Attacks on Java make sense for precisely the same reason that attacks on Adobe make sense. A malware developer that has to choose which operating system platform to attack will choose Microsoft because it offers significantly more potential targets. But, as Microsoft has developed more secure applications, and improved security controls, attackers have discovered that third-party cross-platform technologies are often a weak spot in the security armor.
Microsoft's Holly Stewart explains in the MMPC blog, "Java is ubiquitous, and, as was once true with browsers and document readers like Adobe Acrobat, people don't think to update it. On top of that, Java is a technology that runs in the background to make more visible components work. How do you know if you have Java installed or if it's running?"
Stewart also raises the question of why this surge in Java attacks seems to have flown under the radar. She dubs the phenomenon "Java-blindness". Essentially, Stewart theorizes that the IPS (Intrusion Prevention System) products that we expect to detect and identify new threats are blind to Java because the performance impact of interpreting Java in real-time is too great.
While the number of attacks against Java spiked, the attacks focused primarily on three Java vulnerabilities. More importantly, all three Java flaws already had patches available. Java just kind of runs silently doing its thing, though, so--while users and IT admins focus on Microsoft's monthly Patch Tuesday updates, or Adobe's quarterly security patches--Java is sort of "out of sight, out of mind" and vulnerabilities may go unpatched.
In the grand scheme of things, the attacks on Java are a drop in the bucket. The surge in Java attacks may be significant and unprecedented, but Java is still a relative blip on the radar. That said, Microsoft's findings highlight an alarming trend, and should provide incentive for users and IT admins to be more diligent about identifying and patching vulnerabilities in third-party apps that could expose systems to attack.
(PCW)