A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux, and Mac computers, according to security researchers from antivirus vendors F-Secure and Kaspersky Lab.
The attack was detected on a compromised website in Colombia, F-Secure senior analyst Karmina Aquino, said in a blog post on Monday. When users visit the site, they are prompted to run a Java applet that hasn't been signed by a trusted certificate authority.
[ Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter, both from InfoWorld. ]
If allowed to run, the applet checks which operating system is running on the user's computer -- Windows, Mac OS X, or Linux -- and drops a malicious binary file for the corresponding platform.
The files are detected by F-Secure as "Backdoor:OSX/GetShell.A," "Backdoor:Linux/GetShell.A" and "Backdoor:W32/GetShell.A." Their purpose is to connect to a command-and-control server and look for additional malicious code to download and execute.
However, since F-Secure researchers began monitoring the attack, the remote control server hasn't pushed any additional code, Aquino said.
It appears that the attack uses the Social Engineer Toolkit, a publicly available tool designed for penetration testers, Aquino said Tuesday via email. However, the chances of this being a penetration test sanctioned by the website's owner are relatively low.
"I don't think it's a penetration test," Costin Raiu, director of the global research and analysis team at antivirus vendor Kaspersky Lab, said Tuesday via email.
Kaspersky's researchers are monitoring two separate websites that contain this malware, Raiu said. One is the Colombian website also found by F-Secure, while the second belongs to a water park in Barcelona, Spain.
The presence of the malware on a second website in Spain indicates that this attack is not specific to Colombia or a particular entity, Raiu said.
Kaspersky's researchers are in the process of analyzing the backdoor-type malware downloaded by the malicious shell code on Windows and Linux.
"The Win32 backdoor is large, about 600KB; the Linux backdoor is over 1MB in size," Raiu said. "Both appear to contact very complex code which communicates encrypted with other servers."
This is not the first time that security researchers have discovered a multi-platform attack. In 2010, a similar Java-applet-based social engineering attack capable of executing malicious code on Windows, Mac OS X and Linux computers, was used to distribute the Boonana Trojan program.
"Such multiplatform attacks indicate the fact that Linux and Mac OS X are becoming interesting targets for cybercriminals," Raiu said.
Other malware authors might move to this type of attacks in the future because it allow them to target more users and distribute their creations more widely, Aquino said.