Java-based malware Jacksbot Affect Multiple Platforms

\"\"

In the past month a new multiplatform malware package called Jacksbot has been discovered, and while it was initially deemed a minimal threat, it might not stay that way for some Mac, Windows, and Linux users.

Jacksbot is in part a Java-based remote access Trojan (RAT) that appears to be built by a hacking group for the purpose of causing all-too-common malicious activity, including stealing passwords, forcing URLs to load (likely for click fraud), deleting and corrupting files, taking screenshots, logging keystrokes, and otherwise getting personal information.

Java is an attractive platform for criminals to use because being cross-platform means a single coding effort by malware developers can result in a far more distributable attack package that will affect not only different operating systems (Windows, OS X, Linux, etc.) but will also work in multiple Web browsers on these platforms. Security company TrendMicro suggests that the use of Java by the Jacksbot developers means they are in it \”for the long haul,\” so the current findings may be just the tip of something bigger.

When the Trojan was discovered and outlined by Intego earlier in October, it was initially deemed a nonthreat because of its crude nature and seemingly incomplete programming. At the time, the Trojan only partially worked in OS X and Linux, and it seemed to be a component of a larger package such as a downloader or dropper. The Trojan also did not seem to trick users, and it would not run properly without root permissions, which made its coding appear suspicious without being truly \”Trojan\” in nature.

The Trojan was also not suspected to have infected any PCs; however, following those findings, Trend Micro has found two systems infected with the malware so far. While two systems out of millions of PC systems worldwide is a small number almost pointless to even mention, it does show that the malware is out in the wild, unlike previous suspicions. Whether it takes off and morphs into something more is yet to be seen.

For Mac and Linux systems, the malware is known to add a java execution command to the system\’s /etc/rc.local and /etc/rc.common files to have it run as an automatically scheduled process at boot. This makes it detectable by checking the contents of the various rc configuration files on the system for any instances of java execution commands. You can do this by opening the Terminal and running the following command:

cat /etc/rc.* | grep java

Since the word \”java\” should not be included in any of the \”rc\” configuration files by default, if this command outputs anything before it drops you back to the command line, take a closer look at what the executable is.

For Windows-based systems, you can check the registry for the presence of the following key:

HKEY_CURRENT_USERMicrosoftWindowsCurrentVersionRun Microsoft® Windows® Operating System = \”{Java Root Directory}binjavaw.exe -jar \”{Malware Path and File name}\”\”

Again, it must be stressed that so far, this malware has only been seen in two systems, and its coding suggests a focus on executing successfully in Windows rather than other operating systems (though this can easily change). Lastly, it is a Java executable, which requires Java to run; since Java is not an included component of OS X or other operating systems, users with fresh OS installations will not have the infrastructure available for it to run.

As a result, Jacksbot is not known to be much of a threat, but it is still early in its detection; there\’s always a chance that new variants may surface.

Scroll to Top
Scroll to Top