March 10, 2016 By Larry Loeb 2 min read

Dimitri Bestuzhev, a security researcher at Kaspersky Lab, found traces of a malware that significantly ups the ante in how attacks can be distributed.

In the past, malware coders had to first decide what flavor of OS they will target in their criminal efforts. But the new Java malware is based on a Java archive (JAR), which can be run on OS X, Linux and Windows. Worse, it may even be able to run on mobile devices under special circumstances.

Softpedia summed it up this way: “By packing malware as a JAR file, crooks are practically making sure their content will be executed on all targets regardless of operating system, something that’s not possible today.”

The Attack Method

Bestuzhev claimed the malware originated in Brazil. The Banloader, as it is called, is usually introduced by a phishing method the researcher said Brazilians are experts at. Victims have been found in Brazil, Spain, Portugal, the U.S., Argentina and Mexico.

The Banloader is activated by the victim clicking on a poisoned link. The specifics of what happens next will depend on which criminal gang is using it, but the phish may either cause the downloading of the JAR file or the file may be embedded, which removes the need to download it. The JAR files can be encrypted to hide their true nature.

The dropper can also use proxy auto-config (PAC) files that contain JavaScript functions. PACs can redirect users to specific URLs, including fake or modified bank sites. These loaders are truly cross-platform and can be executed on any machine that has a Java Runtime Environment installed.

The Current State of Java Malware

While the initial components of the overall Trojan are written in JAR, the actual Java malware remains Windows-centric for the moment.

“The final components [dropped malware] are still designed to run in Windows, or they use a Windows system in the case of PAC abusing,” Bestuzhev said. “However, it’s clear the first step to cross-platforming has just been made. So it’s a matter of time till we will find Brazilian bankers running on all platforms.”

Bestuzhev also noted “the general detection rate for ALL AV vendors is extremely low.”

The game has changed: The first step for a cross-platform Trojan has been written and deployed. This dropped malware payload needs only to be rewritten to take advantage of each major system.

The problem is not going to go away. Security defenders will have to adjust defenses for the new threat.

More from

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today