Dimitri Bestuzhev, a security researcher at Kaspersky Lab, found traces of a malware that significantly ups the ante in how attacks can be distributed.

In the past, malware coders had to first decide what flavor of OS they will target in their criminal efforts. But the new Java malware is based on a Java archive (JAR), which can be run on OS X, Linux and Windows. Worse, it may even be able to run on mobile devices under special circumstances.

Softpedia summed it up this way: “By packing malware as a JAR file, crooks are practically making sure their content will be executed on all targets regardless of operating system, something that’s not possible today.”

The Attack Method

Bestuzhev claimed the malware originated in Brazil. The Banloader, as it is called, is usually introduced by a phishing method the researcher said Brazilians are experts at. Victims have been found in Brazil, Spain, Portugal, the U.S., Argentina and Mexico.

The Banloader is activated by the victim clicking on a poisoned link. The specifics of what happens next will depend on which criminal gang is using it, but the phish may either cause the downloading of the JAR file or the file may be embedded, which removes the need to download it. The JAR files can be encrypted to hide their true nature.

The dropper can also use proxy auto-config (PAC) files that contain JavaScript functions. PACs can redirect users to specific URLs, including fake or modified bank sites. These loaders are truly cross-platform and can be executed on any machine that has a Java Runtime Environment installed.

The Current State of Java Malware

While the initial components of the overall Trojan are written in JAR, the actual Java malware remains Windows-centric for the moment.

“The final components [dropped malware] are still designed to run in Windows, or they use a Windows system in the case of PAC abusing,” Bestuzhev said. “However, it’s clear the first step to cross-platforming has just been made. So it’s a matter of time till we will find Brazilian bankers running on all platforms.”

Bestuzhev also noted “the general detection rate for ALL AV vendors is extremely low.”

The game has changed: The first step for a cross-platform Trojan has been written and deployed. This dropped malware payload needs only to be rewritten to take advantage of each major system.

The problem is not going to go away. Security defenders will have to adjust defenses for the new threat.

More from

What to know about new generative AI tools for criminals

3 min read - Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions.The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands of tools based on these LLMs have emerged.Unfortunately, malicious hackers moved quickly to exploit these new AI resources, using ChatGPT itself to polish and produce phishing…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Data never dies: The immortal battle of data privacy

4 min read - More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly every single individual is anywhere and everywhere. When someone dies, that data becomes the responsibility of the estate; but what happens to the privacy rights…

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution? Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task. In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each…