Lily Jade

Lily Jade Description

Lily Jade is a worm infection that can exploit vulnerabilities that are not browser-specific, meaning that Lily Jade can infect a computer regardless of its web browser. Basically, Lily Jade is a Java-based worm that can appear in the form of extensions for the main web browsers (Google Chrome, Mozilla Firefox, and Internet Explorer). Lily Jade is designed to change a particular bit of code in the web browser that would substitute its own advertisements for advertisements normally displayed on websites like Facebook or Google. In this way, criminals can force the victim's web browser to display their own advertisements on all websites, without having to pay those website's owners for the service. Since Lily Jade is extremely small (just a couple of lines of codes), Lily Jade can get by many anti-virus programs with almost no problems. Lily Jade has also been associated with Facebook hijacking attacks, using the victim's Facebook account to send out messages or to post advertisement links on the victim's wall.

A Closer Look at the Lily Jade Worm


Worms that can carry out cross-browser attacks are rare at present, particularly due to the difficulty in creating and distributing them. Lily Jade is a sophisticated malware infection that is quite expensive to acquire in order to carry out attacks. Lily Jade uses a development framework known as Cross rider, which allows hackers to create malware that can affect multiple web browsers. It is important to note that Cross rider is not a malware threat, rather, it is a JavaScript framework that allows computer programmers to create web browser extensions. Malware infections like Lily Jade, created using a cross-browser engine, are quite unusual. Lily Jade targets popular websites like Facebook, YouTube, Bing, Google, Yahoo and MSN. On these websites, the victim's web browser connects to a different source in order to retrieve advertisements. This can generate quite a lot of revenue for the criminals behind the Lily Jade infection. Browser extensions that manipulate online advertisements are not uncommon, some common examples are advertisement blockers that entirely remove them. Lily Jade simply changes them.

Is the Lily Jade Worm Legal?


ESG security researchers have been surprised by the fact that the creator of Lily Jade, a hacker named Dru Mundorff, is claiming that Lily Jade is legal due to its End User License Agreement (EULA) in which the victim basically agrees to let criminals infect their computer system with Lily Jade. At present, Dru Mundorff is allowing hackers to purchase Lily Jade for a $1000 USD price, often out of reach for amateur hackers.

Infected with Lily Jade? Scan Your PC for Free

Download SpyHunter’s Spyware Scanner
to Detect Lily Jade

Security Doesn't Let You Download SpyHunter or Access the Internet?


Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Leave a Reply

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as-is:
What is 15 + 5 ?