JS_FIEROPS.A
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 90 % (High) |
Infected Computers: | 1 |
First Seen: | August 29, 2012 |
Last Seen: | June 16, 2020 |
OS(es) Affected: | Windows |
JS_FIEROPS.A is part of a multi-component malware attack that takes advantage of a recently discovered zero day vulnerability in Java 7 (the Java Runtime Environment 1.7). To exploit this vulnerability, criminals place a JAR file on an attack website and then create a situation where computer users can be directed to this website against their will. The goal of this multi-component malware attack is to infect the victim's computer with a backdoor Trojan, a dangerous malware infection that allows criminals to take over the infected computer, giving them the capability to steal data or install malware on the infected computer. ESG security researchers consider that JS_FIEROPS.A and its associated malware attack are extremely dangerous and can lead to the loss of private data and to the appearance of further malware infections on the victim's computer. Because of this, ESG malware analysts recommend disabling Java unless it is necessary and being careful when browsing unknown websites that may have been compromised as part of this attack.
The Zero Day Java Vulerability is Associated with the JS_FIEROPS.A Attack
The zero day vulnerability in Java affects all of the most used web browsers such as IE, Firefox, Chrome, Opera and Safari. This vulnerability is associated with a new component in Java 7 which can be used to execute malicious code on the infected computer. This attack is composed of various parts: JS_FIEROPS.A itself, which is a malicious script that has been inserted into an HTML web page, a malicious Java Applet detected as JAVA_GONDY.A, and FLASH_UPDATE.exe (the backdoor Trojan's executable file, which is detected by various security programs as BKDR_POISON.BLW. JS_FIEROPS.A itself is a malicious Java script that is heavily encrypted in order to prevent detection and analysis. This script is designed to force computer users to visit another website where a malicious Java applet forces the infected computer to download and install the backdoor component of this malware attack.
JS_FIEROPS.A and Its Associated Malware Threats Can Carry Out Cross-Platform Attacks
ESG security researchers warn computer users that the JS_FIEROPS.A malicious script can also infect computers using the Mac OS X. This is because JS_FIEROPS.A is contained in a third party platform (the Java Runtime Environment) that is used by both Windows and Apple computers. To prevent a JS_FIEROPS.A infection, ESG security researchers advise keeping Java turned off as a default and staying away from websites typically considered unsafe.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.