Mal/20113544-A

Mal/20113544-A Description

Type: Adware

There's an exploit of the Java Runtime Environment (JRE) that allows a criminal to install malware on the victim's computer system. It seems that the Mal/20113544-A exploit (also known as Exploit.Java.CVE-2011-3544.ad) has been used to install a Trojan downloader on computer systems as part of an attack that has taken place in March and April of 2012. Mal/20113544-A can be embedded into normally harmless websites by hackers or criminals. While security updates have been released that prevent Mal/20113544-A attacks, many computer users that have not updated are vulnerable, particularly Mac Users still using a version of Mac OS X prior to 10.6. The fact that Mal/20113544-A can be used to attack computer systems running Mac OS X or Linux operating systems make this threat particularly dangerous, since these operating systems are traditionally considered safer than Windows.

Maintaining Your Software Fully Updated to Prevent a Mal/20113544-A Attack

Computer users that have updated their operating systems and software in a timely manner will have been protected against Mal/20113544-A since early February of 2012. However, it seems that most Mac users did not receive this critical security update until April, which makes this platform much more vulnerable to the Mal/20113544-A attack. Fortunately, even if your computer system is not updated, you can prevent Mal/20113544-A attacks by simply keeping JavaScript disabled. In fact, ESG security researchers strongly advise not using JavaScript unless necessary, and even then selectively for particular websites.

An Overview of the Mal/20113544-A Attack

While Mal/20113544-A can be used to install nearly any Trojan on the victim's computer system, ESG security analysts have linked this exploit to a Trojan downloader attack known as Mal/JavaCmC-A. This Trojan establishes a backdoor into the victim's computer system and then attempts to download other malware, using this backdoor to establish a connection to a remote server. By way of this second Trojan infection, a Trojan will be installed corresponding to the victim's operating system. This attack is highly dangerous and constitutes a severe threat to a computer user's privacy and a computer system's integrity. As a result of this infection, criminals can gain access to an infected computer system and even control it from another place. If you suspect that you have been exposed to the Mal/20113544-A exploit, ESG malware analysts strongly advise using a reliable, fully-updated anti-malware program to scan your computer system thoroughly.

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.