Threat Database Malware Mal/20113544-A

Mal/20113544-A

By GoldSparrow in Malware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 136
First Seen: April 30, 2012
Last Seen: April 30, 2023
OS(es) Affected: Windows

There's an exploit of the Java Runtime Environment (JRE) that allows a criminal to install malware on the victim's computer system. It seems that the Mal/20113544-A exploit (also known as Exploit.Java.CVE-2011-3544.ad) has been used to install a Trojan downloader on computer systems as part of an attack that has taken place in March and April of 2012. Mal/20113544-A can be embedded into normally harmless websites by hackers or criminals. While security updates have been released that prevent Mal/20113544-A attacks, many computer users that have not updated are vulnerable, particularly Mac Users still using a version of Mac OS X prior to 10.6. The fact that Mal/20113544-A can be used to attack computer systems running Mac OS X or Linux operating systems make this threat particularly dangerous, since these operating systems are traditionally considered safer than Windows.

Maintaining Your Software Fully Updated to Prevent a Mal/20113544-A Attack

Computer users that have updated their operating systems and software in a timely manner will have been protected against Mal/20113544-A since early February of 2012. However, it seems that most Mac users did not receive this critical security update until April, which makes this platform much more vulnerable to the Mal/20113544-A attack. Fortunately, even if your computer system is not updated, you can prevent Mal/20113544-A attacks by simply keeping JavaScript disabled. In fact, ESG security researchers strongly advise not using JavaScript unless necessary, and even then selectively for particular websites.

An Overview of the Mal/20113544-A Attack

While Mal/20113544-A can be used to install nearly any Trojan on the victim's computer system, ESG security analysts have linked this exploit to a Trojan downloader attack known as Mal/JavaCmC-A. This Trojan establishes a backdoor into the victim's computer system and then attempts to download other malware, using this backdoor to establish a connection to a remote server. By way of this second Trojan infection, a Trojan will be installed corresponding to the victim's operating system. This attack is highly dangerous and constitutes a severe threat to a computer user's privacy and a computer system's integrity. As a result of this infection, criminals can gain access to an infected computer system and even control it from another place. If you suspect that you have been exposed to the Mal/20113544-A exploit, ESG malware analysts strongly advise using a reliable, fully-updated anti-malware program to scan your computer system thoroughly.

URLs

Mal/20113544-A may call the following URLs:

unattractivefrigilityfrigility.com

Trending

Most Viewed

Loading...