Mal/20113544-A DescriptionType: Adware
There's an exploit of the Java Runtime Environment (JRE) that allows a criminal to install malware on the victim's computer system. It seems that the Mal/20113544-A exploit (also known as Exploit.Java.CVE-2011-3544.ad) has been used to install a Trojan downloader on computer systems as part of an attack that has taken place in March and April of 2012. Mal/20113544-A can be embedded into normally harmless websites by hackers or criminals. While security updates have been released that prevent Mal/20113544-A attacks, many computer users that have not updated are vulnerable, particularly Mac Users still using a version of Mac OS X prior to 10.6. The fact that Mal/20113544-A can be used to attack computer systems running Mac OS X or Linux operating systems make this threat particularly dangerous, since these operating systems are traditionally considered safer than Windows.
Maintaining Your Software Fully Updated to Prevent a Mal/20113544-A Attack
An Overview of the Mal/20113544-A Attack
While Mal/20113544-A can be used to install nearly any Trojan on the victim's computer system, ESG security analysts have linked this exploit to a Trojan downloader attack known as Mal/JavaCmC-A. This Trojan establishes a backdoor into the victim's computer system and then attempts to download other malware, using this backdoor to establish a connection to a remote server. By way of this second Trojan infection, a Trojan will be installed corresponding to the victim's operating system. This attack is highly dangerous and constitutes a severe threat to a computer user's privacy and a computer system's integrity. As a result of this infection, criminals can gain access to an infected computer system and even control it from another place. If you suspect that you have been exposed to the Mal/20113544-A exploit, ESG malware analysts strongly advise using a reliable, fully-updated anti-malware program to scan your computer system thoroughly.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.