Following recent security vulnerabilities in Java, malware developers are taking a new approach to exploit the Java platform by issuing false updates that pose as legitimate updates for the runtime. The latest version of the Java runtime that fixes recent vulnerabilities is update 11, and Kaspersky labs is reporting that a new malware is out that poses as Java Update 11. The malware is packaged in a Java archive file called javaupdate11.jar that contains two Windows-based executables called up1.exe and up2.exe. When installed the programs open a back door to a command and control server.
The malware apparently is not exploiting any vulnerabilities in Java, but is merely taking advantage of the current state of Java to trick users into running the fake installer. While this malware so far is for Windows only, such approaches can be used for other platforms as well, as has been seen in OS X with Flashback, which exploited people's trust in (or at least their recognition of) the Adobe Flash updater. This serves as a reminder that if you need to use Java, be sure to apply updates only from the Java download page or from the Java Control Panel that is installed along with Java.