Saltar al contenido

Beware of fake Java updates

actualizacion falsa de java

The commotion that arose in recent days with Java and its vulnerabilities caused much confusion to such an extent that in blogs such as nakedsecurity by Sophos published an article entitled Java is not JavaScript – Tell your friendsThey are different things and users were not sure what to disable in their browsers.

JavaScript is code that runs on 99% of pages and is interpreted by default in all browsers. On the other hand Java is a plug-in that is downloaded from to run certain applications.

Faced with this, and as usually happens, cyber criminals did not miss the opportunity. The Trend Micro team detected a website that spread a false java update to infect, the page warns that a Java update and a malicious applet are required javaupdate11.jar trying to run:

If the user believes that it was something real, he ended up installing a Ransomware, that is, a type of malware that blocks the computer and requests money (a ransom) to free it.

As can be seen in the screenshot, the deception requires user interaction to accept the application execution javaupdate11. It is not automatic or very elaborate, in fact there are programs (constructors) that do this better with a few simple clicks, but due to the context I mentioned at the beginning, the idea of ​​simulating a Java update was good (although it is not the first time that they do).

How to update Java?

Surely you ever saw a warning like the following stating that a new version is available:

This warning is real, although Java does not update automatically, it only checks periodically for new updates to install. By default it does it every month, so better to change it so that it does it every day.

This can be configured from the Java Control Panel:

In XP: Start / Control Panel / Java In 7/8: Start / Find Java Control Panel

In addition, you can verify the version that is installed by entering, we can also update it from the control panel itself.

Java is dangerous?

The problem is that today it is the most used complement to infect users, during 2012 50% of infections with web exploits were carried out using Java. This happens because most users do not keep the plugin updated, in fact many do not even know they have it installed.

In addition, they have discovered many 0-day vulnerabilities, that is, even those who keep it updated are at risk, which is why all security specialists are recommending deactivating it from the browser or directly uninstalling it if it is never used.

If you are one of the users that does or does not need it, you can raise the security level (if you do not want to be deactivating / activating it every so often). But be aware of the executions you accept … if an application tries to execute unexpectedly or unnecessarily, better not accept it.

Warning when a Java application is to be run in the browser:

Each one will have their methods but what you have to understand is that disabling Java from the browser nowadays is safer on the internet.

See also: Firefox + NoScript, a safe way to surf the internet