Smile, you're on a botnet!

Posted by   Virus Bulletin on   May 9, 2011

Multi-platform Java botnet allows for remote control of webcam and microphone.

Researchers have discovered a multi-platform botnet running on the Java Runtime Environment (JRE) that can potentially run on both Windows machines and on Macs.

The botnet, of which only the Windows version has been seen in the wild, installs itself on a victim's computer via an executable and will only run if the JRE is installed. The executable then downloads a number of Java libraries that allow the botherder to remotely control the computer.

Among the features of the botnet advertised on its website - which was still live earlier today - were a keylogger, the ability to talk to the victim via a microphone and the option to control and record on the victim's webcam. The developers also offer an iPhone/iPad app, enabling botherders to control their botnet while away from home.

While some of the botnet's features may sound funny at first, it is not difficult to imagine the damage this could do to the victim's computer and to their general feeling of online security.

The fact that this botnet can potentially run on Macs too is part of a growing trend of malware targeting the Mac user and should be a warning for the users of non-Windows platforms: while they might be less likely to become the victim of malware, they are far from immune from it.

More on the botnet, which its developers have dubbed 'Incognito RAT', at McAfee's blog here.

Posted on 9 May 2011 by Virus Bulletin


botnet mac java JRE


Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.