Oracle contributes to the problem by not working more closely with the security industry on Java defenses, one security expert said A zero-day Java exploit found for sale in the criminal underground has renewed calls to disable the cross-platform runtime environment in Web browsers.The latest exploit of a vulnerability not yet publicly known was reported on Tuesday by Brian Krebs, author of the KrebsonSecurity blog. An established member of the Underweb forum, an invitation-only site, was selling the exploit for Java JRE 7 Update 9, the latest version of the platform. The expected price was in the “five digits.”The flaw was in the Java class “MidiDevice.Info,” a component that handles audio input and output, Krebs said. The seller claimed “code execution was very reliable” on Firefox, Microsoft Internet Explorer and Windows 7.The latest exploit discovery comes three months after two other zero-day vulnerabilities and exploit code were found, one by a security researcher at Accuvant and the other by a developer at Immunity. The flaws were in Java 7 and affected Windows, Mac OS X and Linux operating systems running a browser with a Java plug-in. The latest exploit was unusual because they are seldom sold in such an open manner, said Chester Wisniewski, a senior security adviser for Sophos. “Granted it is on a members only criminal forum, but it sounds like the post was rather straight forward.”Java is used in 3 billion devices worldwide, says its steward, Oracle. The platform’s ubiquity makes it a favorite hacker target, along with the fact that the platform often goes unpatched in people’s computers. Security company Rapid7 estimates that 65% of the installations today are unpatched. “Many people don’t even know Java is installed on their computers and browsers, and that’s a huge problem,” said Andrew Storms, director of security operations at nCircle.Oracle contributes to the problem by not working more closely with the security industry in building better defenses in Java, Storms said. The company shares very little information with security experts between patches.[See also: Oracle knew about currently exploited Java vulnerabilities for months, researcher says]“We could all benefit by Oracle stepping up the game to engage the community at large,” Storms said.Experts recommend disabling Java in Web browsers, unless it is needed to access specific business applications. In the latter case, a separate browser should be dedicated for the sole purpose of accessing those applications.“IT departments should really consider if users need to access Java for business critical applications, otherwise, they should get rid of it,” said Rob Rachwald, director of security strategy at Imperva. Another option is to configure a client firewall to block a browser’s Java plug-in from accessing the Internet, unless the destination site is on a whitelist.[Join the discussion in Salted Hash: If we disable Java, what replaces it?] Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe