Windows 10: Exploit:Java/ShellCode detection cannot be corrected by MS tools

Discus and support Exploit:Java/ShellCode detection cannot be corrected by MS tools in AntiVirus, Firewalls and System Security to solve the problem; Nothing from Microsoft on Windows 10 Pro 64bit can relieve this detected by Windows Security Offline or Online Full scans nor can Microsoft Safety... Discussion in 'AntiVirus, Firewalls and System Security' started by M Leary, Oct 5, 2021.

  1. M Leary Win User

    Exploit:Java/ShellCode detection cannot be corrected by MS tools


    Nothing from Microsoft on Windows 10 Pro 64bit can relieve this detected by Windows Security Offline or Online Full scans nor can Microsoft Safety Scanner.Detected by a Full online scan.After an offline scan it shows it being detected again at different date/time than it had before the INCREDIBLY long full scan.Anybody have a solution?Have tried 3 other paid subscription scan programs with no detectionMalwareBytesSpyBot S&DWebroot

    :)
     
    M Leary, Oct 5, 2021
    #1
  2. CarolLJ Win User

    Exploit malware stopping me from using Edge

    Well, those removal steps I posted suggests you do have some Java version installed.

    "JS/Exploit-Blacole (Exploit:JS/Blacole) is malicious Java code that exploits a vulnerability in the Java Runtime Environment component of Oracle Java SE and Java for Business that allows the execution of arbitrary code."
     
    CarolLJ, Oct 5, 2021
    #2
  3. 95Viper Win User
    New Java Exploit!

    Java update to fix two security exploits.

    Java SE Downloads

    Oracle Security Alert for CVE-2013-1493
     
    95Viper, Oct 5, 2021
    #3
  4. silkstone Win User

    Exploit:Java/ShellCode detection cannot be corrected by MS tools

    New Java Exploit!

    I read this on Ars the other day and i thought i would re-post the information here as it seems like a pretty big exploit:

    "A previously unknown and currently unpatched security hole in the latest version of the Java software framework is under attack online, according to security researchers and bloggers.

    Attack code that exploits vulnerability in Java's browser plugin has been added to the Blackhole, Cool, Nuclear Pack, and Redkit exploit kits, according to the Malware Don't Need Coffee blog, prompting its author to say that the bug is being "massively exploited in the wild." Miscreants use these products to turn compromised websites into platforms for silently installing keyloggers and other types of malicious software on the computers of unsuspecting visitors. KrebsOnSecurity reporter Brian Krebs said the curators of both Blackhole and Nuclear Pack have taken to the underweb to boast of the addition to their wares. It's not yet clear how many websites have been outfitted with the exploits.

    According to researchers at Alienvault Labs, the exploits work against fully patched installations of Java. Attack files are highly obfuscated and are most likely succeeding by bypassing security checks built in to the program. KrebsOnSecurity said the malware authors say the exploits work against all versions of Java 7.

    Update: Analysis from antivirus provider Kaspersky Lab indicates the exploits are already deployed on a variety of websites.

    "There appears to be multiple ad networks redirecting to Blackhole sites, amplifying the mass exploitation problem," Kaspersky Lab expert Kurt Baumgartner wrote. "We have seen ads from legitimate sites, especially in the UK, Brazil, and Russia, redirecting to domains hosting the current Blackhole implementation delivering the Java 0day. These sites include weather sites, news sites, and of course, adult sites."

    People who don't use Java much should once again consider unplugging Java from their browser, while those who don't use it at all may want to uninstall it altogether. The release notes for Java 7 Update 10—the most recent version—say users can disable the program from the browser by accessing the Java Control Panel. KrebsOnSecurity has instructions here for other ways to do this."

    - Dan Goodin - Jan 10 2013
    Source: http://arstechnica.com/security/201...bug-is-being-massively-exploited-in-the-wild/
     
    silkstone, Oct 5, 2021
    #4
Thema:

Exploit:Java/ShellCode detection cannot be corrected by MS tools

Loading...
  1. Exploit:Java/ShellCode detection cannot be corrected by MS tools - Similar Threads - Exploit Java ShellCode

  2. Windows Defender Detect exploit win32/shellcode.MR

    in Windows 10 Gaming
    Windows Defender Detect exploit win32/shellcode.MR: We are using windows 10 & system detected single file ,url.txt as an exploit win32/shellcode.MR. Windows defender detect this file .how can we resolve this issue....
  3. Windows Defender Detect exploit win32/shellcode.MR

    in Windows 10 Software and Apps
    Windows Defender Detect exploit win32/shellcode.MR: We are using windows 10 & system detected single file ,url.txt as an exploit win32/shellcode.MR. Windows defender detect this file .how can we resolve this issue....
  4. Exploit Protection causes the java program jar to suspend

    in Windows 10 Gaming
    Exploit Protection causes the java program jar to suspend: hello expert Our program is a java program that encapsulates appium1.8. In the past six months, the program has always been suspended after a few seconds of startup. You need to turn off Exploit Protection in the Windows Security Center, and then wait for another half an hour...
  5. Exploit Protection causes the java program jar to suspend

    in Windows 10 Software and Apps
    Exploit Protection causes the java program jar to suspend: hello expert Our program is a java program that encapsulates appium1.8. In the past six months, the program has always been suspended after a few seconds of startup. You need to turn off Exploit Protection in the Windows Security Center, and then wait for another half an hour...
  6. Exploit Protection causes the java program jar to suspend

    in AntiVirus, Firewalls and System Security
    Exploit Protection causes the java program jar to suspend: hello expert Our program is a java program that encapsulates appium1.8. In the past six months, the program has always been suspended after a few seconds of startup. You need to turn off Exploit Protection in the Windows Security Center, and then wait for another half an hour...
  7. Exploit settings for MS Edge

    in AntiVirus, Firewalls and System Security
    Exploit settings for MS Edge: Over rides for new Microsoft Edge https://answers.microsoft.com/en-us/windows/forum/all/exploit-settings-for-ms-edge/fdc93de3-254c-4b82-8c12-613ed18ec34d
  8. New free tool detects Hacking Team exploits

    in AntiVirus, Firewalls and System Security
    New free tool detects Hacking Team exploits: A security company has released a free tool to users who suspect they may be a victim of Hacking Team's exploit cache. In the meantime, users are left to wonder if they have been infected with Hacking Team malware, of which some tools are so virulent they stay on a...
  9. Java zero-day security flaw exploited in the wild

    in AntiVirus, Firewalls and System Security
    Java zero-day security flaw exploited in the wild: Oracle is working with Trend Micro to patch the problem. Until a fix is issued, users concerned about falling victim to the exploit should temporarily disable Java in their browser. The Java zero-day is reportedly being exploited through drive-by downloads on the latest...
  10. Exploit for CVE-2017-8759 detected and neutralized

    in Windows 10 News
    Exploit for CVE-2017-8759 detected and neutralized: The September 12, 2017 security updates from Microsoft include the patch for a previously unknown vulnerability exploited through Microsoft Word as an entry vector. Customers using Microsoft advanced threat solutions were already protected against this threat. The...