{"id":27792,"date":"2013-08-02T01:38:59","date_gmt":"2013-08-02T08:38:59","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=27792"},"modified":"2025-06-02T03:06:34","modified_gmt":"2025-06-02T10:06:34","slug":"java-back-door-acts-as-bot","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/","title":{"rendered":"Java Back Door Acts as Bot"},"content":{"rendered":"<p>The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently, we received an interesting malware binary&#8211;a JAR package that opens a back door for an attacker to execute commands and acts as a bot after infection.<\/p>\n<p>This archive does not exploit any Java vulnerability. It was chosen as the infection vector because Java applications can run on multiple platforms with ease; thus this method widens the infection to a greater number of users. We have seen this type of attack in the past using executable files.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/infection_flow1\" rel=\"attachment wp-att-28109\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-28109\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\" alt=\"Infection_Flow1\" width=\"559\" height=\"450\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg 699w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/08\/Infection_Flow1-300x241.jpg 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/a><\/p>\n<p>The key to decrypt the config file was encrypted with <a href=\"http:\/\/en.wikipedia.org\/wiki\/Base64\">Base 64<\/a> [see Figure 2]. Decoding it, we end up with the hex bytes. Further converting the hex bytes to ASCII, we get the decryption key [see Figure 3] to decrypt the config.dat file.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/key-2\" rel=\"attachment wp-att-27889\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-27889\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Key.jpg\" alt=\"Key\" width=\"434\" height=\"110\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Key.jpg 543w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Key-300x76.jpg 300w\" sizes=\"auto, (max-width: 434px) 100vw, 434px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Figure 2:\u00a0Base 64-encoded key file.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/decryption_key\" rel=\"attachment wp-att-27887\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-27887 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Decryption_Key.jpg\" alt=\"Decryption_Key\" width=\"350\" height=\"55\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Decryption_Key.jpg 438w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Decryption_Key-300x47.jpg 300w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><\/p>\n<p align=\"center\">Figure 3: Decryption key to the &#8220;config.dat&#8221; file.<\/p>\n<p style=\"text-align: center;\"><em id=\"__mceDel\">\u00a0<\/em><\/p>\n<p style=\"text-align: left;\">With the decryption key, we saw that the config.dat file is encrypted using the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Triple_DES\">Triple-DES<\/a> algorithm. Executing the Triple-DES snippet gave us the plain config file, which holds the information about the backdoor connection. That data includes IP address, port number, operating system, mutex information, and password for the connection [see Figure 4].<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/plain_config\" rel=\"attachment wp-att-27890\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-27890\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Plain_Config.jpg\" alt=\"Plain_Config\" width=\"241\" height=\"245\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Plain_Config.jpg 301w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Plain_Config-295x300.jpg 295w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Plain_Config-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Plain_Config-64x64.jpg 64w\" sizes=\"auto, (max-width: 241px) 100vw, 241px\" \/><\/a><\/p>\n<p align=\"center\">Figure 4: Plain config file.<\/p>\n<p>On execution, the JAR file opens the backdoor connection to the IP address and the port mentioned in the plain config file. Once the backdoor connection is made, the compromised user environment will act as the server and the attacker will be the client. The attacker can now take control of the victim&#8217;s system and can execute any commands. We found that these types of malicious JAR files can be built from a remote administration tool that is readily available online. Using the tool, anyone can build the malicious JAR package.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/tool\" rel=\"attachment wp-att-27892\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-27892\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Tool.jpg\" alt=\"Tool\" width=\"445\" height=\"239\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Tool.jpg 635w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Tool-300x161.jpg 300w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\" \/><\/a><\/p>\n<p align=\"center\">Figure 5: Server build dashboard.<\/p>\n<p>Figure 5 shows the dashboard to build the server binary, which is later sent to innocent users. The dashboard makes clear what a binary built using this tool can do. Here are some of the activities:<\/p>\n<ul>\n<li>Set the encryption key to encrypt key.dat, which is used to encrypt the plain config file<\/li>\n<li>Set the IP address and port number through which the back door will be opened<\/li>\n<li>Start the server component on every reboot so that the file will run every time<\/li>\n<li>The malicious file can be bundled with a legitimate file and can be dropped and executed in the background, without the user consent<\/li>\n<li>Select the operating system to target<\/li>\n<li>Copy itself to all available drives on the system<\/li>\n<\/ul>\n<h2>Malicious Actions to Watch Out For<\/h2>\n<p>Once the system is compromised, it will act as a bot through which the attacker can execute commands to control the system. The actions and others can be performed by the attacker:<\/p>\n<ul>\n<li>Record the user screen<\/li>\n<li>Record keystrokes<\/li>\n<li>Access the file system<\/li>\n<li>Access the command prompt<\/li>\n<li>Download and execute binary files<\/li>\n<li>Trigger DDoS using HTTP POST and GET requests<\/li>\n<li>Shut down\/restart\/lock\/log out of the system<\/li>\n<\/ul>\n<p>Our research found that this JAR package was sent as an attachment in a spam email.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/java-back-door-acts-as-bot\/attachment\/spam_email\" rel=\"attachment wp-att-27891\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-27891\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Spam_Email.jpg\" alt=\"Spam_Email\" width=\"414\" height=\"256\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Spam_Email.jpg 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Spam_Email-300x185.jpg 300w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><\/a><\/p>\n<p align=\"center\">Figure 6: Malware sent as attachment in a spam email.<\/p>\n<p>We detect all malicious JAR packages related to this threat as JV\/BackDoor-FAZY. It is always good practice to scan any email attachment with an up-to-date antimalware product.<\/p>\n<p>&nbsp;<\/p>\n<p>Here is a simple demonstration of how this malware binary can be used by an attacker to execute commands on an infected system:<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.youtube.com\/watch?v=qFG6PA7NMYg\" rel=\"attachment wp-att-27902\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-27902\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Youtube.jpg\" alt=\"Youtube\" width=\"683\" height=\"382\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Youtube.jpg 854w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/07\/Youtube-300x167.jpg 300w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">I would like to thank my friend and colleague Rajesh Natraj Kumar Pillai for his input and assistance with this analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[180],"coauthors":[1477],"class_list":["post-27792","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Java Back Door Acts as Bot | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Java Back Door Acts as Bot | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-02T08:38:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T10:06:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"699\" \/>\n\t<meta property=\"og:image:height\" content=\"562\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Java Back Door Acts as Bot\",\"datePublished\":\"2013-08-02T08:38:59+00:00\",\"dateModified\":\"2025-06-02T10:06:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\"},\"wordCount\":604,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\",\"name\":\"Java Back Door Acts as Bot | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\",\"datePublished\":\"2013-08-02T08:38:59+00:00\",\"dateModified\":\"2025-06-02T10:06:34+00:00\",\"description\":\"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Java Back Door Acts as Bot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Java Back Door Acts as Bot | McAfee Blog","description":"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Java Back Door Acts as Bot | McAfee Blog","og_description":"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-08-02T08:38:59+00:00","article_modified_time":"2025-06-02T10:06:34+00:00","og_image":[{"width":699,"height":562,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Java Back Door Acts as Bot","datePublished":"2013-08-02T08:38:59+00:00","dateModified":"2025-06-02T10:06:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/"},"wordCount":604,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg","keywords":["malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/","name":"Java Back Door Acts as Bot | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg","datePublished":"2013-08-02T08:38:59+00:00","dateModified":"2025-06-02T10:06:34+00:00","description":"The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/08\/Infection_Flow1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-back-door-acts-as-bot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Java Back Door Acts as Bot"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=27792"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27792\/revisions"}],"predecessor-version":[{"id":214834,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27792\/revisions\/214834"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=27792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=27792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=27792"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=27792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}