Here is some info. I can't really say what this all means. I have Norton Anti Virus, updated daily and am behind a NAT and HW firewall. As far as I know, I haven't been affected. Steel has been PM'd but I haven't heard anything more.
I don't have any expertise in this area...
++++++++++++++++++++++++++++++++++++++++++++++++++++
quote="Generalisimo:
According to Trend Micro Officescan, there are 4 files that are being installed all related to:
JAVA_BYTEVER.A
Malware type: Java Applet
Aliases: Downloader.Trojan, Exploit-ByteVerify, Java.Shinwow.AT, Troj/ByteVeri-F, TrojanDownloader:Java/OpenConnection.K, Win32/ByteVerify.26610!Exploit!Trojan
In the wild: No
Destructive: No
Language: English
Platform: Windows 95, 98, ME, NT, 2000, XP
Encrypted: No
This malware is a component of a malicious Java archive file (JAR) that resides in a malicious Web site. Machines infected with the malware JS_FORTNIGHT.B are redirected to this Web site.
This malware calls and executes another malware, JAVA_JJBLACK.C, which results in modifications to the browser and registry settings of the infected system.
This is Trend Micro's detection for JAVA classes that exploit a known vulnerability in Microsoft Virtual Machine in Windows Operating Systems and Internet Explorer. This flaw allows malicious users to execute codes of his or her choice when a user visits an infected Web site.
To know more of this vulnerability, how to determine a vulnerable system, and how to install security patches, continue reading on Microsoft’s Web site at this link: MS03-011 Security Bulletin
JAVA_BYTEVER.C
Malware type: Others
Aliases: Downloader.Trojan, JV/Shinwow, Java.Shinwow.W, TrojanDownloader:Java/OpenStream.C
In the wild: No
Language: English
Platform: Windows 95, 98, ME, NT, 2000, XP
Description:
This JAVA malware is found in malicious Web sites as part of a Web page applet. It comes in the form of a compiled Java class, and may be called from an HTML page.
It exploits the ByteVerifier vulnerability in unpatched versions of Microsoft (MS) Java Virtual Machine, which could allow a file to be downloaded and executed without a user’s knowledge.
It connects to the following Web site where it downloads a file and saves it as LOADNEW.EXE:
http://ifra<BLOCKED>lars.biz/dl/loadadv479.exe
It then executes the file, which is detected by Trend Micro as TROJ_SMALL.OI.
For solutions visit the following:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=JAVA_BYTEVER.A&VSect=Sn
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=JAVA_BYTEVER.C&VSect=Sn