Home » Blog » Cybersecurity » How To Disable Java (Java Exploit Fix For JRE 1.6 – JRE 1.7)
Fix Java Exploit

How To Disable Java (Java Exploit Fix For JRE 1.6 – JRE 1.7)

New vulnerabilities in Oracle’s Java Runtime Environment (JRE) have been discovered that target the newest version of JRE (1.7) and allow cyber criminals to exploit computer systems and internet browsers via Runtime products such as Oracle’s Java plugin (Java Deployment Toolkit, etc.) for popular internet browsers.

Fix Java Exploit

The Java vulnerability allows hackers to exploit Internet Explorer, Firefox, Opera, Google Chrome and also Safari on multiple platforms including Windows, Linux and MacOS.

Java Exploit Dangers

A Java exploit can introduce a computer system to malware, viruses, and Trojans giving attackers complete access to the infected computer system. If the Java exploit is not fixed, your computer may lose functionality  and you are at a very high risk of becoming a victim to cyber crime involving credit theft, exploitation schemes, identity theft, and more.

Java Exploit Kits

Java ExploitCyber criminals utilize a variety of exploits to affect Java users, the most popular being the Blackhole exploit kit. The Blackhole exploit kit is currently the most prevalent web threat to date, whose purpose is to deliver a malicious payload to a victim’s computer.

Another exploit kit is the Nuclear Pack exploit kit and both mentioned packs use the same principle and serve two latest Java vulnerabilities (CVE-2012-1723 and CVE-2012-4681) together inside one single jar file. This allows attackers to attack all environments (up to JRE 1.6  and JRE 1.7) with just one applet tag included inside the landing page of the  proposed exploit kit.

Java Exploitation Process

  1. Cyber criminals license the Blackhole exploit kit from it’s authors and specifies various options to customize the kit, including a landing page on the internet.
  2. A victim loads a compromised web page or opens a malicious spam link.
  3. The compromised web page or malicious link sends the user to the Blackhole exploit kit server’s landing page.
  4. This landing page contains obfuscated Java that loads all exploits to the computer and possibly a Java applet tag that loads a Java Trojan horse.
  5. The exploit loads and executes a payload on the victim’s computer and informs the Blackhole exploit kit server as to which exploit was use to load the payload.

How To Fix The Java Exploit – Protection Against Attack

There are several options to assess Java vulnerabilities and remove payloads of malware that have infected your computer system, but disabling Java is the most recommended solution to bypass any sort of Java attack.

Update Java – JDK 8 (with JavaFX) Early Access for ARM

Oracle has apparently repaired the issue with an early release of JDK 8, including JavaFX. Click a link below to update Java or visit http://www.oracle.com/technetwork/java/javase/downloads/index.html for more download information.

Java SE Downloads
Java Platform (JDK) 7u10
JavaFX Downloads

JavaFX 2.2.4
NetBeans IDE Downloads
JDK 7u10 + NetBeans

Please note, Java is needed for some websites and clients to operate properly.

How To Disable Java – Disable/Remove/Uninstall Java Plugin Instructions

The instructions below detail how to disable or remove the Java plugin from Windows, Mac OS, and popular internet browsers.

Windows:

Navigate to Start > Control Panel, click the Uninstall a program or Add and remove programs. Find Java on the list of programs. If you have version 6 or 7, uninstall it.

Uninstall Virus

Mac OS X 10.7 and 10.8:

Navigate to Macintosh HD > Library > Java > JavaVirtualMachines > and remove the 1.7.0.jdk file. Older versions of OS X run Java 6.

Mozilla Firefox:

From the main menu select Tools > Add-ons. In the Add-on management window, choose Plugins. Find any plugins on the list that say Java and click the Disable button. Restart Firefox (Java Runtime, Java Deployment Toolkit).

Disable Java

Google Chrome:

Click the customize icon (3 bar or wrench) and navigate to Tools > Extensions. Search for any plugins on the list that say Java and click the Disable button.

Disable Java Plugin (Chrome)

Open Preferences and type Java in the search box (or type chrome://plugins/ into the browser address bar). Scroll down to the Plug-ins section, and click the Disable individual plug-ins link. If you have Java installed, you should see a “disable” link underneath the Java Plugin listing.

Internet Explorer:

Disabling Java in IE is complicated. To learn how to disable the Java web plug-in in Internet Explorer please visit: http://support.microsoft.com/kb/2751647

Change Java Registry In Windows (IE)

1. Open Windows Start Menu and type regedit in the search box, press Enter.

2. Change the HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Plug-in\\UseJava2IExplorer registry value to 0, where is any version of Java on your system. For example,
if you are running a 32-bit version of Java on a 64-bit platform, you should set the HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Plug-in\\UseJava2IExplorer registry value to 0.

3. Run javacpl.exe as administrator, click the “Advanced” tab, select “Microsoft Internet Explorer” in the “Default Java for browsers” section, and press the space bar to uncheck it. This properly sets the above registry value, despite the option being grayed out.

Safari:

Click Preferences > Security tab > uncheck the Enable Java option.

Opera:

Type opera:plugins into the browser’s address bar. Find any plugins on the list that say Java and click the Disable button.

Real-Time Protection

The malware that is being spread by the exploit is currently detected by Malwarebytes Anti-Malware, if you have the Pro version, you will be actively protected from the threats by either having the IP of the malicious exploit site blocked or the malware itself will be unable to run.

Detect And Remove Malware, Viruses, And Trojans

If you suspect your computer has been infected with malware, viruses, and/or Trojan horses due to a Java exploit, or Java attack it is recommended to use a reputable Antivirus or Anti-Malware software.

Antivirus Software (WIN) Purchase Free Downloads
Malwarebytes Buy Malwarebytes Anti-Malware Download
AVG Antivirus Buy AVG Antivirus Download
Symantec Norton Buy Norton Antivirus
McAfee Buy McAfee Antivirus View All Products
Kaspersky Buy Kaspersky Labs Antivirus Download
ESET Buy ESET Antivirus 30 Day Trial
Avast! Buy Avast! Antivirus Download

Digitally purchase or try free versions of top Antivirus and Anti-Malware software directly from the manufacturer’s secure server and website.
Software links provided will always lead to the lowest discounted prices on the internet.

Antivirus Software (MAC) Purchase Free Downloads
ESET Buy ESET Antivirus 30 Day Trial
McAfee Buy McAfee Antivirus View All Products
MacPaw Buy MacPaw Cleaner Mac
MacKeeper Buy MacKeeper: 911
Helpful Links

Jared Harrison

Jared Harrison is an accomplished tech author and entrepreneur, bringing forth over 20 years of extensive expertise in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. He has made significant contributions to the industry and has been featured in multiple esteemed publications. Jared is widely recognized for his keen intellect and innovative insights, earning him a reputation as a respected figure in the tech community.

More Reading

Post navigation

8 Comments

  • Pingback: Risky Java software: Oracle issues emergency fix to thwart hackers | Software Digest
  • Pingback: Risky Java software: Oracle issues emergency fix to thwart hackers | Exploit Archive
  • Pingback: Oracle issues emergency fix to thwart hackers | CNET News
  • Pingback: Risky Java software: Oracle issues emergency fix to thwart hackersSoftware Full Version | Software Full Version
  • Pingback: Risky Java software: Oracle issues emergency fix to thwart hackers | Software Digest

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

How to remove Zyklon virus (Removal Guide)

How to remove xPCAP (Virus Removal Guide)

What is .SOLO and how do I remove it and recover files?