The attackers have decided to take advantage of the most recent and controversial political topic - the PRISM data harvesting program - to deliver emails that supposedly contain documents on the subject:
The PDFs are innocuous, but the .jar file is not. It is a Java RAT called jRat, and it gives the attackers full and complete access to and control over the victim's computer.
In theory, it doesn't matter which OS the computer runs - all it takes is a Java installation and it will get compromised.
"The RAT can target not only Windows, but also Linux, Mac OS X, FreeBSD, OpenBSD, and Solaris (although we have not verified or observed the threat working on all of these operating systems)," the researchers pointed out, adding that "the threat has a builder tool that allows you to build your own customized versions of the RAT."
By comparing the C&C server used in this current campaign to the list of those used in previous ones, they also concluded that the same attackers have previously opted for more complex attacks.
"The attack has been simplified as it does not involve the use of an exploit, nor an executable shellcode/payload, but simply relies on a Java applet," they revealed.
"Nonetheless, it is no less dangerous than the older attacks and it can spread more easily since exploits are usually limited to work on specific versions of the vulnerable software and operating system, while this RAT can spread on any system where Java runtime is installed. In fact, not only has the attack been simplified, but it has also become more stable and more virulent, it is a big upgrade!"
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.