toolbar used to distribute malware

Posted 21 March 2017 18:14 CEST by Jan Willem Aldershoff

The toolbar that is bundled with Java has been used to distribute malware in December last year. The toolbar itself is often referred to as potentially unwanted software and it’s update functionality had been exploited by cybercriminals to infect users with malware.

Also in November last year a similar incident took place and also this time malicious updates were distributed.

Normally, the toolbar only accepts updates that are signed with a certificate of the developers. Both in November and December, criminals compromised the update process and had their own malicious update signed with the certificate.

The malicious update contained a so-called dropper/uploader which in its turn downloaded malware. The criminals used different types of malware, likely to see what worked the best. Because the toolbar runs with full privileges, the malware has full rights on the computer.

On infected systems the attackers mapped the local network and gained access to the login and passwords of users. It also installed a hard-to-find/obfuscated remote access tool, so the system would still be accessible by the criminals, even after the actual malware was cleaned.

Users are adviced to remove the toolbar, this can be done in the Windows Control Panel under ‘Uninstall a program’. settings

Several settings at can be changed, they are stored in cookies, which means they will be reset if you clear cookies


Change the background to a plain color or trianglified image (similar to the default image)

No tracking features

At Myce most social media feature are done server side and impose no privacy risk to the visitor when not used. Several features use Javascript with you can turn off here


Switch to the List layout for an index with chronologycally listed news items or Grid layout for a block based layout. To see the change you need to reload the page