Adobe patches zero-day Flash Player flaw used in targeted attacks

Adobe logo
Image: Adobe

Vulnerability exploited by China-based cyberespionage group for weeks, says FireEye

Print

PrintPrint
Pro

Read More:

24 June 2015 | 0

Adobe Systems has released an emergency security update for Flash Player to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.

Over the past several weeks, a hacker group identified as APT3 by security firm FireEye has used the vulnerability to attack organisations from the aerospace, defence, construction, engineering, technology, telecommunications and transportation industries.

The hacking group targeted the companies with generic phishing emails that contained a link to a compromised server, researchers from FireEye said in a blog post. The server used JavaScript code to profile potential victims and then served the Flash exploit to the ones meeting attackers’ criteria, the company said.

The attackers use the exploit to install a backdoor known as SHOTPUT or CookieCutter and then move through the organisation’s network, using other techniques and exploits to compromise additional systems.

In order to be protected against this vulnerability, which is tracked as CVE-2015-3113, Adobe advises users to update to the newly released Flash Player versions: 18.0.0.194 for Windows and Mac, 11.2.202.468 for Linux, and 13.0.0.296 for the extended support release.

The Flash Player plug-in that is installed by default with Google Chrome and Internet Explorer on Windows 8.x will be automatically updated. Flash Player users on Windows or Mac who have selected “allow Adobe to install updates” will also get the update automatically.

APT3 is a sophisticated group known for using other zero-day browser-based exploits in the past for Internet Explorer, Firefox and Flash Player, according to FireEye. The group also uses custom backdoors and often changes command-and-control infrastructure, making it hard for researchers to track its activity.

 

 

Lucian Constantin, IDG News Service

Read More:



Leave a Reply

Back to Top ↑