Last week, CERT of South Korea recognized a exploit in Adobe Flash 28.0.0.137 (and in all previous versions of course) that could allow remote code execution on Windows, macOS, Linux, and Chrome OS.
Adobe immediately announced in a bulletin security that it will patch the vulnerability in the release scheduled for release this week. ...on time, only that the exploit is released...
Cisco's Talos researchers have stated that the payload that existed in an Excel was ROKRAT and refers to Group 123.
"Group 123 has joined some hacking elites in this latest ROKRAT payload.
They have used a Zero Day of Adobe Flash that was except των προηγούμενων δυνατοτήτων τους – χρησιμοποίησαν exploits in previous campaigns but never had a purely new exploit like they have now,” Talos researchers Warren Mercer and Paul Rascagneres report.
“Although we have no information on casualties on Talos, we suspect that the victim was a very specific and high value target. Using a brand new exploit that didn't exist shows that they were very determined to succeed attack. "
FireEye, on the other hand, said the malware file should come from North Korea, known as TEMP.Reaper.
While Adobe suggests that administrators could use Protected projection for Office για να προστατευτούν, ενώ η FireEye τόνισε ότι είναι πολύ πιθανό να δούμε περισσότερες attacks until the vulnerability is patched.
Last July, Adobe announced that it would stop supporting Flash in 2020, with Microsoft to claim that it will completely remove Flash support from Windows the same year.
- Binary Option Trading: Scam or minimize risks?
- Intel: Finally in BIOS from 2020. An improved UEFI comes in