Adobe Flash 0day: North Korea behind the exploit being released

Last week, CERT of South Korea recognized a exploit in Adobe Flash (and in all previous versions of course) that could allow remote code execution on Windows, macOS, Linux, and Chrome OS.Adobe Flash

Adobe immediately announced in a security bulletin that it would fix the vulnerability in the version scheduled for release this week. … On time, only how exploit is released…

Cisco's Talos researchers have stated that the payload that existed in an Excel was ROKRAT and refers to Group 123.

"Group 123 has joined some hacking elites in this latest ROKRAT payload.
"They used an Adobe Flash Zero Day that was beyond their previous capabilities - they used exploits in previous campaigns but never had a completely new exploit like they do now," say Talos researchers Warren Mercer and Paul Rascagneres.

"Although in Talos we have no information about victims, we suspect that the victim was a very specific and high-value target. The use of a brand new exploit, which did not exist, shows that they were very determined to succeed in the attack. "

FireEye, on the other hand, said the malware file should come from North Korea, known as TEMP.Reaper.

While Adobe suggests that administrators could use Protected View for Office to protect them, FireEye stressed that it is very likely that we will see more attacks until the vulnerability is repaired.

Last July, Adobe announced it would stop supporting Flash on 2020, with Microsoft claiming to completely remove Flash support from Windows in the same year.

Registration in via Email

Enter your email to subscribe to the email notification service for new posts.

Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news