Adobe Flash 0day: North Korea behind the exploit being released

Last week, CERT of South Korea recognized a exploit in Adobe Flash 28.0.0.137 (and all previous versions of course) which could allow remote code execution in , macOS, Linux and Chrome OS.Adobe Flash

Adobe soon after announced in a security bulletin that it would patch the vulnerability in a release scheduled for release this week. ...on time, only how the exploit is released...

The Cisco's Talos division stated that the payload contained in an Excel was ROKRAT and refers to Group 123.

"Το Group 123 έχει ενώσει μερικά hacking ελίτ σε αυτό το τελευταίο ωφέλιμο φορτίο του ROKRAT.
Έχουν χρησιμοποιήσει ένα Zero Day του Adobe Flash που ήταν εκτός των προηγούμενων δυνατοτήτων τους - χρησιμοποίησαν exploits σε προηγούμενες καμπάνιες αλλά ποτέ δεν είχαν ένα καθαρά νέο exploit όπως έχουν κάνει τώρα ", αναφέρουν οι ερευνητές του Talos Warren Mercer και Paul Rascagneres.

"Αν και στο Talos δεν έχουμε καμία for victims, we suspect that the victim was a very specific and high-value target. Using a brand new exploit that didn't exist shows that they were very determined to succeed ."

FireEye, on the other hand, said the malware file should come from North Korea, known as TEMP.Reaper.

While Adobe suggests that administrators could use Protected View for Office to protect them, FireEye stressed that it is very likely that we will see more attacks until the vulnerability is repaired.

Last July, Adobe announced it would stop supporting Flash on 2020, with Microsoft claiming to completely remove Flash support from Windows in the same year.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).