Jump to content

Recommended Posts

Posted

be9034269b9cd538898b0058560ffdab.jpg

 

Less than a week after Adobe rolled out a patch for a zero-day vulnerability in Flash Player that was exploited in the wild by a cyber-espionage group, malware researchers found it was leveraged by cybercriminals for purely financial purposes, infecting computers with CryptoWall ransomware.

 

The latest version of Flash Player, 18.0.0.194, which is available since June 23, is the result of an emergency update that fixes a heap buffer overflow (CVE-2015-3113).

 

Security researchers at FireEye reported the glitch to the developer and found that Chinese threat actor APT3 was already taking advantage of it to spy on organizations in multiple sectors: aerospace and defense, construction and engineering, high tech, telecommunications and transportation.

 

Interestingly, only four days after the public patch, independent security researcher Kafeine spotted the exploit in a cybercriminal browser-based attack tool called Magnitude exploit kit.

 

In a blog post on Sunday, Kafeine explained that Magnitude’s final payload was the infamous CryptoWall ransomware, and that malicious SWF and FLV files were used in the process.

 

In a separate analysis, Jerome Segura of Malwarebytes confirmed the use of a “booby trapped SWF, followed by a malicious FLV (Flash Video) file.”

 

Audio codec problem at the root of two vulnerabilities

 

It is unclear how the cybercriminals managed to develop an exploit for CVE-2015-3113 this fast, but such quick undertaking was recorded in the past with other Flash vulnerabilities.

 

In this case, it appears that the ground for creating the malicious code was already laid by another security flaw, CVE-2015-3043, repaired by Adobe in April, which was also being leveraged in the wild at the time the patch was released.

 

Referring to the same root cause for the two flaws, Segura says that Flash Player is “a hacker’s favorite due to its huge user base and reusable security flaws.

Indeed, attackers have the advantage as they can refactor an exploit to bypass a previous patch that didn’t completely address an insecure or complex coding implementation.”

 

 

Source:

http://news.softpedia.com/news/recently-fixed-flash-player-zero-day-used-to-deliver-ransomware-485522.shtml

76c90dd0e79a714317a8daeecc1584d2.png

Posted
This is why I stopped using flash player a couple years ago. It has proved to be the single most vulnerable piece of software ever made.

 

What do you use instead of flash player?

 

How do I get rid of flash player?

  • FPCH Admin
Posted
What do you use instead of flash player?

 

How do I get rid of flash player?

Most video sites use a HTML 5 player to render videos. I used ad/remove programs and uninstalled it. So far I haven't had any problems with any video site.

 

At YouTube you have to adjust your settings to use HTML 5 instead of flash although it will auto-detect that you don't have flash installed.

Posted

Having flash installed isn't really a problem in itself, it is only if you get caught on a hacked video website or click to play a malware loaded video is when you get the problems.

As Bob said though, Youtube stopped using the Flash player and went over to the HTML5 player which works well in Firefox and most other up to date browsers including IE11.

It won't be long before other video hosting sites move to HTML5 so Flash player will basically become redundant any way.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...