Menu
Second Flash Player zero-day exploit found in Hacking Team's data

Second Flash Player zero-day exploit found in Hacking Team's data

Adobe plans to patch the vulnerability next week, but attackers might move quicker

Victim of identity theft

Victim of identity theft

The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's Flash Player.

This is the second Flash Player zero-day exploit discovered among the files and the third overall -- researchers also found a zero-day exploit for a vulnerability in Windows.

A zero-day exploit is a previously unknown vulnerability for which a patch does not exist.

The first Flash Player exploit was identified Tuesday, less than two days after a hacker dumped on the Internet over 400GB worth of files, email communications, business documents, source code and other internal data from the Milan-based company that sells computer surveillance and intrusion tools to government agencies around the world.

The exploit was quickly adopted by cybercriminals and was integrated into commercial exploit kits before Adobe released a patch for it. Exploit kits are malicious tools used in large-scale attacks launched through compromised websites or malicious advertisements.

Adobe patched the vulnerability targeted by the exploit on Wednesday, but attackers are still using it. A well known cyberespionage group known as Wekby actually sent emails to companies advising them about the Adobe patch, but linking to the exploit instead, security vendor Volexity reported.

The new Flash Player exploit, which takes advantage of an yet-to-be-patched vulnerability, was identified among the Hacking Team files by researchers from security vendor FireEye. Adobe confirmed the vulnerability Friday and said that it plans to patch it next week. The flaw is being tracked as CVE-2015-5122 in the Common Vulnerabilities and Exposures database.

According to researchers from Trend Micro, the new exploit affects the latest versions of Flash Player on Windows, Mac and Linux and can be easily adapted to execute a malicious payload, like a malware program.

These exploits were likely provided by Hacking Team to its customers so they can deploy Remote Control System (RCS), the company's powerful spyware, on the computers of users targeted for surveillance. The exploits allow malware to be silently installed when users visit a website, an attack technique known as a drive-by download.

It's not clear if these two Flash Player exploits were developed by Hacking Team's employees or if they were acquired from third-parties. Leaked emails from Hacking Team reveal that the company was buying exploits through brokers and from individual researchers, but that it also had an internal research team for developing such attack tools.

The revelations are likely to fuel the debate about the zero-day exploit market and whether it's ethical for government agencies to contribute to Internet insecurity by creating the incentive for private companies and security researchers to stockpile critical flaws for profit instead of reporting them to affected vendors.

In May, the U.S. Commerce Department proposed changes to an international arms control pact called the Wassenaar Arrangement that would enforce export controls for software exploits and other computer intrusion software. The proposed changes are open to a two-month comment period.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags online safetytrend microsecurityAdobe SystemsFireEyeVolexityExploits / vulnerabilitiesmalwareHacking Teamintrusion

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments