Menu
Disable now: Adobe Flash is under fire and there's no security fix

Disable now: Adobe Flash is under fire and there's no security fix

The latest version of Flash for Windows and Mac — the one that is under attack — is version 16.0.0.257

An exploit kit known as Angler is targeting a previously unseen flaw in the latest version of Flash Player, which Adobe only updated a week ago.

It may be time for Windows users to disable the Flash Player browser plugin, according to researcher “kafeine”, who reported today that the Angler exploit kit is targeting a newly discovered flaw in the media player.

Since Adobe doesn’t have a fix for the flaw, the malware researcher suggests “disabling Flash Player for some days might be a good idea”.

The latest version of Flash for Windows and Mac — the one that is under attack — is version 16.0.0.257. The attack comes just one week after Adobe fixed nine flaws in Flash Player, including seven that were remotely exploitable.

Angler is one of handful of “exploit kits” that contain multiple remote attacks for flaws in widely used products like Flash, PDF readers like Adobe Reader and Java.

While exploits for flaws that have been patched by affected vendors are run-of-the-mill for these kits, it’s less common for them to contain attacks for previously unseen or ‘0-day’ flaws. Those flaws are typically discovered after a highly targeted attack.

On the “Malware don’t need Coffee” blog, @kafeine outlined the system configurations for Flash Player 16.0.0.257 that are so far confirmed to have been successfully exploited. These include Windows XP running Internet Explorer (IE) 6 through to 9, Windows 7 with IE8, and Windows 8 running IE10 with the Windows8-RT-KB3008925-x86 update.

System configurations confirmed to be safe from the attack include the most recently updated version of Windows 8.1 and Chrome.

The researcher was still running tests on other configurations when contacted by CSO Australia but was not able to provide further details.

Adobe has yet to offer official advice for users, however an Adobe spokesperson told CSO Australia that "we aware of the report and are investigating".

The most notorious exploit kit in recent years has been Blackhole however Cisco in its 2015 annual security report noted that Angler — which uses Flash, Java, IE and Silver light flaws - was “the one to watch” in 2015.

Kafeine noted that the free version of Malwarebytes Anti Exploit did manage to stop the exploit.

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Read more: Sandbox-busting Adobe Reader zero-day bundled in Blackhole


Upcoming IT Security Events

Feb 3rd, Feb 4th, Feb 6th 2015

Read more: Adobe warns of zero day Acrobat, Reader attacks

Join @NirZuk #PaloAltoNetworks for Breakfast (lunch in Auckland) on keeping your enterprise safe from risk. Cyber attacks continue to increase in volume and sophistication leaving traditional security practices completely ineffective. 

Register Today Seats are limited

March 3rd, March 5th, March 9th 2015

Join CSO for the day@#csoperspectives and hear from @kimzetter @frankheidt

Read more: Understanding the underground asset landscape with augmented reality

3 International Keynote speakers, 36 Key IT Security Industry Speaker, 21 Exhibitors, Security Analysts and many more.. Register today

Dont miss one of the biggest IT Security events in ANZ (registration is free, but seats are limited)


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags PDF readerskafeinejavadisable nowmalwareadobe readerEnex TestLabwindows xpAnglerflash playerWindows userssecurity fixesMalwarebytesadobe flashBlackholeCSO Australia@kafeine

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments