Menu
Hacking Team's arsenal included at least three unpatched exploits for Flash Player

Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched

Security in cloud computing

Security in cloud computing

Recently breached surveillance software maker, Hacking Team, had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting Internet users at risk.

Milan-based Hacking Team develops and sells surveillance software to government agencies from around the world. On July 5, a hacker released over 400GB of data stolen from the company on the Internet, including email communications, business documents, source code and other internal files.

On Tuesday, researchers found a proof-of-concept exploit among Hacking Team's files that worked against the latest version of Flash Player. Cybercriminals were quick to adopt it and were already using it in large-scale attacks by the time Adobe Systems released a patch for it on Wednesday.

By late Friday, researchers from FireEye revealed that they found a second zero-day exploit for Flash Player in the Hacking Team data cache, prompting Adobe to issue an emergency advisory.

This was followed up Saturday by researchers from Trend Micro with yet another find, putting the number of Flash Player zero-day exploits used by Hacking Team to three -- at least so far.

Only one of the vulnerabilities targeted by those exploits has been patched so far, with Adobe planning to release fixes for the other two -- CVE-2015-5122 and CVE-2015-5123 -- later this week.

That's a problem because the cybercriminals behind the Angler Exploit Kit were already using the exploit discovered by FireEye (CVE-2015-5122) by Sunday. The malicious activity was spotted by a malware researcher known online as Kafeine who specializes in tracking drive-by download attacks.

It's very likely that attackers are also working on integrating the exploit found by Trend Micro (CVE-2015-5123) in commercial exploit kits, if they haven't already.

"Until an update is available, users should consider disabling Adobe Flash," researchers from Trend Micro said in a blog post. "Extra caution should be exercised for the foreseeable future and special attention paid for the possibility of compromised ad servers."

Web-based exploits are typically used to infect computers when users visit legitimate websites that were compromised or when their browsers load malicious advertisements.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securitymalwaretrend microintrusionFireEyeAdobe SystemsExploits / vulnerabilitiesHacking Team

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments