Monday, 16 May 2016

On 01:54 by admin   No comments
FireEye has detailed an attack on a recent zero-day vulnerability Adobe patched last week.

The flaw (CVE-2916-4117) affects the previous latest version of Adobe Flash and copped a rushed patch after FireEye reported attacks in the wild.

Genwei Jiang, a Singaporean senior security engineer, has revealed the details of the previously undisclosed phishing attacks he reported and says it is being actively deployed.

Affected users need to run Windows, Flash, and Microsoft Office, and fall for some form of phishing link or file.
"Attackers had embedded the Flash exploit inside a Microsoft Office document, which they then hosted on their web server, and used a Dynamic DNS domain to reference the document and payload," Jiangsays.
"With this configuration, the attackers could disseminate their exploit via URL or email attachment.

"Although this vulnerability resides within Adobe Flash Player, threat actors designed this particular attack for a target running Windows and Microsoft Office.

The attack is typical of many campaigns and runs shellcode to create a command and control link, run the malware, and throw a decoy document to leave victims hopefully unaware.
The vulnerability is still very valuable given that the patch was released only four days ago.
Jiang says users wedded to Flash must patch their systems and should consider Microsoft's lauded enhanced mitigation toolkit defensive toolkit.


Post a comment