Adobe Systems Inc urged users to quickly patch their systems to prevent attacks as hackers are exploiting the vulnerabilities in its Flash multimedia software platform in web browsers.Kaspersky Lab Inc has found that a new Adobe flash vulnerability was ex
Adobe Systems Inc urged users to quickly patch their systems to prevent attacks as hackers are exploiting the vulnerabilities in its Flash multimedia software platform in web browsers.Kaspersky Lab Inc has found that a new Adobe flash vulnerability was exploited by a group called as BlackOasis on Oct 10. The group planted malicious software before connecting them back to servers in Switzerland, Bulgaria, and Netherlands. Kaspersky has reported the bug to Adobe who assigned the vulnerability as CVE-2017-11292. BlackOasis was also responsible for another zero-day exploit (CVE-2017-8759) which was discovered by FireEye in September 2017
Kaspersky said that the malware planted by BlackOasis is known as FinSpy or FinFisher which is a multi-tool spyware typically sold to governments and law enforcement agencies to conduct surveillance. Kaspersky also mentioned that BlackOasis is targeting Middle Eastern politicians and United Nations(UN) officials engaged in the region, opposition bloggers and activists, and regional news correspondents. So far the victims have been spotted in Russia, Iraq, Afghanistan, the UK, Iran, Africa and the Middle East.Adobe on Monday issued an emergency security patch for Flash, which fixes the bug that is being used now by hackers to infect Windows PCs with spyware.
You may be interested in reading:Adobe Security Team Accidentally Posted the Private PGP Key on their BlogEarlier in June Adobe said that by the end of 2020 it would put an end to its vulnerable and buggy Adobe Flash Player plugin but, until then, people are still vulnerable to attacks and malware like FinSpy.However, users also need to ensure that they keep their apps and operating systems up-to-date, always, if they don't want hackers to exploit them. Adobe recommends the users to run all software as a non-privileged user to diminish the effects of a successful attack.It also reminds users not to visit websites or follow links provided by unknown or untrusted sources.
You may be interested to read: Iran Blamed for Cyberattack on UK Parliament