June 25, 2015 By Shane Schick 2 min read

Adobe has issued an emergency patch in response to a vulnerability in its popular Flash browser plugin that it said was being used in phishing attacks and other attempts to take over victims’ computers.

The company issued a brief advisory in response to a tip from security firm FireEye, which had noticed the Flash vulnerability being exploited by cybercriminals in phishing schemes in a number of industry sectors. According to ZDNet, companies in tech and telecom, aerospace and construction were targeted. Adobe said people using Firefox and Windows XP, as well as users running Windows 7 and its Internet Explorer browser, are among those at risk of the bug, known as CVE-2015-3113.

Besides phishing schemes, Computerworld said the Adobe Flash vulnerability lets attackers install Shotput or CookieCutter, Internet backdoor programs that can open up corporate networks to prying eyes. Like other sophisticated attack vectors, though, cybercriminals appear to be making regular changes to the infrastructure that runs CVE-2015-3113’s command-and-control (C&C) capability. In other words, if you don’t patch quickly, it could be increasingly difficult to keep track of this exploit as it spreads.

As eWEEK pointed out, this is not the first time Adobe has had to address zero-day threats for Flash. There were multiple reports in February about Flash malware samples growing by more than 300 percent, making it a particularly high-risk piece of technology. The fact that Flash is so pervasive across desktops for a variety of video and multimedia applications probably accounts for it becoming a hot target for cybercriminals.

Experts told IT PRO that the volume of security issues facing Adobe Flash might lead some users to decide to do away with the plugin completely, while others suggested the most recent exploit just proves how vulnerable Internet content is in general.

Forbes suggested the Adobe Flash vulnerability exploits may be traced to a criminal collective known as APT3, which has also leveraged flaws in Internet Explorer. Until more details are confirmed, however, it’s best that anyone using Flash start monitoring for threats as often as they update the software itself.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today