

Flash zero-day exploit spotted – patch now!
source link: https://www.tuicool.com/articles/hit/VNBjiaa
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

If you’re among the holdouts still running Flash, you have some more updating homework to do. Adobe has issued an out-of-band patch after researchers spotted a Flash zero-day flaw being exploited in the wild.
The discovery was made by Qihoo 360 which on 29 November noticed a targeted APT (Advanced Persistent Threat) attack against a healthcare clinic used by Russian Government officials.
Codenamed “Operation Poison Needles” by Qihoo in honour of its medical theme, the attack uses a Word document mocked up to look like a job application questionnaire embedding a Flash Active X control.
Anyone on the receiving end of the attack will receive a phishing email with an attached RAR archive containing the boobytrapped document executing the payload.
The fix
The vulnerability, a use after free flaw, is now identified as CVE-2018-15982 and affects all Flash versions up to and including 31.0.0.153. Patching it on Windows, macOS and Linux, and ChromeOS requires downloading 32.0.0.101.
For good measure, the patch applies a separate fix for CVE-2018-15983, a privilege escalation caused by the insecure library loading of DLLs.
It’s worth noting that Qihoo appears to have spotted it by way of their anti-malware clients, hence the confident designation as an APT connected to the conflict between Ukraine and Russia.
Hacking Team?
ATR speculates that the attack’s “tradecraft and techniques” might connect the latest campaign in some way to the Italian freelancers, Hacking Team, which infamously had a lot of its tools stolen in a 2015 attack.
It’s true that the use of zero-day Flash exploits embedded inside Word documents looks like a calling card (seeprevious incidents), but this could also simply mean that attackers who got hold of the cache of Hacking Team goodies have saved them up for special occasions.
Naked Security has covered a regular drip (or even a flood) of vulnerabilities and live attacks exploiting Flash in recent times. Vulnerabilities that will almost certainly continue their march until the software is gone once and for all. As Gigamon writes:
Although the death of Flash has been widely reported thanks to industry efforts to deprecate and remove Flash from web browsers, vectors such as Microsoft Office remain able to load and execute Flash content.
Our recommendation: remove it from your operating system before deactivating it in browsers that still give you the choice to allow it (Chrome and Edge).
Presumably (and hopefully), organisations and individuals continuing to use something scheduled to expire forever in 2020 do so for a good reason. But whatever that reason may be, as with previous patches and out-of-band updates, the latest Flash zero-day is a reminder to all to move on and stop living so dangerously.
Recommend
-
13
On November 6th, 2019, Detectify added security tests for 50+ of the ...
-
11
Original text Background In December 2020, DBAPPSecurity Threat Intellige...
-
6
<?xml encoding="utf-8" ??>Urgent: Upgrade your Minecraft Servers Minecraft servers before version 1.18.1 are vulnerable to a Remote Code Execution attack. You must upgrade immediately. ...
-
11
The decentralized finance industry has seen tremendous growth in recent years. Unfortunately, that increase in success has also given rise to more exploits and hacks, primarily through flash loans. Beanstalk Farms is the latest DeFi project t...
-
13
Zoom updates macOS app to patch root access exploit ...
-
5
Zero-day — Update Chrome now to patch actively exploited zero-day It's the fifth Chrome zero-day patched by Google this year.
-
6
iOS 16.1 and iPadOS 16 contain fixes for a zero-day exploit already seen in the wild The hole could allow hackers to execute code with the highest privileges By
-
3
Security experts urge Chrome users to patch new zero-day exploit immediately The finding marks the popular browser's 8th zero-day exploit of 2022 By
-
8
Mario Kart 8 and Splatoon on the Wii U go offline due to vulnerability / Nintendo has taken the network features of Wii U heavy hitters Mario Kart 8 and Splatoon offline due to ‘urgent maintenance.’
-
13
Zero-click iOS exploit has been infecting iPhones with 'Triangulation' spyware since 2019 Russian intelligence claims Apple and NSA are working together to spy on thousands of diplomat...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK