Lucian Constantin
CSO Senior Writer

Attackers are exploiting a zero-day vulnerability in Flash Player

news
Jan 21, 20152 mins

The exploit was included in the Angler exploit kit, a security researcher reported

Attackers are using compromised websites to exploit a new and currently unpatched vulnerability in Flash Player, a malware researcher has reported.

The new exploit was observed in drive-by-download attacks launched with an exploit kit called Angler, according to an independent researcher who uses the online alias Kafeine.

Exploit kits are malicious Web applications that contain exploits for vulnerabilities in browsers and browser plug-ins such as Java, Flash Player, Adobe Reader, and Silverlight. Attackers silently redirect users’ browsers to exploit kit installations by inserting rogue code in compromised websites and malicious advertisements.

The kits choose which exploits to load from their arsenal depending on the visitor’s browser and installed plug-ins. If successful, the exploits install malware. It’s known as a drive-by-download attack and is typically transparent to users.

Exploit kits usually target known vulnerabilities, which is why it’s important to keep browser plug-ins like Flash Player up to date. But that doesn’t help if attackers have an exploit for a zero-day vulnerability — one that’s not been patched yet by the software vendor.

Zero-day exploits are valuable to hackers, which is why they’re more commonly used in targeted attacks where the stakes are higher and the goal is usually cyber espionage. It’s unusual to see them in mass attacks like those performed with Angler and other exploit kits.

The new zero-day exploit used in Angler worked successfully on the latest Flash Player version on Windows 7 with Internet Explorer 8, Windows 8 with Internet Explorer 10, and Windows XP with IE 6 to 9, Kafeine said in a blog post. Disabling Flash Player for some days might be a good idea, he said.

Adobe is aware of the report and investigating the claims, a spokeswoman said via email.

However, Kafeine claims he shared the exploit with the company, and Adobe has confirmed it.

“The zero-day vulnerability in Flash Player, as discovered by Kafeine, could provide a big security risk for Internet users, effectively opening an unguarded window onto PCs worldwide,” said Pedro Bustamante, director of special projects at security firm Malwarebytes, via email.

“The fact that it has seemingly been integrated into the Angler Exploit Kit shows that criminals are keen to use it to target people and businesses en-masse,” he said. “Using a delivery mechanism such as Angler increases the chance of successful infections, allowing for accurate attacks through infected adverts on high-traffic websites.”

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author