Lucian Constantin
CSO Senior Writer

Cyber criminals adopt recently patched zero-day exploit in a flash

news
Jun 29, 20152 mins

It only took four days for a recently patched vulnerability in Flash Player to start being used in large-scale attacks

Just four days after Adobe Systems patched a vulnerability in Flash Player, the exploit was adopted by cybercriminals for use in large-scale attacks. This highlights the increasingly small time frame users have to deploy patches.

On Saturday, a malware researcher known online as Kafeine spotted a drive-by download attack done with the Magnitude exploit kit that was exploiting a Flash Player vulnerability patched Tuesday.

The flaw, tracked as CVE-2015-3113 in the Common Vulnerabilities and Exposures database, had zero-day status — that is, it was previously unpatched — when Adobe released a patch for it. It had already been exploited by a China-based cyber espionage group for several weeks in targeted attacks against organizations from the aerospace, defense, construction, engineering, technology, telecommunications, and transportation industries.

It is not unusual to see zero-day exploits for Flash Player and other popular applications being used in highly targeted cyber espionage attacks. That’s because the goal of the attackers behind them is to compromise organizations that sometimes have sophisticated defenses and to remain undetected for as long as possible.

On the other hand, while zero-day exploits have been used in more indiscriminate, large-scale attacks, such incidents are rare. That’s because zero-day vulnerabilities are extremely valuable and it doesn’t make financial sense for attackers to burn them in noisy campaigns where they’ll be very quickly discovered and patched.

Therefore, it’s much more common for the creators of commercial exploit kits like Magnitude to integrate exploits for already patched vulnerabilities. For them it’s a numbers game and there’s always a large number of users who fail to install updates in a timely manner if at all.

But it seems that while computer users have not significantly improved their patching times, the exploit kit creators are aggressively reducing the time they need to integrate exploits.

The new Magnitude attacks left users with only four days to install the Flash Player patch for CVE-2015-3113, a very small time frame especially for organizations that typically deploy updates according to predetermined schedules that are often more than one week apart.

Earlier this year the authors of another exploit kit, Nuclear EK, integrated a Flash Player exploit a week after Adobe patched it, signaling a trend toward increasingly smaller patch windows.

The new Magnitude attacks that exploit CVE-2015-3113, if successful, install the Cryptowall ransomware. However, the payload could be changed by the attackers to something else at any time.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author