North Korean Hackers Exploit a Flash Player Zero Day (Patch Unavailable)

  • Twitter
  • Facebook
  • Google+
  • Pinterest

It’s 2018 and Flash Player vulnerabilities are still being exploited inside the wild. South Korean authorities have released a stern warning against a fresh Flash zero day spotted inside wild. Security researchers suggest that the North Korean hackers lead to exploiting this Flash Player zero day targeting South Korean those who look at researching North Korea.

The South Korean Computer Emergency Response Team (KR-CERT) in their warning asserted that an “attacker very likely be able?to convince a?user to spread out a Microsoft Office document, website page, or spam mail containing a Flash file.” The term or Excel document embeds?a Flash SWF file. From that warning, it would appear that the bug hasn’t been addressed by Adobe established, which suggests systems elsewhere may also be vulnerable.

RelatedEnd of Flash Is Close: Chrome Reports Usage Went from 80% in 2014 just to 8% in 2018?

KR-CERT declared that?Flash Player ActiveX and earlier are at risk from this new zero day bug. It must be noted that is a current sort of software program.

New Flash Player Zero Day Spotted within the Wild

South Korean security researcher,?Simon Choi, declared that North Korean threat actors have already been exploiting this Flash Player zero day since mid November, 2017. The attacks primarily target?South Korean researchers?devoted to North Korea.

Flash 0day vulnerability that expressed by North Korea used from mid-November 2017. They attacked South Koreans who mainly do research on North Korea. (no patch yet)

— Simon Choi (@issuemakerslab) February 1, 2018

RelatedAdobe Patches Flash Player 0-Day Allegedly Exploited from the Wild by North Korean Hackers

Since it’s a zero day bug, details remain scarce as Adobe rushes to produce an easy option, likely in front of the scheduled Patch Tuesday releases. Meantime,?KR-CERT has shared this particular temporary recommendations (translated via Google Translate):

  • Until?Adobe releases a security patch for that vulnerability, Flash Player ‘removal
    • Control Panel – uninstall or change a program] to eliminate Adobe Flash Player.
  • the security updates that were released during re-known
    users as a way to lower the damage because of o vulnerability to follow this particular:
    – do not trust it Scion visits
    – source would not open an unfamiliar email attachment viewing prohibited and links
    – useful to keep the latest updates of antivirus programs, and let real-time monitoring
  • using Firefox (FireFox) is recommended

While an exceedingly poor translation, the information are what security experts usually have shared: remove Flash Player if they are not needed, never open suspicious email attachments or download sets from unknown sources / sites.

We will update this space as being a fix is delivered by Adobe or maybe more specifics about this bug are shared.

[Update]: Adobe responds

Adobe has published an advisory, tracking the zero day bug with?CVE-2018-4878. Rated critical, the vulnerability can enable attackers to look at full control of the affected system. “Adobe understands a written report that an exploit for CVE-2018-4878 exists during the wild, and is being employed in limited, targeted attacks against Windows users,” this company said. “These attacks leverage Office documents with embedded malicious Flash content distributed via email.”

The patch is planned to the week of February 5. “You start with Flash Player 27, administrators be capable of change Flash Player’s behavior when running on the internet Explorer on Windows 7 and below by prompting the consumer before playing SWF content,” the business spokesperson said. “For additional information, see this administration guide. Administrators also can consider implementing Protected View for Office. Protected View opens data marked as potentially unsafe in Read-only mode.”

–?Earlier:?Be ready to mention Farewell to Flash as Adobe Has Finally Thought i would Pull the Plug

Leave a Reply

Your email address will not be published.
Required fields are marked *