Cybersecurity researchers at Trend Micro have found yet another vulnerability in Adobe Inc.’s Flash Player program that could allow hackers to install malware on a computer without the victim’s knowledge. At least one cybercriminal group is known to have already take advantage of the flaw, but it is unknown how many computers have been infected. Hackers first send out phishing emails with subject lines such as “Israel launches airstrikes on targets in Gaza” and “Syrian troops make gains as Putin defends air strikes”. When a recipient with Flash installed clicks on the enclosed link, malware is installed on the recipient’s computer.
A post on Adobe’s website read in part,
A critical vulnerability (CVE-2015-7645) has been identified in Adobe Flash Player 220.127.116.11 and earlier versions for Windows, Macintosh, and Linux. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.
Adobe also said that it hopes to make a patch available next week to fix the vulnerability. This is the third such vulnerability found in Flash this year. In June, Adobe released a patch to resolve a flaw just days before hackers began to exploit it, and in July, a breach of the firm Hacking Team’s data revealed another zero-day flaw that had already been widely exploited. Flash Player used to dominate the online video streaming market, but is now facing a steady stream of companies including YouTube and Amazon whose software no longer support Flash by default.
Here is a complete list of the subject lines for emails that Trend Micro found to contain the malicious link:
“Suicide car bomb targets NATO troop convoy Kabul”
“Syrian troops make gains as Putin defends air strikes”
“Israel launches airstrikes on targets in Gaza”
“Russia warns of response to reported US nuke buildup in Turkey, Europe”
“US military reports 75 US-trained rebels return Syria”
Read more here – “Flash Hit by Another Zero-day Vulnerability,” (Alex Hearn, The Guardian).