A cyber attack on the German Bundestag
lower house of parliament reported last month is still stealing data and could
force officials to spend millions of euros replacing the entire computer
system, German media reported on Wednesday
If you've been meaning to disable Adobe Flash, now might be a good time. Attacks exploiting a critical vulnerability in the latest version of the animation software have been added to a popular exploitation kit, researchers confirmed. Attackers often buy the kits to spare the hassle of writing their own weaponized exploits.
Prolific exploit sleuth Kafeine uncovered the addition to Angler, an exploit kit available in underground forums. The zero-day vulnerability was confirmed by Malwarebytes. Malwarebytes researcher Jérôme Segura said one attack he observed used the new exploit to install a distribution botnet known as Bedep.
Adobe officials say only that they're investigating the reports. Until there's a patch, it makes sense to minimize use of Flash when possible. AV software from Malwarebytes and others can also block Angler attacks.
PROMOTED COMMENTS
You would think that the bugs follow patterns, and they could proactively remove them with code reviews. Or it is just that bad.
It's just that getting security absolutely right is almost impossibly hard - security issues in these sorts of products are very often not simple bugs. The core issue is that adobe has a couple incredibly popular web facing components which also happen to be very complex products and thus are fantastic targets.