Adobe Flash Player users urged to disable software after it lets criminals infect computers

The software is being killed off in 2020, but for many that date can't come soon enough

Aatif Sulleyman
Tuesday 17 October 2017 10:56
Comments
An Adobe logo and Adobe products are seen reflected on a monitor display and an iPad screen, in this picture illustration July 8, 2013
An Adobe logo and Adobe products are seen reflected on a monitor display and an iPad screen, in this picture illustration July 8, 2013

A “critical” security issue in Adobe Flash Player is putting computer users at risk.

The vulnerability is being exploited by a group called BlackOasis, which is using Microsoft Office “lure documents” to attack people all over the world, including in the UK.

Adobe has acknowledged the issue and released a security update for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS.

The problem, which was discovered by Kaspersky Labs’ Anton Ivanov, has once again put Flash in the spotlight.

The software is being killed off in 2020, but for many that date can’t come soon enough.

It has become less and less useful over the years, but is constantly being exploited by cyber criminals, who keep finding security holes that they can use to attack users.

This latest unwelcome incident has renewed calls for people to completely disable it.

“After installation, the malware establishes a foothold on the attacked computer and connects to its command and control servers located in Switzerland, Bulgaria and the Netherlands, to await further instructions and exfiltrate data,” explained Kaspersky Lab.

Adobe has described the issue as “a critical type confusion vulnerability”, which means cyber criminals could use it to infect victims with malware without them realising.

“Adobe is aware of a report that an exploit for CVE-2017-11292 exists in the wild, and is being used in limited, targeted attacks against users running Windows,” it said.

Kaspersky recommends disabling Flash Player, in order to stay protected.

“The attack using the recently discovered zero-day exploit is the third time this year we have seen FinSpy distribution through exploits to zero-day vulnerabilities,” Anton Ivanov added.

“Previously, actors deploying this malware abused critical issues in Microsoft Word and Adobe products. We believe the number of attacks relying on FinSpy software, supported by zero day exploits such as the one described here, will continue to grow.”

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Please enter a valid email
Please enter a valid email
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Please enter your first name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
Please enter your last name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
You must be over 18 years old to register
You must be over 18 years old to register
Opt-out-policy
You can opt-out at any time by signing in to your account to manage your preferences. Each email has a link to unsubscribe.

By clicking ‘Create my account’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in