It took crooks less than two weeks to weaponize the most recent Flash zero-day, which they’re now using as a module inside the Magnitude exploit kit.

On May 8, Adobe pre-announced the release of a critical Flash security flaw exploited in the wild by attackers. On May 12, the company lived up to its word and patched the issue with the release of Adobe Flash Player

The following day, FireEye researcher Genwei Jiang, the man who discovered the Flash exploit used in the wild, revealed the technical details of CVE-2016-4117, the identifier assigned to this security bug.

Surprisingly, CVE-2016-4117 was not a Web-based exploit, but an attack delivered via Office files that contained a Flash object embedded in their content.

Crooks were using this exploit to infect users with malware when they opened the Office document and allowed the Flash object to run. CVE-2016-4117 was successful in infecting all users that had Flash Player version and earlier.

On May 21, nine days after Adobe put out a fix and eight days after FireEye revealed the zero-day’s technical details, security researcher Kafeine announced he spotted the first instance of this flaw exploited online.

Kafeine detected a case of the Magnitude exploit kit trying to attack users with a weaponized CVE-2016-4117 exploit that was firing every time a user would access a page and had a Flash version of up to installed.

At the start of April, Kafeine himself also discovered another Flash zero-day, CVE-2016-1019, exploited to deliver Cerber and Locky ransomware.

CVE-2016-4117 found in the Magnitude exploit kit

CVE-2016-4117 found in the Magnitude exploit kit

Let’s block ads! (Why?)

Related Posts

Facebook Comments

Return to Top ▲Return to Top ▲