• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Exploits   »   Trend Micro Discovers New Adobe Flash Zero-Day Exploit Used in Malvertisements

Trend Micro Discovers New Adobe Flash Zero-Day Exploit Used in Malvertisements

  • Posted on:February 2, 2015 at 5:17 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Peter Pi (Threats Analyst)
9

Our researchers have discovered a new zero-day exploit in Adobe Flash used in malvertisement attacks. The exploit affects the most recent version of Adobe Flash, and is now identified as CVE-2015-0313. Our initial analysis suggests that this might have been executed through the use of the Angler Exploit Kit, due to similarities in obfuscation techniques and infection chains.

According to our data, visitors of the popular site dailymotion.com were redirected to a series of sites that eventually led to the URL hxxp://www.retilio.com/skillt.swf, where the exploit itself was hosted. It is important to note that infection happens automatically, since advertisements are designed to load once a user visits a site. It is likely that this was not limited to the Dailymotion website alone, since the infection was triggered from the advertising platform and not the website content itself. Trend Micro detects this exploit as SWF_EXPLOIT.MJST and blocks the URL mentioned above. The ads from this particular infection chain appear to be down as of this writing.

We have been monitoring this attack since January 14, and saw a spike in the hits to the IP related to the malicious URL around January 27. According to data from the Trend Micro™ Smart Protection Network™, most of the users who accessed the malicious server related to the attack are from the United States.

numberofhits_adobezeroday

Figure 1. Number of accessed counts to one of  the affected IP addresses

This post serves to warn end-users and enterprises of the severity of this threat. So far we’ve seen around 3,294 hits related to the exploit, and with an attack already seen in the wild, it’s likely there are other attacks leveraging this zero-day, posing a great risk of system compromise to unprotected systems. Since the exploit affects the latest version of Flash, 16.0.0.296, users may consider disabling Flash Player until a fixed version is released. Adobe has confirmed that this is a zero-day exploit and the patch is expected to be available this week to address this. More details can be found in this advisory Adobe released for this vulnerability.

The existing Sandbox with Script Analyzer engine, which is part of Trend Micro™ Deep Discovery, can also be used to detect this threat by its behavior without any engine or pattern update. The Browser Exploit Prevention feature in our endpoint products such as Trend Micro™ Security, OfficeScan, and Worry-Free Business Security blocks the exploit once the user accesses the URL it is hosted in. Browser Exploit Prevention also protects against exploits that target browsers or related plugins.

This is only the latest of the zero-day vulnerabilities found in Adobe Flash this month. Just weeks ago, we wrote a couple of blog entries (Flash Greets 2015 With New Zero-Day, Analyzing CVE-2015-0311: Flash Zero Day Vulnerability) pertaining to zero-day vulnerabilities found in Adobe Flash Player and covered under CVE-2015-0311.

This is a developing story and we will continue to update this entry as new information and development about this threat surfaces. We will also share the technical analysis once the Adobe Flash update is released.

With additional analysis from Joseph C. Chen

Update as of February 2, 2015, 8:07 AM PST

Trend Micro™ Deep Security and Vulnerability Protection (formerly the Defense Firewall plug-in for OfficeScan) protects user systems from threats that may leverage this zero-day vulnerability following the DPI rule:

  • 1006468 – Adobe Flash Player Unspecified Vulnerability (CVE-2015-0313)

Update as of February 3, 2015, 11:49 AM PST

We have updated information on the exploit kit used in this attack. We now believe it is not Angler, but the Hanjuan Exploit Kit. More details in our blog entry A Closer Look at the Exploit Kit in CVE-2015-0313 Attack.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: 0dayAdobeExploitflash playermalvertisementVulnerabilitieszero day

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Latest Ransomware Posts

  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Bad Rabbit Ransomware Spreads via Network, Hits Ukraine and Russia
  • A Look at Locky Ransomware’s Recent Spam Activities
  • Magnitude Exploit Kit Now Targeting South Korea With Magniber Ransomware
  • WannaCry Ransomware Sold in the Middle Eastern and North African Underground

Recent Posts

  • Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location
  • The Need for Better Built-in Security in IoT Devices
  • Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps
  • Digmine Cryptocurrency Miner Spreading via Facebook Messenger
  • CVE-2017-11882 Exploited to Deliver a Cracked Version of the Loki Infostealer

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • Digmine Cryptocurrency Miner Spreading via Facebook Messenger
  • The Need for Better Built-in Security in IoT Devices
  • CVE-2017-11882 Exploited to Deliver a Cracked Version of the Loki Infostealer
  • Untangling the Patchwork Cyberespionage Group
  • Dissecting PRILEX and CUTLET MAKER ATM Malware Families

Latest Tweets

  • Case study: We looked at how internet-connected speakers can be exploited and found three attack scenarios. Analysi… twitter.com/i/web/status/9…
    about 6 hours ago
  • Retailer #Forever21 has just disclosed its findings about the #databreach it reported last November 2017. Details h… twitter.com/i/web/status/9…
    about 9 hours ago
  • New post: Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location bit.ly/2lPpVfN @TrendMicro
    about 11 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.