• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Rik Ferguson
    • Raimund Genes
    • Mark Nunnikhoven
  • Research
Home   »   Security   »   Update: The Hacking Team Flash Zero-Day Trifecta

Update: The Hacking Team Flash Zero-Day Trifecta

  • Posted on:July 12, 2015
  • Posted in:Security, Vulnerabilities
  • Posted by:Christopher Budd (Global Threat Communications)
3
Vulnerability

Trend Micro’s researchers have reported a third zero-day vulnerability (CVE-2015-5123) in Adobe Flash, a result from last week’s Hacking Team attack to the Adobe Security Team.

Similar to the second Adobe Flash vulnerability discussed on Saturday, we have identified proof of concept (PoC) code; however, it has not yet been seen in active attacks or added to exploit kits like the first Adobe zero-day vulnerability, also spawned from the Hacking Team compromise.

Adobe has updated their security advisory with this information and has begun addressing both of these vulnerabilities through updates this coming week.

Until an update is available, users should consider disabling Adobe Flash.

In light of the Java zero-day attack we also discovered and discussed, disabling both Flash and Java is advisable. Extra caution should be exercised for the foreseeable future and special attention paid for the possibility of compromised ad servers.

As we’ve outlined in our Q1 2015 Threat Report, malvertising has made a comeback recently, especially leveraging zero-day vulnerabilities in Adobe Flash. Flash and Java vulnerabilities are particularly well-suited for malvertising attacks, so we could possibly see these vulnerabilities incorporated into exploit kits that, in turn, are used to attack ad servers.

For additional information, click here.

Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.

Related posts:

  1. Update: Hacking Team Flash Zero Day – Not Out of the Woods
  2. What you need to know about the Hacking Team Flash Zero Day
  3. Hacking Team Adobe Flash Zero-Day
  4. UPDATE: Why Trend Micro’s Cloud Security Protection is relevant to the new Adobe Flash Player Security Vulnerability
  • Joseph Singer

    ARRGH!

  • Teabagger Blaster

    Flash needs to go the way of the dinosaur.

  • Vitor Mangraviti

    I’m sick of Flash. When are all video streams going to use HTML5?
    I truly hope that Adobe burns and explodes so everyone is forced to move on from their crap and we are all happy.
    Just updated to 18.0.0.203 and STILL get vulnerability problems.

Security Intelligence Blog

  • A Look at the BIND Vulnerability: CVE-2016-2776
  • October Patch Tuesday: Microsoft Releases 10 Security Bulletins, Five Rated Critical
  • Several Exploit Kits Now Deliver Cerber 4.0

Featured Authors

Dustin Childs (Zero Day Initiative Communications)
Dustin Childs (Zero Day Initiative Communications)
  • October 2016 – A brave new world of security updates
Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Exploits as a Service: How the Exploit Kit + Ransomware Tandem Affects a Company’s Bottom Line
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • Trend Micro Achieves “Recommended” Status from NSS Labs Testing
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Talking about Ransomware, A Recap
Raimund Genes (Chief Technology Officer)
Raimund Genes (Chief Technology Officer)
  • Is “Next Gen” patternless security really patternless? What the changes to VirusTotal’s Terms of Service Really Mean
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • PoS Malware: Old Dog Learns New Tricks

Trend Micro Twitter Feed

Tweets by @trendmicro

Follow Us

Trend Micro in the News

  • Trend Micro Achieves “Recommended” Status from NSS Labs Testing
  • This Week in Security News
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of October 10, 2016

Trend Micro Blogs

  • Internet Safety for Kids
  • CounterMeasures
  • CTO Insights
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2016 Trend Micro Incorporated. All rights reserved.