• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CVE-2015-0359

Ad Network Compromised, Users Victimized by Nuclear Exploit Kit

  • Posted on:May 7, 2015 at 11:35 am
  • Posted in:Bad Sites, Vulnerabilities
  • Author:
    Joseph C Chen (Fraud Researcher)
2

MadAdsMedia, a US-based web advertising network, was compromised by cybercriminals to leadĀ theĀ visitors of sites that use their advertising platform toĀ Adobe Flash exploits delivered by the Nuclear Exploit Kit. Up to 12,500 users per day may have been affected by this threat; three countries account for more than half of the hits: Japan, the United States,…

Read More
Tags: CVE-2015-0359MadAdsMedia

Latest Flash Exploit in Angler EK Might Not Really Be CVE-2015-0359

  • Posted on:April 22, 2015 at 8:59 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Peter Pi (Threats Analyst)
1

We have found an interesting discrepancy in how the Angler exploit kit targets Adobe Flash. The Angler exploit kit is known for its useĀ of various Adobe Flash Player exploits. Reports haveĀ indicated that Angler has started targeting CVE-2015-0359, a vulnerability thatĀ was fixed in Adobe’sĀ April 2015 update.Ā CVE-2015-0359 is a race condition vulnerability that occurs because ByteArray::Write is…

Read More
Tags: adobe flashAnglerCVE-2015-0359exploit kitUAF

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.