Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Magnitude Exploit Kit Targets Recently-Patched Adobe Flash Player Vulnerability

Cybercriminals have added an exploit for a recently-patched Adobe Flash Player vulnerability to the notorious Magnitude exploit kit.

Cybercriminals have added an exploit for a recently-patched Adobe Flash Player vulnerability to the notorious Magnitude exploit kit.

The kit now includes an exploit for CVE-2015-3105, which was fixed as part of Adobe’s Flash Player update earlier this month. Despite the update however, many users are still running older versions of the software and remain at risk, blogged Trend Micro Threat Analyst Peter Pi. According to Pi, the kit is using the vulnerability to infect victims with CryptoWall 3.0, a particularly virulent piece of ransomware.

“This is another example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits,” Pi blogged. “We saw a similar incident in March, where exploits for an Adobe Flash Player vulnerability were added to the Nuclear Exploit Kit just a week after the patch was released. We also noted earlier this month that Flash Player was being targeted more frequently by exploit kits, and that shows no sign of changing soon.”

Trend Micro began noticing the exploit being used by the kit on June 15. According to the company, the countries most affected by the threat include the United States, Canada and the U.K.

In the 2015 Trustwave Global Security Report, Trustwave said that 33 percent of the exploits it detected in 2014 were targeting Adobe Flash, an increase of more than 28 percent points from the previous year.

“One of Magnitude’s main differentiators is its traffic sharing business model,” according to the Trustwave report. “Criminals can’t pay to rent Magnitude. Instead, they trade up to 20 percent of the traffic they direct to the kit to Magnitude’s administrators. The administrators then do what they will with their share of the traffic, most often infecting victim machines with ransomware.”

“Widely-used exploit kits such as Magnitude are often well-maintained with new vulnerabilities,” Pi explained. “Our research on these tools reveals that Magnitude is one of the most used exploit kits by cybercriminals along with SweetOrange and Angler. CryptoWall is also another notable threat in and of itself. We initially saw CryptoWall last year spreading through spam, and again later this year partnering with information stealing malware FAREIT.”

Trend Micro recommends users stay up-to-date with the latest version of Flash Player.

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.