June 25, 2015 By Shane Schick 2 min read

Adobe has issued an emergency patch in response to a vulnerability in its popular Flash browser plugin that it said was being used in phishing attacks and other attempts to take over victims’ computers.

The company issued a brief advisory in response to a tip from security firm FireEye, which had noticed the Flash vulnerability being exploited by cybercriminals in phishing schemes in a number of industry sectors. According to ZDNet, companies in tech and telecom, aerospace and construction were targeted. Adobe said people using Firefox and Windows XP, as well as users running Windows 7 and its Internet Explorer browser, are among those at risk of the bug, known as CVE-2015-3113.

Besides phishing schemes, Computerworld said the Adobe Flash vulnerability lets attackers install Shotput or CookieCutter, Internet backdoor programs that can open up corporate networks to prying eyes. Like other sophisticated attack vectors, though, cybercriminals appear to be making regular changes to the infrastructure that runs CVE-2015-3113’s command-and-control (C&C) capability. In other words, if you don’t patch quickly, it could be increasingly difficult to keep track of this exploit as it spreads.

As eWEEK pointed out, this is not the first time Adobe has had to address zero-day threats for Flash. There were multiple reports in February about Flash malware samples growing by more than 300 percent, making it a particularly high-risk piece of technology. The fact that Flash is so pervasive across desktops for a variety of video and multimedia applications probably accounts for it becoming a hot target for cybercriminals.

Experts told IT PRO that the volume of security issues facing Adobe Flash might lead some users to decide to do away with the plugin completely, while others suggested the most recent exploit just proves how vulnerable Internet content is in general.

Forbes suggested the Adobe Flash vulnerability exploits may be traced to a criminal collective known as APT3, which has also leveraged flaws in Internet Explorer. Until more details are confirmed, however, it’s best that anyone using Flash start monitoring for threats as often as they update the software itself.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today