Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched

Security in cloud computing

Security in cloud computing

Recently breached surveillance software maker, Hacking Team, had access to three different exploits for previously unknown vulnerabilities in Flash Player. All of them are now out in the open, putting Internet users at risk.

Milan-based Hacking Team develops and sells surveillance software to government agencies from around the world. On July 5, a hacker released over 400GB of data stolen from the company on the Internet, including email communications, business documents, source code and other internal files.

On Tuesday, researchers found a proof-of-concept exploit among Hacking Team's files that worked against the latest version of Flash Player. Cybercriminals were quick to adopt it and were already using it in large-scale attacks by the time Adobe Systems released a patch for it on Wednesday.

By late Friday, researchers from FireEye revealed that they found a second zero-day exploit for Flash Player in the Hacking Team data cache, prompting Adobe to issue an emergency advisory.

This was followed up Saturday by researchers from Trend Micro with yet another find, putting the number of Flash Player zero-day exploits used by Hacking Team to three -- at least so far.

Only one of the vulnerabilities targeted by those exploits has been patched so far, with Adobe planning to release fixes for the other two -- CVE-2015-5122 and CVE-2015-5123 -- later this week.

That's a problem because the cybercriminals behind the Angler Exploit Kit were already using the exploit discovered by FireEye (CVE-2015-5122) by Sunday. The malicious activity was spotted by a malware researcher known online as Kafeine who specializes in tracking drive-by download attacks.

It's very likely that attackers are also working on integrating the exploit found by Trend Micro (CVE-2015-5123) in commercial exploit kits, if they haven't already.

"Until an update is available, users should consider disabling Adobe Flash," researchers from Trend Micro said in a blog post. "Extra caution should be exercised for the foreseeable future and special attention paid for the possibility of compromised ad servers."

Web-based exploits are typically used to infect computers when users visit legitimate websites that were compromised or when their browsers load malicious advertisements.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwaretrend microintrusionFireEyeAdobe SystemsExploits / vulnerabilitiesHacking Team

More about Adobe SystemsFireEyeTrend Micro

Show Comments
[]