{"id":3860,"date":"2015-01-22T18:45:42","date_gmt":"2015-01-22T10:45:42","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3860"},"modified":"2015-09-09T19:36:41","modified_gmt":"2015-09-09T11:36:41","slug":"flash-zero-day-exploited-wild","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/01\/flash-zero-day-exploited-wild\/","title":{"rendered":"Flash Zero Day Being Exploited In The Wild"},"content":{"rendered":"

This is not the first Flash Zero Day<\/a> and it certainly won’t be the last, thanks to the Sandbox implemented in Chrome since 2011<\/a> – users of the browser are fairly safe.<\/p>\n

Those using IE are in danger (as usual) and certain versions of Firefox.<\/p>\n

\"Flash<\/p>\n

It has been rolled into the popular Angler Exploit Kit, which seems fairly prevalent although not as popular as Blackhole historically. <\/p>\n

A zero day Flash vulnerability is being actively exploited by criminals using the popular Angler exploit kit. Adobe is investigating the report by respected French malware researcher Kafeine, who found the exploit kit circulating on cybercrime forums.<\/p>\n

The vulnerabilities affected Flash Player versions up to 15.0.0.223 and the latest 16.0.0.257, he said. Punters on Windows 8.1 are safe, along with those using Google Chrome thanks to use of sandboxing.<\/p>\n

Those operating other Windows platforms with Internet Explorer versions 10 and below, and some Mozilla Firefox versions, have been confirmed as vulnerable to the exploit. The free version of MalwareBytes’ Anti-Exploit tool prevented the attack, but it is as yet unknown if Microsoft’s Enhanced Mitigation Exploit Tool can fight the attack.<\/p><\/blockquote>\n