Nuclear Exploit Kit Adds Code for Leveraging Newly Patched Flash Player Flaw

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Exploit code for a vulnerability fixed by Adobe in the current version of Flash Player has been included in Nuclear exploit kit, researchers have found.

The flaw is a type confusion vulnerability that could lead to code execution and it received the track number CVE-2015-0336; it was plugged by the developer on March 12 with the release of version 17.0.0.134 and 13.0.0.277 (extended support) for Windows and Mac, and 11.2.202.451 on Linux.

Many users have not switched to the safer version of Flash
A couple of days ago, security researchers at Trend Micro observed the first instances of malicious activity relying on taking advantage of this glitch.

According to telemetry data from the security company, many users still have to update their version of Flash, as they are running the previous release.

“This exploit, detected as SWF_EXPLOIT.OJF, is being distributed to users via compromised websites, including one for an Internet Explorer repair tool and various Japanese pornographic sites,” Trend Micro threat analyst Peter Pi said in a blog post on Friday.

After being redirected to a landing page, the malicious code is loaded from a different website.

Users in Japan seem to be the target
Pinning this on Nuclear is based on the fact that the URLs used are similar to the ones seen in previous attacks with this browser-based tool; additionally, Pi says that the content on the landing page is consistent with the exploit kit.

Until now, the company recorded more than 8,700 users visiting the nefarious locations, the largest part of the IP addresses (91.93%) being located in Japan. Other countries observed are the United States, Australia, China and New Zealand, all accounting for less than 4% of the visits.

Cybercriminals updating their attack tools is not uncommon, but the interesting part is that they do it in a very short time after the vulnerability has been patched and disclosed, suggesting an organized group.

Users of Internet Explorer and Google Chrome receive the latest Flash build automatically through their built-in update mechanisms. Flash has an auto-update feature and users that have it enabled are also delivered the new releases seamlessly.
 
  • Like
Reactions: silversurfer

soccer97

Level 11
Verified
May 22, 2014
517
People who mean well, or read headlines to update their Flash Player but are not proficient may fall prey to search engine poisoning. Have you done a Google search for Flash player update in the past (they are fixed now).

Have you ever received a floating window on your PC (that is not the real flash player update prompt)?

I did-yikes. Pulled the ethernet cable and Ctrl+Alt+Delete, clear the temp files and cache reboot and scan. Fake Flash Player updates at least used to be one of the ways to deliver nasty malware from simple re-directs to worms.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top