Forum Moderators: open
[kb.cert.org...]
CERT on how to secure your browser:
[us-cert.gov...]
[securityfocus.com...]
The current malware attack has been traced back to Chinese blackhats, who are using a zero day to infect users with password stealers, moreover, one of the domains serving the Adobe zero day has been sharing the same IP with four of the malware domains in the recent waves of massive SQL injection attacks, indicating this incident and the previous ones are connected.
Still it's a problem for those with not up to date flash players, as the exploits are being used out there.
Take a look at the SANS Internet Storm Center for an overview of the current standing:
[isc.sans.org...]
According to Adobe [blogs.adobe.com], you are correct:
This exploit does NOT appear to include a new, unpatched vulnerability as has been reported elsewhere – customers with Flash Player 9.0.124.0 should not be vulnerable to this exploit.
from SANS [isc.sans.org]:
On closer examination, this does not appear to be a "0-day exploit". Symantec has updated their threatcon info[/url], as well. We have yet to see one of these that succeeds against the current version (9.0.124.0)
From Symantec [symantec.com]:
Adobe has released an official statement noting that Flash Player versions 9.0.124.0 aren't affected by these attacks...Users are advised to ensure that Flash is updated to version 9.0.124.0
From Adobe [blogs.adobe.com]:
This exploit does NOT appear to include a new, unpatched vulnerability as has been reported elsewhere – customers with Flash Player 9.0.124.0 should not be vulnerable to this exploit.
And, anything in Flash, totally invisible.
I feel sorry for anyone browsing in that mode at all times.
Don't feel sorry for me!
I have been surfing this way for a long, long time now. Except for using NoScript, I started using that add-on in January of this year.
Cookies usually get the ESC key (Deny), except for those sites I want to allow. As far as JS and Flash, well we do a lot of Flash development too, so it actually helps to have these extensions loaded and operational for internal quality assurance before the code gets implemented. Viewing the page as a person that has JS and/or Flash disabled has proven priceless in some instances.
But back to the general web browsing experience ... I can surf much faster to locate the information I want to see without having to filter the non-applicable trash, ads, etc. Riding the waves, dude :)
Somewhat worrying. According to US_CERT it seems to affect all OS. I guess that's the weakness of a cross-platform system!
Only the flash exploit affects all OS's, the payload is Windows only at the moment. Personally I can't wait for a fill cross platform exploit.
According to the article it is dropping this malware:
MemScan:Win32.Worm.Otwycal.T; a variant of Win32/AutoRun.NADTrojan.PWS.OnLineGames.WOM; Win32/TrojanDropper.Agent.NKK
I assume all of those password stealers need Admin privileges so Vista users are safe as long as they disallow the UAC prompt, XP users are toast. Linux and Mac users would have to enter their root password.
My distro has had version 9.0.124 for a while now, so unfortunately I am unable to participate in this cross platform experiment at the moment ;)