• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TNH Online

Disrupting the Disruptors

  • News
  • Tech
  • Games
  • Mobile
  • New Hampshire

Adobe Flash Player stays a target for cybercriminals

TNH Staff · December 8, 2016 · Leave a Comment

It is an overstatement to even consider the Flash Player already dead, as exploiters are targeting potential victims that have an unpatched version of the Flash Player. As opposed to mourning its death, you should get patching.

The intelligence company Recorded Future issued a statement that Adobe Flash Player has an increased popularity among crimeware kits, 6 out of the top 10 liabilities being preferred by cybernetic attacks that concern it. The top is completed by various versions of Windows OS, Internet Explorer and Silverlight. These statistics were found after a year-long period whilst looking at approximately 141 exploits.

These exploit kits aid the cybercriminals with running and then managing an attack with no programming experience needed. All they have to do is provide a large payload. It comes in all forms but it’s generally encountered as a banking Trojan, a ransomware sample or a spam bot. Providing that you pay for the software that could range from 50$ a day to 4000$ a month for a Neutrino kit.

To provide information about the victim’s software, installed plugins and browser it is only necessary to have a kit installed and it is enough to figure which weak points can be taken advantage of. A method that is not so hard to use that tackles a confusion flaw, namely CVE-2015-7645 has made its appearance in seven exploit kits and it was made famous by Pawn Storm, a Russia –financed espionage group. It targets Flash on all operating systems, which makes it to be regarded as one of the most popular error to use with these kits.

A lot of the exploit kits became powerless versus system running more secure versions of Flash but with no use as they targeted attack mitigation features that were embedded into Flash by Adobe’s joint efforts with Google’s Project Zero. This got them right back in the action of resorting systems to failure, getting them right back in business.

A report stated that the weakness was fixed by Adobe rather quickly but with no use, because the multitude of operating systems has kept it in its place. Reported Future highlighted the same vulnerability and regarded it as the “method confusion”. They said at that respective moment that patching the software can significantly lower the risk of getting cyberattacked.

Filed Under: Software Tagged With: Adobe Flash Player

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Share your news tips

Have a news tip or source related to New Hampshire you want us to check out? Here's how to let us know:

Email the The New Hampshire Online (TNH Online) at tip@tnhonline.com. Please include your name and phone number and a brief report of the tip. If possible, please attach any related documents to back up your story.

Recent Posts

  • Sonic Tomography: Unveiling the Hidden Health of Urban Trees
  • Sudden Oak Death: What Is It?
  • Terrazzo: The Timeless, Eco-Friendly Flooring Solution
  • Cool Alternative Games Like Slither.io
  • 10 Best Minecraft Mountain Seeds

Recent Comments

  • Dalice on Can You Really Use Google Play Credits to Buy on Amazon?
  • Dalice on Can You Really Use Google Play Credits to Buy on Amazon?
  • Carmen Leung on Can You Really Use Google Play Credits to Buy on Amazon?
  • Sol on Can You Really Use Google Play Credits to Buy on Amazon?
  • Mazhar on WhatsApp for Nokia Asha Currently Free to Download

Copyright © 2026 · Daily Dish Pro on Genesis Framework · WordPress · Log in