你在这里

Websense Security Alert: Mass exploitation with Adobe Flash

Forums: 

最近大量的网站的 Adobe Flash 动画被植入恶意程序,很多安全厂商都建议将 Browser 的 Flash Plug-in 关闭或安装新版的 Flash Player (9.0.124 以后)。 趋势科技:近日爆发的 Adobe Flash Player 零时差攻击目前仍在持续蔓延中,黑客藉由在网页中植入恶意程序,当网友点选此网页时即被下载SWF檔(Adobe Flash Player档案格式),此SWF档将会自动下载及执行恶意程序,藉以偷取个人密码或机密数据。此波针对Adobe Flash Player 攻击有越演越烈之可能,从昨日至今,已发现被植入恶意程序来散播 SWF(flash)的网页已成长30%,且其为大规模、不限产业别的攻击,目前绝大部份被植入的网页皆集中在中国地区。

Websense® Security LabsT ThreatSeekerT technology has detected thousands of web sites infected with the recent mass JavaScript injection that exploits a vulnerability in Adobe Flash (CVE-2007-0071) to deliver its malicious payload. This attack has been previously mentioned in ISC and Adobe's blog. This vulnerability is not a 0-day and users with the latest version of Flash Player (version 9.0.124.0) are safe. However, there are still many on older versions of Flash that are unaware of this mass web infection and are susceptible to this drive-by attack. An update to the latest version of Flash Player is highly recommended. Websense ThreatSeeker has been tracking these malicious web sit! es and have discovered numerous reputable web sites that are now unwilling participants, infecting their very own visitors. These sites are from various industries such as government, education, healthcare, finance, media, and entertainment. This attack also attempts to exploit other popular vulnerabilities such as MDAC, RealPlayer, and various ActiveX controls. Websense customers are protected from this drive-by threat. Visit this alert on our web site for screenshots from Microsoft, Dept. of Education (Australia), PBS, Durex, CDC (Centers for Disease Control and Prevention), Discovery Channel, various universities and a Pakistani district government. To view the details of this alert Click here