by Michael Mimoso October 22, 2014
Two notorious exploit kits are already seeding vulnerable websites with exploits for a Flash Player vulnerability that was patched in last week’s Adobe security bulletin.
French researcher Kafeine told Threatpost that the most likely scenario is that a skilled coder found a way to reverse-engineer the Adobe patch in order to build the exploit. Regardless, a week from patch to inclusion in an exploit kit—in this case the Angler and Fiesta EKs—is a harsh reminder of how quickly the window from vulnerability to exploit can slam shut.
“This is really, really fast,” Kafeine said. “The best I remember was maybe three weeks in February 2014.”
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.