Feeds

Adobe exploit bears fingerprints of hack on Google

New in-the-wild attacks unearthed

5 things you didn’t know about cloud backup

Recent attacks that exploit an unpatched vulnerability in Adobe's near-ubiquitous Reader application bear the hallmarks of the people who breached Google and dozens of other large companies earlier this year, researchers from Symantec said.

The booby-trapped PDF files are attached to emails that request interviews and offer expert commentary on matters involving North Korea and China, according to Symantec's Karthik Selvaraj. They began circulating as early as September 1 and contain similarities to emails that contained the Hydraq trojan that was used to penetrate Google, Adobe Systems and at least 32 other companies. Parallels include wording in the email, multiple variants of the PDF, and the same geographic region of one of the people responsible.

“If the above emails look familiar, it is because their style is very similar to the emails used in Hydraq (Aurora) attacks,” Selvaraj wrote here. “In addition, the use of a zero-day within a PDF, and how the executable is dropped on the system, all match the Hydraq method of operation. Furthermore, we have seen a large number of detections of unique versions of the PDF – not yet seen elsewhere in the wild – coming from a single computer in Shandong Province of China, which is how far back investigators were able to trace the Hydraq attacks.”

Adobe disclosed the zero-day vulnerability last week and warned that it was being actively exploited on the internet to attack users of its Reader application. In addition to bypassing protections built in to more recent versions of Microsoft Windows, the sophisticated exploit also used a stolen digital certificate belonging to Missouri-based Vantage Credit Union, evidently in an attempt to allay suspicions of prospective victims.

Adobe's security team has yet to say when it expects to release a patch. In the meantime, users who don't want to use an alternate PDF application can employ Microsoft's Enhanced Mitigation Experience Toolkit, or EMET, to block attacks. The tool, which was updated earlier this month, will insulate a Reader module that's targeted in the exploit, Adobe said.

Microsoft provides instructions and screenshots here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.