You've patched that Flash hole, but have the users? Phone's ringing. It's for you

Latest exploit used to sling CryptXXX ransomware

Image by gyn9037

Security researchers are warning of a new wave of malvertising that harnesses the latest Flash exploit.

The attack features tainted ads from websites including,, and Fraudulent advertisers are posing as legitimate retail or legal businesses in order distribute "conditional" malvertising, which then redirects to the Angler exploit kit, although that only happens if certain conditions are met.

Angler is using a very recently patched Flash Player exploit (CVE-2016-4117) in an attempt to infect the Windows PCs of surfers with the CryptXXX ransomware.

“This entire sequence does not require any user interaction at all. As soon as the advert gets displayed, the exploit redirection and infection automatically take place,” security firm Malwarebytes warns.

The attack exploits a flaw patched by Adobe two weeks ago, on 10 May. More details on the threat are due to be published by Malwarebytes in a blog post later today. ®

Sponsored: Balancing consumerization and corporate control

Biting the hand that feeds IT © 1998–2019