New Flash Player zero-day used against Russian facility | Advanced Mobile Spy Software
For the past couple of years, Office documents have largely replaced exploit kits as the primary malware delivery vector, giving threat actors the choice between social engineering lures and exploits or a combination of both. While today's malicious spam (malspam) heavily relies on macros and popular vulnerabilities (i.e. CVE-2017-11882), attackers can also resort to zero-days when trying to compromise a target of interest. In separate blog posts, Gigamon and 360 Core Security reveal how a new zero-day (CVE-2018-15982) for the Flash Player (version and earlier) was recently used in targeted attacks. Despite being a brand new vulnerability, Malwarebytes users were already protected against it thanks to our Anti-Exploit technology. The Flash object is embedded into an Office document disguised as a questionnaire from a Moscow-based clinic. A dot reveals an embedded (and hidden) ActiveX object Since Flash usage in web browsers has been declining over the past few years, the