Cyber criminals have added the recently the recently discovered CVE-2015-3113 to the popular Magnitude exploit kit. Last week, Adobe released a security update for the critical Adobe Flash Player vulnerability CVE-2015-3113 that is being actively exploited in the wild.
Security experts at FireEye discovered that the critical heap buffer overflow vulnerability (CVE-2015-3113) affects Adobe systems and is being exploited in the wild by the hacking crew APT3 that has targeted a number of industries, including the telecommunications, transportation and aerospace and defense sectors.
“Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address a critical vulnerability (CVE-2015-3113) that could potentially allow an attacker to take control of the affected system. Adobe is aware of reports that CVE-2015-3113 is being actively exploited in the wild via limited, targeted attacks. Systems running Internet Explorer for Windows 7 and below, as well as Firefox on Windows XP, are known targets.” Adobe stated in a security advisory.
The remote code execution vulnerability (CVE-2015-3113) allows attackers to hijack un-patched machines targeting Internet Explorer on Windows 7 and XP.
As usual the excellent researcher Kafeine provided further information on the use of criminal crews of the CVE-2015-3113 exploit. Kafeine confirmed the vulnerability has been added to the Magnitude exploit kit leaving Flash users with outdated systems open to cyber attacks.
The addition of CVE-2015-03113 comes a few days after the author of the Magnitude exploit kit have added another Adobe Flash vulnerability (CVE-2015-3105) to the kit.
Kafeine says Magnitude exploit is being used to serve the dreaded Cryptowall ransomware.
“Magnitude successfully exploiting Flash 22.214.171.124 on IE11 in Windows 7 on 2015-06-27 Dropping 2 instances of Cryptowall Ransomware” states Kafeine.
It is easy to predict that the CVE-2015-3113 exploit will be added to other kits in the next weeks, despite Kafeine confirmed that he had not seen the exploit in any other kits.
The Magnitude exploit kit has a third of the exploit kit market, according to Trustwave, and generated up to $US100,000 a month since August. The researchers speculate that Magnitude earns could reach up to $3 million a year.
“Criminal customers pay up to 20 percent of profits depending on the level of snared traffic in order to use the exploit kit which made its name after fleecing visitors to PHP.net.” reported The Register.
(Security Affairs – Magnitude exploit kit, CVE-2015-3113)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.