Categories: Security

Adobe Is Web Hackers’ Top Target

A vulnerability in Adobe’s Flash player that was published – and patched – just 12 months ago is already the most popular target for Web-based attacks on European PCs, according to Symantec’s annual EMEA Internet Security Threat Report.

The second most frequent Web-based attack during 2008 was also aimed at an Adobe application, with malicious PDF documents exploiting vulnerabilities in Acrobat and Acrobat plug-ins.

The most common type of malware installed by an attack was a Trojan, accounting for two-thirds of the total. Symantec said that increasingly these attacks are done in stages, with the initial infection lowering the victim’s capabilities and allowing more capable malware to be installed without detection.

Once it is on a computer, malicious code tries to propagate itself, and by far the most common route was shared executable files – in particular, files shared via removable media such as USB sticks and media players. The Symantec researchers said that 65 per cent of potential infections travelled this way during 2008, almost double the proportion that used this propagation method during 2007.

This reflects the growing usage of USB-connected storage media, said Symantec, and recommended that enterprises should disable Windows’ Autorun feature, virus-scan removable drives and use policies to block unauthorised USB devices from corporate PCs.

The researchers said that, as well as keeping systems up-to-date with software patches and antivirus definitions, enterprises “should monitor all network-connected computers for signs of malicious activity including bot activity and potential security breaches, ensuring that any infected computers are removed from the network and disinfected as soon as possible.”

They added, “Symantec recommends that organisations perform both ingress and egress filtering on all network traffic to ensure that malicious activity and unauthorised communications are not taking place.

“Organisations should also filter out potentially malicious email attachments to reduce exposure to enterprises and end users. In addition, egress filtering is one of the best ways to mitigate a DoS (denial of service) attack.”

Bryan Betts

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

20 hours ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

21 hours ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

1 day ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

2 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

2 days ago