Categories: Security

Adobe Is Web Hackers’ Top Target

A vulnerability in Adobe’s Flash player that was published – and patched – just 12 months ago is already the most popular target for Web-based attacks on European PCs, according to Symantec’s annual EMEA Internet Security Threat Report.

The second most frequent Web-based attack during 2008 was also aimed at an Adobe application, with malicious PDF documents exploiting vulnerabilities in Acrobat and Acrobat plug-ins.

The most common type of malware installed by an attack was a Trojan, accounting for two-thirds of the total. Symantec said that increasingly these attacks are done in stages, with the initial infection lowering the victim’s capabilities and allowing more capable malware to be installed without detection.

Once it is on a computer, malicious code tries to propagate itself, and by far the most common route was shared executable files – in particular, files shared via removable media such as USB sticks and media players. The Symantec researchers said that 65 per cent of potential infections travelled this way during 2008, almost double the proportion that used this propagation method during 2007.

This reflects the growing usage of USB-connected storage media, said Symantec, and recommended that enterprises should disable Windows’ Autorun feature, virus-scan removable drives and use policies to block unauthorised USB devices from corporate PCs.

The researchers said that, as well as keeping systems up-to-date with software patches and antivirus definitions, enterprises “should monitor all network-connected computers for signs of malicious activity including bot activity and potential security breaches, ensuring that any infected computers are removed from the network and disinfected as soon as possible.”

They added, “Symantec recommends that organisations perform both ingress and egress filtering on all network traffic to ensure that malicious activity and unauthorised communications are not taking place.

“Organisations should also filter out potentially malicious email attachments to reduce exposure to enterprises and end users. In addition, egress filtering is one of the best ways to mitigate a DoS (denial of service) attack.”

Bryan Betts

Recent Posts

Apple Slashes iPhone Prices In China

Amid intense competition from Huawei and others, Apple has again slashed the price of its…

3 seconds ago

Bitcoin ‘Creator’ Craig Wright Repeatedly Lied, Rules UK Judge

Damning ruling by British judge, after he rules that self-proclaimed bitcoin inventor lied 'repeatedly' to…

45 mins ago

Julian Assange Granted Right To Challenge US Extradiction Order

High Court rules Wikileaks founder Julian Assange can appeal against extradition to the US, despite…

2 hours ago

Tesla Layoffs Continue With Another 600 Jobs In California

Regulatory filing last week shows Elon Musk's Tesla is cutting another 600 jobs in California,…

4 hours ago

UK Regulator Declines To Investigate Microsoft’s Mistral AI Deal

Weeks after seeking feedback on Microsoft's partnership with Mistral AI, UK regulator says it does…

7 hours ago

UK AI Safety Institute To Open Office In US

Seeking collaboration on AI regulation, UK's AI Safety Institute to cross Atlantic and will open…

7 hours ago