{"id":11857,"date":"2011-10-13T12:26:41","date_gmt":"2011-10-13T11:26:41","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=11857"},"modified":"2011-10-13T12:26:41","modified_gmt":"2011-10-13T11:26:41","slug":"i-hope-you-patch-adobe-products-like-all-the-others","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=11857","title":{"rendered":"I Hope You Patch Adobe Products Like All The Others"},"content":{"rendered":"<p>Yesterday I <a href=\"https:\/\/aidanfinn.com\/?p=11850\" target=\"_blank\">quoted<\/a> a Microsoft security report based on information they gather from numerous sources:<\/p>\n<p><em>\u201cDetections of exploits targeting Adobe Flash, although uncommon in comparison to some other types of exploits, increased in 2Q11 to more than 40 times the volume seen in 1Q11 \u2026 Two vulnerabilities accounted for the bulk of zero-day exploit activity \u2026 Both vulnerabilities affect Adobe Flash Player\u201d.<\/em><\/p>\n<p>In other words, hackers have found a new sweet spot.&#160; Most (not all) companies have copped on when it comes to patching Microsoft products.&#160; But:<\/p>\n<ol>\n<li>Other companies make software<\/li>\n<li>Pretty much all software has vulnerabilities<\/li>\n<li>Hackers aren\u2019t stupid.&#160; I\u2019m reading a book called Kingpin and it illustrates how hackers will move from one attack vector to another to find a soft underbelly.&#160; Adobe is that new point of attack.<\/li>\n<\/ol>\n<p>And there is a high profile example of that.&#160; <a href=\"http:\/\/www.theinquirer.net\/inquirer\/news\/2079902\/rsa-adobe-speak-secureid-hack\" target=\"_blank\">The Inquirer<\/a> website reports that (and there is no evidence because RSA have not publicly documented this):<\/p>\n<p><em>\u201cCriminals used a zero-day vulnerability in Adobe Flash player to penetrate RSA defences through an embedded Flash file in an Excel email attachment. A spear phishing attack, it targeted regular employees of RSA Security disguised as a recruitment form. It breached the RSA systems, even though it first went to Microsoft Outlook&#8217;s spam folder\u201d.<\/em><\/p>\n<p>OK, it was a zero day attack.&#160; We know this was a very organised attack, possibly sponsored by a nation.&#160; They found a hole in Flash (allegedly) that wasn\u2019t yet reported and crafted an email attachment to attack it, knowing that the recipient would get stung by it, thus allowing the hacker to 0wn the PC.&#160; Unlucky.&#160; <\/p>\n<p>But even if it wasn\u2019t a zero day attack would they have patched Adobe?&#160; (we learned that less than 1% of attacks are zero day) I bet the answer is no.&#160; Most companies focus just on Microsoft software.&#160; Adobe products do automatically prompt for upgrades, but they are seriously click heavy and frequent, so most people probably disable the auto-check for upgrades, and the PCs probably go years without updating.&#160; And that leaves those PCs vulnerable to:<\/p>\n<ul>\n<li>Drive by attacks where a user navigates to an innocent website that has either been hacked (malware uploaded) or has a compromised advert that is hosted elsewhere.<\/li>\n<li>When a user reads a document\/email with a crafted attachment for attacking an Adobe product vulnerability.<\/li>\n<\/ul>\n<p>In other words, patch Adobe products too, and not just Microsoft ones.&#160; Unfortunately, that isn\u2019t too easy (or supported) in WSUS.&#160; However, you can do it using System Center Essentials (that\u2019s what we use in our office) or System Center Configuration Manager.<\/p>\n<div style=\"padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; display: inline; float: none; padding-top: 0px\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:3838e299-0b00-4644-bca6-5208c90041a0\" class=\"wlWriterEditableSmartContent\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/Security\" rel=\"tag\">Security<\/a>,<a href=\"http:\/\/technorati.com\/tags\/System+Center\" rel=\"tag\">System Center<\/a>,<a href=\"http:\/\/technorati.com\/tags\/ConfigMgr\" rel=\"tag\">ConfigMgr<\/a>,<a href=\"http:\/\/technorati.com\/tags\/System+Center+Essentials\" rel=\"tag\">System Center Essentials<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday I quoted a Microsoft security report based on information they gather from numerous sources: \u201cDetections of exploits targeting Adobe Flash, although uncommon in comparison to some other types of exploits, increased in 2Q11 to more than 40 times the volume seen in 1Q11 \u2026 Two vulnerabilities accounted for the bulk of zero-day exploit activity &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=11857\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;I Hope You Patch Adobe Products Like All The Others&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[37],"tags":[173,190,193,194],"class_list":["post-11857","post","type-post","status-publish","format-standard","hentry","category-security","tag-configmgr","tag-security","tag-system-center","tag-system-center-essentials"],"aioseo_notices":[],"jetpack_featured_media_url":"","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/11857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11857"}],"version-history":[{"count":0,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/11857\/revisions"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}