New version to ship the week of October 19 Credit: Adobe Systems On Wednesday, Adobe confirmed reports from Trend Micro surrounding a new vulnerability in Flash that’s being used in attacks against high-profile targets in government affairs.The vulnerability has been tied to a number of Phishing campaigns that are part of what Trend Micro is calling Operation Pawn Storm. Some of the earliest attacks date back to June of 2014.“Pawn Storm is a long-running cyber-espionage campaign known for its high-profile targets and usage of the first Java zero-day we’ve seen in the last couple of years… In our latest research, we find that the Russian spies behind Pawn Storm apparently do not discriminate,” Trend explained.“In this most recent campaign, Pawn Storm targeted several foreign affairs ministries from around the globe. The targets received spear phishing e-mails that contained links leading to the exploit. The emails and URLs were crafted to appear like they lead to information about current events…” In their advisory, Adobe confirmed Trend’s findings, and said that a patch for the newly circulated Flash vulnerability will be issued sometime next week.“A critical vulnerability (CVE-2015-7645) has been identified in Adobe Flash Player 19.0.0.207 and earlier versions for Windows, Macintosh and Linux. Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system. Adobe would like to thank Peter Pi of Trend Micro for reporting CVE-2015-7645 and for working with Adobe to help protect our customers,” the advisory said. While it might be easier to recommend uninstalling Flash, the reality is that such an option isn’t available in most corporate environments. However, limiting access to Flash, and preventing it from running unless needed (such as what’s done in Firefox) makes sense – especially now.But, if Flash isn’t needed – remove it. Thanks to HTML 5, most applications online work fine without it. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe