Researchers at Forcepoint – formerly Raytheon|Websense – have discovered the website of a leading travel company has been serving malware to customers worldwide after it was infected by code that delivers a new exploit of Adobe Flash Player.
The popular European transport company’s site, which cannot be named as Forcepoint is assisting it with ongoing investigations, has been compromised with injected code that leads to Angler exploit kit and Flash Player exploit kit.
[su_note note_color=”#ffffcc” text_color=”#00000″]Carl Leonard, Principal Security Analyst at Raytheon|Websense:
“This attack shows Angler exploit kit is still operating at the top of its game, incorporating a vulnerability in Adobe Flash Player that is barely a few days old.
“This is an example of cybercriminals’ expertise in exploiting the latest vulnerabilities to compromise high profile websites and target a wide spectrum of potential victims. It serves as another reminder of the importance of keeping up to date with software updates, and in the case of Adobe Flash Player people should consider moving away from this software for good.”[/su_note]
[su_box title=”About Raytheon|Websense” style=”noise” box_color=”#336588″]Raytheon Company (NYSE: RTN) and Vista Equity Partners completed a joint venture transaction creating a new company that combines Websense, a Vista Equity portfolio company, and Raytheon Cyber Products, a product line of Raytheon’s Intelligence, Information and Services business. The newly-formed commercial cybersecurity company will be known on an interim basis as Raytheon|Websense. The company expects to introduce a new brand identity upon completion of standard organisational integration activity.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.