Quote:
Originally Posted by Firestormalpha
perhaps a summary of the exploitation and it's effects?
As for the time being, I've taken your advice. (or the advice of the article which I didn't read as of my writing this response)
|
ATM, they 'appear' to be targeted, however, as we all too well know, wannabes will no doubt attempt to mass emulate the real threat.
"They" suggest to disable, and patch when it becomes available.
"The onging targeted attacks have since been confirmed by both, Symantec and McAfee urging users to disable JavaScript in Adobe Reader and Acrobat until Adobe issues a patch on the 11th of March"...
Quote:
Originally Posted by cut from article
While examining the JavaScript code used for “heap-spraying” in these PDFs, we can see the same comments that show that these separate exploit attempts come from the same source!
What’s important to point out is that the original targeted attacks detected by the Shadowserver Foundation are once again using a well known and previously abused Chinese DNS provider (js001.3322.org) with more details about its owner available in a related BusinessWeek article.
|