View Single Post
Old 02-23-2009, 10:47 PM   #3
Felix The Assassin
The Dreadnoks
 

Join Date: September 27, 2001
Location: Orlando, FL
Age: 62
Posts: 3,608
Default Re: Adobe 9 Users, read and heed, warning.

Quote:
Originally Posted by Firestormalpha View Post
perhaps a summary of the exploitation and it's effects?

As for the time being, I've taken your advice. (or the advice of the article which I didn't read as of my writing this response)
ATM, they 'appear' to be targeted, however, as we all too well know, wannabes will no doubt attempt to mass emulate the real threat.

"They" suggest to disable, and patch when it becomes available.

"The onging targeted attacks have since been confirmed by both, Symantec and McAfee urging users to disable JavaScript in Adobe Reader and Acrobat until Adobe issues a patch on the 11th of March"...

Quote:
Originally Posted by cut from article
While examining the JavaScript code used for “heap-spraying” in these PDFs, we can see the same comments that show that these separate exploit attempts come from the same source!

What’s important to point out is that the original targeted attacks detected by the Shadowserver Foundation are once again using a well known and previously abused Chinese DNS provider (js001.3322.org) with more details about its owner available in a related BusinessWeek article.
__________________
The Lizzie Palmer Tribute



Let every nation know, whether it wishes us well or ill, that we shall pay any price, bear any burden, meet any hardship, support any friend, oppose any foe to assure the survival and the success of liberty.

John F. Kennedy
35th President of The United States

The Last Shot

Honor The Fallen

Jesus died for our sins, and American Soldiers died for our freedom.




If you don't stand behind our Soldiers, please feel free to stand in front of them.

Last edited by Felix The Assassin; 02-23-2009 at 11:03 PM.
Felix The Assassin is offline   Reply With Quote