- Sep 21, 2007
Adobe on Monday said in its advisory that the Hanjuan exploit was being distributed in drive-by downloads and malvertising attacks with ad networks used by major websites redirecting visitors to click-fraud malware, and in some cases, ransomware.
“It’s beautiful from an adversarial point of view; they don’t have to exploit websites anymore,” Ghosh said, whose company published a report last fall on Operation Death Click an ad-bidding campaign used in targeted attacks against defense firms. “The same tools advertisers use to target people and demographics, adversaries are able to use to target specific companies. They would bid for their ads to appear specifically at certain companies. I can be selective about who and where I drop code on.”
See full article here: http://threatpost.com/flash-zero-days-dominate-exploit-landscape/110871“File-less means the exploit and malware stays resident in memory and runs from memory,” Ghosh explained. “It gives a pointer to the exploit that runs in memory. Eventually, it will use system programs to extract the malicious file and run it. The exploit runs in memory which means no file system scan will reveal it.”