The compromise, which originally took place in early July, allowed malware authors to create at least two malicious files that were digitally signed using a valid Adobe certificate, according to a blog by Adobe security chief Brad Arkin.
"We are proceeding with plans to revoke the certificate and publish updates for existing Adobe software signed using the impacted certificate." Arkin said. "This only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh. The revocation does not impact any other Adobe software for Macintosh or other platforms."
The breach would likely be used to create advanced persistent threats, Arkin said.
"Sophisticated threat actors use malicious utilities like the signed samples during highly targeted attacks for privilege escalation and lateral movement within an environment following an initial machine compromise," the blog stated. "As a result, we believe the vast majority of users are not at risk. We have shared the samples via the Microsoft Active Protection Program (MAPP) so that security vendors can detect and block the malicious utilities."
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.