Compromise means that attackers could create malware that looks like legitimate Adobe software

Dark Reading Staff, Dark Reading

October 1, 2012

1 Min Read

Adobe is warning users that that an internal server with access to its digital certificate code signing infrastructure was hacked by "sophisticated threat actors."

The compromise, which originally took place in early July, allowed malware authors to create at least two malicious files that were digitally signed using a valid Adobe certificate, according to a blog by Adobe security chief Brad Arkin.

"We are proceeding with plans to revoke the certificate and publish updates for existing Adobe software signed using the impacted certificate." Arkin said. "This only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications that run on both Windows and Macintosh. The revocation does not impact any other Adobe software for Macintosh or other platforms."

The breach would likely be used to create advanced persistent threats, Arkin said.

"Sophisticated threat actors use malicious utilities like the signed samples during highly targeted attacks for privilege escalation and lateral movement within an environment following an initial machine compromise," the blog stated. "As a result, we believe the vast majority of users are not at risk. We have shared the samples via the Microsoft Active Protection Program (MAPP) so that security vendors can detect and block the malicious utilities."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights