Reading Time: 1 minute
Others have nefarious goals, such as the group that developed the notorious Angler exploit kit, designed as a web based attack tool.Angler is well known for targeting programs run in a web browser, including Adobe reader, Adobe Flash player, and the Java environment. Java has had a series of serious vulnerabilities over the past few years and may be the most serious concern. Recently the kit has been updated for a vulnerability found in Microsoft Silverlight plugin which can be used to exploit the security system and breach into user’s computers and gain control.
By using an exploit found in Silverlight 5 and earlier, the angler kit will allow remote executions. Silverlight is a service used for web animation, similar to Adobe Flash. The plugin is being used by more than 40 million people in USA alone, so the impact of this threat is high. Users are advised to take better Internet security measures and safeguard themselves against such attacks. A fix/patch is already released and all that needs to be done is an update.
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoData.Network Vertical Generative Ai. Empower Yourself. Access Here.
- PlatoAiStream. Web3 Intelligence. Knowledge Amplified. Access Here.
- PlatoESG. Carbon, CleanTech, Energy, Environment, Solar, Waste Management. Access Here.
- PlatoHealth. Biotech and Clinical Trials Intelligence. Access Here.
- Source: https://blog.comodo.com/pc-security/watch-your-plugins-silverlight-at-risk/
- :has
- :is
- 225
- 33
- 40
- a
- active
- Adobe
- advised
- against
- All
- allow
- alone
- already
- an
- and
- animation
- ARE
- AS
- At
- attack
- Attacks
- based
- BE
- been
- being
- Better
- Black
- Blog
- breach
- browser
- by
- CAN
- click
- computers
- Concern
- control
- Counter
- designed
- developed
- developing
- doing
- done
- Earlier
- Environment
- Ether (ETH)
- Event
- Exploit
- few
- Flash
- For
- found
- Free
- Gain
- get
- Goals
- Group
- hacking
- had
- Have
- High
- HTTPS
- identifying
- if
- Impact
- in
- Including
- innocent
- instant
- Internet
- Internet Security
- into
- IT
- Java
- kit
- known
- legitimate
- lucrative
- malware
- Market
- May..
- measures
- Microsoft
- million
- more
- most
- needed
- needs
- never
- notorious
- nt
- of
- over
- participants
- past
- People
- PHP
- plato
- Plato Data Intelligence
- PlatoData
- player
- plugin
- potential
- Programs
- proof
- purpose
- Reader
- recently
- released
- remote
- REST
- Risk
- Run
- scorecard
- security
- send
- Series
- serious
- service
- similar
- So
- Software
- some
- such
- system
- Take
- targeting
- than
- that
- The
- themselves
- There.
- this
- threat
- time
- to
- tool
- tools
- Update
- updated
- USA
- used
- users
- using
- very
- victims
- Vulnerabilities
- vulnerability
- warning
- we
- web
- web browser
- WELL
- which
- will
- Work
- years
- Your
- zephyrnet