<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Recently the Italian group Hacking Team was compromised and, according to the attackers, had 400 GB of data stolen.</p> <!--more--><p>While the exact method of compromise has not been published, it was discovered that part of Hacking Teams toolset involved attacks against Adobe Flash, Windows, and iOS devices. While updates for Windows are not available, an update was published for <a href="https://get.adobe.com/flashplayer" target="_blank">Adobe Flash</a>, and we recommend patching, and consider <a href="http://krebsonsecurity.com/2015/06/a-month-without-adobe-flash-player/" target="_blank">removing</a> Adobe Flash from your systems.</p> <p>Related to this, is the Angler Exploit Kit which is using a Flash zero-day exploit to distribute Cryptowall malware. ThreatSTOP's services block the droppers that Angler Exploit Kit uses, and help secure networks from intrusions like this.</p> <p>External links:</p> <ul> <li><a href="https://get.adobe.com/flashplayer" target="_blank">Adobe Flash Player Update</a></li> <li><a href="http://krebsonsecurity.com/2015/06/a-month-without-adobe-flash-player/" target="_blank">Krebs On Security: A Month Without Adobe Flash</a></li> </ul> <p>References:</p> <ul> <li><a href="http://www.theregister.co.uk/2015/07/08/adobe_flash_hacking_team_update/">The Register: Decision Time: Uninstall Adobe Flash or install yet another critical patch</a></li> </ul></span>