Adobe Flash users have been under attack from cybercriminals again, this time courtesy of a zero day exploit kit by the name of Angler. The exploit kit has been readily available on the dark market, and hits vulnerabilities to be found in Flash Players up to 15.0.0.223, as well as the latest release.
There is some uncertainty as to who is at risk from this kit, with some sources claiming Windows 8.1 and Google Chrome users are safe, while others tell me any version of Internet Explorer used with any version of Windows is at risk if Adobe Flash player 16.0.0.287 is installed and enabled.
It's best to assume, therefore, that if you are an Adobe Flash user you are at risk. Adobe has issued an emergency patch for the Angler exploit under CVE-2015-0310 which covers vulnerabilities in the older versions, and a patch for the version 16.0.0.287 exploit should be available in the coming week.
Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 16.0.0.287.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.262.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.438.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 16.0.0.287.