(Page 2 of 2)
"Security professionals in organizations around the world should be on high alert for an increase in Acrobat-related attacks as hackers analyze the code for possible zero-day exploits," Titus said.
The Importance of Continuous Monitoring
For his part, Dwayne Menlancon, chief technology officer for IT security software firm Tripwire, said the fact that breach involves source code for creating web content should be concerning for Adobe and its customers, as it may enable the attackers to tamper with others' production web sites.
"Fortunately, Adobe has already published hardening guidelines to help reduce the risk of this happening," he wrote in a blog post. "Adobe has also committed to improving its own products' ability to monitor their own integrity to ensure they haven't been altered."
Menlancon notes that the breach is rumored to have been perpetrated by the same attackers who compromised LexisNexis and a number of other organizations, so they likely used the same techniques. That, he said, means the attackers planted a rogue executable on the targeted systems and used that to create a command and control channel back to the attackers.
"These breaches underscore the importance of continuously monitoring your systems for suspicious changes, verifying any unrecognized programs on your systems, and establishing strong foundational controls so you can tell 'good' from 'bad' in your production environment, and to prepare before something bad happens, rather than after the damage has already been done," he said.
Posted: 2013-10-07 @ 9:09am PT
Rewind 2 years ago, Adobe & McAfee announced a DLP data protection solution.
Adobe should have read: