Incident Response, TDR

Adobe investigates clipboard heist

Updated Thursday, Aug. 21 at 2:13 p.m. EST

Adobe said on Tuesday night that it is investigating Flash-based banner advertisements being used to hijack the clipboard program on victim's PCs.

"Adobe is currently investigating potential solutions to this issue and will update customers as soon as we have more information to provide," the company said on its Adobe Product Security Incident Response Team blog.

The attack can occur when users surf to a legitimate website hosting a rogue Flash ad, only to have a malicious URL copied to their clipboard, security experts said. The victims are unable to remove this link, which points to a fake anti-virus product for sale, without killing processes or restarting their computers.

Exploits, first reported on message boards last month, affect all of the major browsers, including Internet Explorer, Safari and Firefox.

Users are advised to deactivate the Flash Player and ActionScript, the programming language of Flash.

Sandi Hardmeier, author of the Spyware Sucks blog, told SCMagazineUS.com on Tuesday that the NoScript add-on in Firefox does not work to prevent against the attack.

A potential alternative is the Flashblock plug-in.

But Giorgio Maone, an Italian software developer, disputed Hardmeier's claims. He told SCMagazineUS.com in an email on Wednesday that NoScript does protect against Flash-based attacks
when set in its default configuration.





Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.