Hackers used rigged PDFs to hit Google -- and Adobe, says researcher
Adobe confirms attack against its network linked to Google's
Computerworld - Adobe today confirmed that the cyberattack that hit its corporate network earlier this month was connected to the large-scale attacks Google cited yesterday as one reason it might abandon China.
Meanwhile, some researchers have hinted, and others have claimed, that the attacks against both Google and Adobe were based on malicious PDFs that exploited a just-patched vulnerability in Adobe's popular Reader software.
Adobe is the first company to step forward after Google announced yesterday that the attacks were aimed at accessing Gmail accounts of human rights activists.
"We are still in the process of conducting our investigation into the incident," said Wiebke Lips, Adobe's senior manager of corporate communications, in an e-mail reply to questions today. "[But] It appears that this incident and the one Google announced earlier are related."
Yesterday, Google and Adobe acknowledged that their company systems had been struck by what both firms characterized as "sophisticated" attacks. Google added that it believed the attacks against its network, which took place last month, originated in China.
Google claimed that some of its intellectual property was stolen in the attack, and added that another aim of the assault was to access the Gmail accounts of Chinese human-rights activists. The California-based search firm cited the latter, as well as ever-more-restrictive rules ordered by the Chinese government, in its decision to review its business in the country.
If the Chinese do not allow Google to run its Chinese search engine unfiltered, the company may pull out of the lucrative market.
Adobe also admitted yesterday that it had been targeted by attackers. "Adobe became aware on January 2, 2010 of a computer security incident involving a sophisticated, coordinated attack against corporate network systems managed by Adobe and other companies," the company said in a Tuesday statement posted on its company blog. "At this time, we have no evidence to indicate that any sensitive information -- including customer, financial, employee or any other sensitive data -- has been compromised."
Security researchers hinted earlier today that the attacks against Google, Adobe and dozens of other major firms were conducted using malicious PDFs that exploited one or more vulnerabilities in Adobe Reader. Analysts at Verisign's iDefense security group told Robert McMillan of IDGNews today that hackers had launched targeted attacks using a malicious document attached to e-mail messages.
While iDefense did not identify rogue PDFs as the malformed documents, its researchers claimed that the attachments exploited a "zero-day" -- a vulnerability that had not yet been patched -- in a "one of the major document types," a definition that certainly fits Adobe's PDF format.
Only yesterday did Adobe patch a zero-day in Reader. The bug had been publicly known since mid-December, and used surreptitiously by hackers for at least several weeks before that.
Web giants attacked
- White House orders security review in wake of WikiLeaks disclosure
- Leaked U.S. document links China to Google attack
- Update: Researchers track cyber-espionage ring to China
- Google, China now playing cat and mouse?
- McAfee: 'Amateur' malware not used in Google attacks
- Military warns of 'increasingly active' cyber-threat from China
- China: Google 'totally wrong' to stop censoring
- Update: Google stops censoring in China
- Google's China ad partners wait in 'incomparable pain'
- Google may soon leave China, reports say
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts