Adobe Flash users have been under attack from cybercriminals again, this time courtesy of a zero day exploit kit by the name of Angler. The exploit kit has been readily available on the dark market, and hits vulnerabilities to be found in Flash Players up to 220.127.116.11, as well as the latest release.
There is some uncertainty as to who is at risk from this kit, with some sources claiming Windows 8.1 and Google Chrome users are safe, while others tell me any version of Internet Explorer used with any version of Windows is at risk if Adobe Flash player 18.104.22.1687 is installed and enabled.
It's best to assume, therefore, that if you are an Adobe Flash user you are at risk. Adobe has issued an emergency patch for the Angler exploit under CVE-2015-0310 which covers vulnerabilities in the older versions, and a patch for the version 22.214.171.1247 exploit should be available in the coming week.
Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 126.96.36.1997.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 188.8.131.522.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 184.108.40.2068.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 220.127.116.117.