Adobe Flash users have been under attack from cybercriminals again, this time courtesy of a zero day exploit kit by the name of Angler. The exploit kit has been readily available on the dark market, and hits vulnerabilities to be found in Flash Players up to 184.108.40.206, as well as the latest release.
There is some uncertainty as to who is at risk from this kit, with some sources claiming Windows 8.1 and Google Chrome users are safe, while others tell me any version of Internet Explorer used with any version of Windows is at risk if Adobe Flash player 220.127.116.117 is installed and enabled.
It's best to assume, therefore, that if you are an Adobe Flash user you are at risk. Adobe has issued an emergency patch for the Angler exploit under CVE-2015-0310 which covers vulnerabilities in the older versions, and a patch for the version 18.104.22.1687 exploit should be available in the coming week.
Adobe recommends users update their product installations to the latest versions:
Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 22.214.171.1247.
Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 126.96.36.1992.
Users of Adobe Flash Player for Linux should update to Adobe Flash Player 188.8.131.528.
Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 184.108.40.2067.