Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 6 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Adobe suffers attack with 40GB of source code stolen and 2.9 million users affected

by The Gurus
September 8, 2020
in Editor's News
Share on FacebookShare on Twitter

Adobe has suffered its second targeted attack in a year, investigating the illegal access of source code for Adobe Acrobat, ColdFusion, ColdFusion Builder and other Adobe products by an unauthorised third party.

After a discovery by security blogger Brian Krebs of 40GB of source code, which appeared to be uncompiled and complied code for ColdFusion and Adobe Acrobat, Adobe confirmed that it has been working on an investigation into a potentially broad-ranging breach into its networks since 17th September.
Adobe said it believed that the attack took place in mid-August and credit card and other data on approximately 2.9 million customers was taken, as well as an as-yet-undetermined number of user names and passwords that customers use to access various parts of the Adobe customer network.
Adobe issued a statement saying that it was “not aware of any zero-day exploits targeting any Adobe products” but recommended users run only supported versions of the software, apply all available security updates, and follow the advice in the Acrobat Enterprise Toolkit and the ColdFusion Lockdown Guide. “These steps are intended to help mitigate attacks targeting older, unpatched, or improperly configured deployments of Adobe products,” it said.
Adobe’s chief security officer Brad Arkin thanked Krebs for helping “steer our investigation in a new direction” and said the company has undertaken a rigorous review of the ColdFusion code shipped since the code archive was compromised, and that it is confident that the source code for ColdFusion code that shipped following the incident “maintained its integrity”.

In a statement on the Adobe website, Arkin said that its security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well as source code for numerous Adobe products, and it deeply regretted that this incident occurred.

As a precaution, it is resetting all relevant customer passwords to help prevent unauthorised access to Adobe ID accounts, and notifying customers whose credit or debit card information it believed to be involved in the incident.
“We value the trust of our customers. We will work aggressively to prevent these types of events from occurring in the future. Again, we deeply regret any inconvenience this may cause you,” Arkin said.
In September 2012, Adobe announced that it was the victim of a targeted attack that accessed an internal server and affected its digital certificate code signing infrastructure. It became aware of the attack after it received two malicious utilities that appeared to be digitally signed using a valid Adobe code signing certificate. This led it decommission the existing Adobe code signing infrastructure and revoke all software code signed after 10th July 2012
FacebookTweetLinkedIn
ShareTweet
Previous Post

FBI: Anonymous has been exploiting Adobe flaws in year-long, ongoing assault on US government sites

Next Post

'i2Ninja' Malware Kit Using I2P for Anonymity

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information