Security firm iDefense has withdrawn a comment made earlier about the Google attack.
As published on the SC Magazine website, iDefense head of international cyber intelligence Eli Jellenc claimed that "attackers delivered malicious code used against Google and others using PDFs as email attachments", similar to an attack in July 2009 which employed a PDF file that exploited a zero-day vulnerability in Adobe Reader.
However, in a blog update on the Adobe website, iDefense has issued a statement retracting the comment. It said: “In iDefense's press announcement regarding the recently discovered Silicon Valley compromises, we stated that the attack vector was likely ‘malicious PDF file attachments delivered via email' and suggested that a vulnerability in Adobe Reader appeared to have been exploited in these attacks.
“Upon further review, we are retracting our initial assessment regarding the likely use of Adobe vulnerabilities. There are currently no confirmed instances of a vulnerability in Adobe technologies being used in these attacks. We continue to investigate this issue.”
The retraction follows an update by Adobe, issued on January 14, which confirms that there was "no evidence to suggest Adobe technology was a vector in recent network attacks".
It said: “Media coverage this week has suggested that Adobe software may have been a vector used in the recent attacks against Adobe and other companies. We are continuing our investigation into the incident, but to date, none of the work done by Adobe or any third party has uncovered evidence to indicate that Adobe technology was an attack vector.”
See original article on scmagazineuk.com
iDefense retracts claims made on Adobe's involvement in cyber attacks
No evidence linking Adobe vulnerability to attacks.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers

See everything. Do more.

Lindentech Secures Digital Identity with Zero Trust and Microsoft Entra

Diamond IT Delivers GRC Transformation with Microsoft Purview

Linktech Powers Energy Trader’s Essential Eight Compliance in Just Eight Weeks

Byte Delivers Future-Ready IT: Transforming Endpoint Security and Productivity with a Cloud-First Strategy