FireEye security professionals have found that the China-based APT3 persistent threat group has used an unpatched Adobe Flash Player zero-day bug to launch a spear phishing campaign against multiple U.S. industries, FCW reported Monday.
Mark Rockwell writes FireEye identified aerospace, defense, construction, engineering, transportation, high-technology and telecommunication companies as the targets in APT3’s Operation Clandestine Wolf in early June.
The phishing scam has also affected the Agriculture Department and several other federal agencies, according to FCW.
FireEye determined the same hacking group exploited Internet Explorer and Windows code vulnerabilities to conduct attacks last year.
Adobe has released a patch to fix the security flaw in its Flash Player software.