Hackers compromise Adobe server, use it to digitally sign malicious files

28.09.2012

It's hard to determine the implications of this incident, because we can't be sure that only the shared samples were signed without authorization, Botezatu said. "If the password dumper application and the open-source SSL library are relatively innocuous, the rogue ISAPI filter can be used for man-in-the-middle attacks - typical attacks that manipulate the traffic from the user to the server and vice-versa, among others," he said.