This attack makes the document without the exploit code, the harder it is to be detected. Remote downloads make it easy for an attacker to use only those vulnerabilities on predefined IP addresses instead of anyone opening the document, making it easy to hide them for long periods of time.
Over the years, security researchers have advised users to remove stand-alone Flash applications and use the default browser to block Flash content. From the recent incident, you should block Flash content in documents, especially from untrusted sources. If you still use Flash, make sure you are using the latest version 30.0.0.113 which can be downloaded here https://get.adobe.com/flashplayer/
See more: