Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned October 15, 2018

<> Embed

@  Email

Report

Uploaded by user
Fake Flash updates upgrade software, but install crypto-mining malware
<> Embed @  Email Report

Fake Flash updates upgrade software, but install crypto-mining malware

Imad Khan, @imad

October 13, 2018
 
Fake Flash updates upgrade software, but install crypto-mining malware | DeviceDaily.com
 

According to cybersecurity firm Palo Alto Networks, it discovered a fake Flash updater that has been duping conscientious computer users since August. The fake updater installs files to sneak a cryptocurrency mining bot called XMRig, which mines for Monero.

But here’s the catch, while the fake updater is installing the XMRig malware, it’s also updating the user’s Flash.

The researchers were searching the internet for fake Flash updates, and found Windows executable files starting with AdobeFlashPlayer. The team found 113 examples of malware meeting their search criteria. The team ran tests on Windows 7 Service Pack 1 and found that the operating system did present a warning about downloading software from unknown publishers, meaning the hackers weren’t waltzing right through. But given how legitimate the malware looks, it’s possible that victims would have clicked yes and proceeded with the installation regardless.

During the crypto boom late last year, it wasn’t just hackers trying to subvert citizen computers for financial gain, so were websites. Certain Starbucks websites and The Pirate Bay were found to be feeding off the processing power of its users to make some extra crypto on the side. And whenever there’s money to be made, bad actors will try and find dubious ways to scam people for cash.

Engadget RSS Feed

(16)