Adobe Flash Player acts as a gateway to hacking malware
Palo Alto Networks, a cybersecurity company, has discovered a false update of the Flash Player. This indicates that scammers hide data mining malware in legitimate Adobe Flash Player updates. It is noteworthy that the fake update program started making its rounds at the beginning of August, but no one was able to track it down.
According to the corporate information security report, hackers introduce malicious files into a virtual data mining bot, XMRig is known for the Monero secret currency (XMR) while installing a legitimate update of Flash Player. According to the Palo Alto Networks researchers, malware directs victims to a counterfeit product adopted via a counterfeit URL. Researchers are still not sure how hackers direct victims to URLs.
When a user downloads a legitimate Flash update, hackers are simultaneously extracting a virtual currency for someone else through their CPU. So, most of the time, users are unaware that their CPU serves as a source for extracting digital currency. When searching for fake updates to Flash Player, the researchers tracked down 113 instances when files preceded "AdobeFlashPlayer" hosted on non-Adobe servers. When the researchers tested a false URL, they found that it seems so genuine that no one suspects any scams or improper play. As for web traffic, the story is completely different.
After downloading the fake URL and installing a legitimate Flash update, the mining bot starts Monero's extraction. The malware uses the victim's infected system to do all the heavy work without offering any prize. Rather, every Monero extracted in this way goes to a single portfolio. Both cryptocurrency and cryptocurrency malware are a common occurrence and the first choice of scammers is the Monero coin.
Widespread problem
Many governments are developing strict rules and regulations to combat the growing increase in fraud and fraud. A few weeks ago, the regulator of the French stock market even included 21 new websites relating to investments in cryptocurrency on the blacklist. Despite all these steps, hackers continue to find a new way to attack cybersecurity.
According to research, every month hackers undermine more than $ 250,000 Monero using illegitimate methods based on a browser. The Monero community came out strongly against the use of XMR by hackers and its involvement in illegitimate scams last month. The working group on Monero's malware response is finding ways to combat these growing Monero-based hacks.
Brad Duncan, analyst of threats to threats from unit 42, encouraged Windows users to exercise more caution when installing Adobe Flash updates. According to Duncan, "Organizations with discrete web filtering and educated users have a much lower risk of infection from these fake updates." McAfee Labs has released a report that reveals that cryptojacking has risen by 86% in the second quarter of this year, up 459% over last year.