Car Hacking: More likely to be done by a mechanic than by a hacker
infosec

Car Hacking: More likely to be done by a mechanic than by a hacker

When we talk about car hacking, it comes to mind a hacker who gets remote access to the car system ...
Read More
infosec

Sri Lanka: Blocks access to social media

The government of Sri Lanka has temporarily blocked access to various social media services following deadly explosions that erupted ...
Read More
infosec tweaks

How to hack networks with Wi-Fi passwords

Probably you have a Wi-Fi network in your home or stay close to one (or more) that appears in ...
Read More
infosec tweaks

What is Social Engineering, what are its techniques and how to protect yourself?

Social Engineering is the term used for a wide range of malicious activities that are accomplished through human interactions. Uses the ...
Read More
infosec tweaks

Cryptocurrency: Ways to Enhance Your Privacy

Privacy and privacy on the internet are of great importance. It is not enough to take one or two measures to protect ...
Read More
Latest Posts

Adobe Flash Update Popups may hide cryptominers

FlashAdobe Flash is known to be often a point of vulnerability and notorious hackers they exploit it from time to time. The use of fake Adobe Flash update popups on websites is another common way of attack.

Following a similar line, a recent type of fictitious Flash update, was revealed by a security researcher of the Palo Alto Networks 42 team. Unlike previous badly designed malware programs that have been discovered, this comes with an extra way of cheating.

Since cryptominers are the most relevant malware category, this false update of Flash installs a cryptominer XMRig. As a result, your computer's processing power continues to be used in the background to extract free digital coins.

The survey identified 113 examples of malware malware from March of 2018 with executable Windows files that started with AdobeFlashPlayer_. While 77 contained malware with a CoinMiner tag, the other samples had other labels.

"Windows provided a standard warning for an unknown publisher, where victims can easily click on vulnerable Windows hosts," the report said.

It is worth noting that the traffic traffic created during the infection process contains mainly Flash update. However, soon the cryptominer begins to generate traffic associated with XMRig cryptocurrency mining.

With the help of update traffic and Adobe popup, this malware tries hard to cheat users. However, if a system has good web filtering, malware could easily be detected.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *