Adobe Flash is known to be often a point of vulnerability and notorious hackers they exploit it from time to time. The use of fake Adobe Flash update popups on websites is another common way of attack.
Following a similar line, a recent type of fictitious Flash update, was revealed by a security researcher of the Palo Alto Networks 42 team. Unlike previous badly designed malware programs that have been discovered, this comes with an extra way of cheating.
Since cryptominers are the most relevant malware category, this false update of Flash installs a cryptominer XMRig. As a result, your computer's processing power continues to be used in the background to extract free digital coins.
The survey identified 113 examples of malware malware from March of 2018 with executable Windows files that started with AdobeFlashPlayer_. While 77 contained malware with a CoinMiner tag, the other samples had other labels.
"Windows provided a standard warning for an unknown publisher, where victims can easily click on vulnerable Windows hosts," the report said.
It is worth noting that the traffic traffic created during the infection process contains mainly Flash update. However, soon the cryptominer begins to generate traffic associated with XMRig cryptocurrency mining.
With the help of update traffic and Adobe popup, this malware tries hard to cheat users. However, if a system has good web filtering, malware could easily be detected.