Fake Adobe update installing malicious cryptomining malware







Fake Flash updates that push malware have traditionally been easy to spot and avoid, however a new campaign has employed new tricks that download cryptocurrency miners in "stealth" mode on Windows systems. 



The recently discovered campaigns have been active since August, appear to be legitimate, however, they act as Flash updates using standard pop-up notifications from the official Adobe installer, and even actually updating a victim’s Flash Player to the latest version. 



Victims who believe the legitimate Flash update has loaded a "XMRig" cryptocurrency miner is stealthily downloaded and runs in the background of the infected Windows computers.  




Cybersecurity Journalist - Iain Fraser

Gibraltar based Professional Journalist, Accredited Authority Writer, Commentator and Corporate Lecturer on all aspects of AI, Geopolitics, Cybersecurity, Corporate Intelligence, OSINT & Crypto Awareness, Threat Management and Best Practice Compliance & Mitigation. Voted Top 30 Cybersecurity News Websites Globally in 2023 for Information Security by Feedspot #CyberJourno #Scambaiter - Available for Assignments - Articles, Web Content, Guest Blogger

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post