A new research from cyber security company Palo Alto Networks reports signs of crypto-miner malware in the fake Adobe Flash updates.
Although not a new hacking tactic, the latest analysis shows a significant spike in Adobe Flash updaters which can go on and hide in the background and do damage to Windows systems.
Cryptojacking occurs when an attacker uses a malicious software program to gain access to another user’s computer. Instead of stealing credit card data or passwords, the hacker’s goal is to take control of the device and redirect the machine’s computing power to mine cryptocurrency.
However, this latest iteration is proving to be noticeably more efficient. The implication of this unpleasant scenario is that a potential victim may not notice anything out of the ordinary while an XMRig cryptocurrency miner or other unwanted program is quietly running in the background of the victim’s Windows computer.
The fake updates are delivered to victims via web pop-up windows and use authentic-looking branding to...
Read More:
https://news.bitzamp.com/hackers-hides-cryptojacking-malware-in-fake-adobe-flash-updates/