The Adobe Flash update may contain malware that digs encrypted money
A fake Adobe update package containing new pre-encrypted malware was discovered by researchers from security firm Palo Alto Networks. This counter installed a valid Adobe Flash version that hides a bot called XMRig that is used to exploit Monero pre-coding.
A fake Adobe update package containing new pre-encrypted malware was discovered by researchers from security firm Palo Alto Networks. This counter installed a valid Adobe Flash version that hides a bot called XMRig that is used to exploit Monero pre-coding.
The fact that a valid Adobe Flash update is actually installed in this malicious file makes it easy for people to mislead users and take advantage of their device to exploit encryption.
The researchers discovered 113 cases of fake AdobeFlashPlayer files and believed users were directed to these files through fake URL links. After the user accesses the URL link and installs a valid Flash update, the XMRig bot will connect to a coin Monero digging pool, and start working.
Queries to a pool of Monero encrypted coins.
Malware infected devices will operate at full capacity to exploit pre-coding. The exploited Monero coins will be directed to the address of a single e-wallet.
The electronic wallet address is transferred to Monero coins.
According to researchers, this fake Adobe update has just been available since early August.
The emergence of exploits of pre-encrypted and cryptojacking malware is no longer a new phenomenon, but fraudsters through pre-coding are proving their creativity.
Currently, Adobe has yet to give any feedback on this incident.
How to protect your computer against malware digging virtual money
- Install antivirus and system protection software, update regularly to promptly detect and prevent malware from entering your computer.
- Carefully check the origin and file name of the updated popup. Do not install if you find them unreliable.
- Pay attention to unusual changes on your computer such as a system that slows down abruptly, uses more resources than usual .
- Download all genuine and reputable web software.
How to handle when the computer is infected with virtual code, you can follow in the article "What to do when the computer is infected with the virus to protect virtual money?".
See more:
- How to identify a link is safe?
- Warning, the botnet campaign called GhostDNS is taking over more than 100000 routers
- Smartphone can also be exploited by hackers to dig virtual money illegally
You should read it
- How to Update Adobe Flash Player
- Instructions on how to install Adobe Flash Player on your computer
- What is Cryptojacking and how to combat this malware?
- What is Adobe Animate? Overview of Adobe Animate
- Journey from the face of the Internet to the stepchild is forgotten
- How to install Adobe Flash Player on CentOS 8
- How to completely remove Adobe Flash on a Mac
- What is Adobe AIR? Overview of Adobe AIR
- How to check the Adobe Flash Player version in the browser
- Adobe XD 45.0.0 (48027)/45.1 - Download Adobe XD 45.0.0 here
- Adobe said goodbye to Flash Media Player by 2020
- How to use Adobe Flash after it was discontinued
Maybe you are interested
Why are there such strange names as Dead Sea, Black Sea, Red Sea? How to quickly check the laptop screen for any damaged pixels? Cause the phone is constantly powered off and the way to fix it Change the look of VLC program How to change your Facebook location How to change Snapchat password on phone and computer