Adobe Flash Being Used For Cryptojacking

Published on by Cryptoslate | Published on

Cybersecurity software company Palo Alto Networks reports that miners looking to use your computer to expand their hashing power are getting sneakier.

New fake Adobe updates are circulating that will actually update the plugin on your computer, but also install illicit mining malware.

As in other instances of illicit mining, the hackers are going after Monero, who's mandatory privacy protocol makes it extremely hard to trace.

The fake installer updates Adobe Flash on the victim's computer while installing XMRig in the background.

The hidden program then uses the host computer's processing power and graphics card to mine Monero without them knowing.

Flash has long been a favorite method for installing malware on the systems of unsuspecting users, which, along with updates to the web like HTML5 meaning Flash use is on the decline, probably contributed to Adobe's decision to kill it in 2020.The Problem of Illicit Mining Malware ContinuesIllicit mining has grown exponentially this year, as stated in a report released by the Cyber Threat Alliance last month.

Once in, they install similar hidden malware that hijacks a computer into their mining network.

CTA Chief Analytical Officer Neil Jenkins stated that cryptojacking is the "Canary in the coal mine" of attacks because bad actors could exploit the same vulnerabilities used in cryptojacking for even more nefarious purposes.

"Illicit cryptocurrency mining is the figurative canary in the coal mine, warning you of much larger problems ahead. CTA members recount case after case of being called into an incident response for a mining infection and finding signs of multiple threat actors in the network."

Unit 42 investigates a recent Fake Flash update pushing cryptocurrency mining software.

x