{"id":13576,"date":"2018-10-13T10:45:04","date_gmt":"2018-10-13T18:45:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/10\/13\/news-7343\/"},"modified":"2018-10-13T10:45:04","modified_gmt":"2018-10-13T18:45:04","slug":"news-7343","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/13\/news-7343\/","title":{"rendered":"Fake Adobe Flash Installers Come With a Little Malware Bonus"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bc0d89af0a2b52cdedc1c4f\/master\/pass\/flash_bitcoin_mining-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 12 Oct 2018 21:11:34 +0000<\/strong><\/p>\n<p><span class=\"lede\">The good news: <\/span>A recent scourge of fake Adobe installers really does provide an update to the latest version of Flash. The bad news: It <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-cryptocurrency-mining-browser\/\">places cryptomining malware<\/a> on your machine too.<\/p>\n<p class=\"paywall\">Researchers at Palo Alto Networks <a href=\"https:\/\/researchcenter.paloaltonetworks.com\/2018\/10\/unit42-fake-flash-updaters-push-cryptocurrency-miners\/\" target=\"_blank\">warned this week<\/a> of the latest evolution in both cryptojacking and fake Flash updates\u2014two popular forms of cyber malfeasance united in one unpleasant parcel. Over the past several months, the researchers have found 113 of these fake updaters, which deposit a cryptocurrency miner called XMRig on the affected device.<\/p>\n<p class=\"paywall\">Once in place, XMRig works quietly in the background, leeching your computer&#x27;s resources to <a href=\"https:\/\/www.wired.com\/2017\/01\/monero-drug-dealers-cryptocurrency-choice-fire\/\">generate Monero<\/a>, a popular privacy-focused cryptocurrency. What makes this attack especially curious, though, is that it bothers to place the actual Flash update on the device as well. Which is considerate, but also just plain practical, from a cryptojacking perspective.<\/p>\n<p class=\"paywall\">&quot;It&#x27;s likely to make the user think that nothing had gone wrong,&quot; says Ryan Olson, vice president of threat intelligence at Palo Alto Networks&#x27; Unit 42. &quot;Performing the update, and making the user think nothing bad had happened, goes hand in hand with the cryptomining business model. With an attack like ransomware, you&#x27;re going to be in the user&#x27;s face. Within a few minutes, you&#x27;re going to have their files, you&#x27;re going to have a pop-up saying, &#x27;Hey, I stole your data, you need to pay me money.&#x27; But with cryptomining, you want that computer to keep running your software as long as possible.&quot;<\/p>\n<p class=\"paywall\">Think of it like a parasite that needs to keep its host alive. Gross! Palo Alto Networks says that victims, in this case, were tricked into clicking a phony URL; your best bet to stay safe may be, as always, to mind your browsing.<\/p>\n<p class=\"paywall\">It&#x27;s unclear how many users were affected by this particular effort. Beyond the 113 instances Palo Alto Networks found, Olson says they don&#x27;t know how many people globally might have encountered or run the impostor installers.<\/p>\n<p class=\"paywall\">Cryptojacking generally has become quite a scourge. It has <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-has-gotten-out-of-control\/\">run rampant on all corners<\/a> of the internet, <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-critical-infrastructure\/\">threatening even critical infrastructure<\/a>. Recent <a href=\"https:\/\/thenextweb.com\/hardfork\/2018\/08\/14\/coinhive-mining-monero-profits\/\" target=\"_blank\">research suggested<\/a> that $250,000 of Monero was generated by cryptomining software Coinhive alone.<\/p>\n<p class=\"paywall\">Not all cryptomining necessarily comes with bad intentions; some sites <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/02\/salon-to-ad-blockers-can-we-use-your-browser-to-mine-cryptocurrency\/\" target=\"_blank\">have deployed it<\/a> as a way to generate revenue. But instances of voluntary cryptomining pale in comparison to the covert sort that chews up CPU power\u2014like the kind Palo Alto Networks discovered.<\/p>\n<p class=\"paywall\">Without knowing how many people were fooled, it&#x27;s hard to quantify the impact. It is serious in that it&#x27;s an extension of the broader trend of cryptojacking, which doesn&#x27;t seem to be abating. And if you&#x27;re someone who was affected by this, your computer is likely taking a pretty serious performance hit right now.<\/p>\n<p class=\"paywall\">In the broader scheme of things, though? Not that serious. In fact, given <a href=\"https:\/\/www.wired.com\/2015\/07\/adobe-flash-player-die\/\">how buggy and vulnerability-ridden Flash has been<\/a> for, well, years, the fact that this fake installer actually keeps it up to date is about as big a silver lining as we&#x27;re going to get.<\/p>\n<p class=\"related-cne-video-component__dek\">Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a wide range of attacks including live streaming from the device, wirelessly tampering with and even deleting video files. Read the full story at WIRED.com https:\/\/www.wired.com\/story\/police-body-camera-vulnerabilities\/<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/fake-adobe-flash-installers-cryptomining-malware-bonus\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bc0d89af0a2b52cdedc1c4f\/master\/pass\/flash_bitcoin_mining-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Fri, 12 Oct 2018 21:11:34 +0000<\/strong><\/p>\n<p>A clever new cryptomining scheme downloads the latest version of Adobe for you, but adds malware to the bargain.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13576","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13576"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13576\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}