IT researchers have recently identified a cryptojacking malware that is coded in a fake Adobe Flash update.
A report on cyber security released bu Unit 42- Pablo Alto Network’s threat intelligence team, unveiled that the malware surreptitiously forces computers to mine Monero (XMR) by installing an “XMRig cryptocurrency miner.”
Cryptojacking is identified as the practice of using a computer’s processing power to mine for cryptocurrencies without the consent or knowledge of the computer’s owner.
Reports refer to that the new malware is classified as “particularly harmful”, as the developers have copied the pop-up notification from an official Adobe installer.
Furthermore, the download really does update targets’ computers with the latest version of Flash, while planting itself in the computer at a time.
“In most cases, fake Flash updates pushing malware are not very stealthy… but in this instance, because of the latest Flash update, a potential victim may not notice anything out of the ordinary.”, stated Brad Duncan- analyst from Unit 42.
The IT team reportedly disconvered the strain while searching for “popular” fake Flash updates using AutoFocus, reporting: “77.. malware samples are identified with a CoinMiner tag in AutoFocus.The remaining 36 samples share other tags with those 77 CoinMiner-related executables.”
5% of Monero Minings Used Cryptojacking
In a similar context, the news reported yesterday that Iran’s cybersecurity authority issued a report that claimed the highest number of recorded incidents of Coinhive infection was identified to have been in Brazil; the India follows in the second place, while Indonesia comes third.
It is worth mentioning that in September, cryptojacking malware reports were said to have surged almost 500 percent in 2018, where estimations in June disclosed that around 5 percent of the total circulating Monero supply was mined using malware.