Blexfraptor Posted October 14, 2018 Share Posted October 14, 2018 Although cryptocurrencies have been losing importance at a rapid pace, at the end of last year almost all of them reached their maximum historical values. That led to threats of ransomware-type malware and malicious mining tools growing exponentially. Many of these malware threats still remain; the last one that has been discovered promises to be an Adobe Flash update. And in reality, it is a mining software that mani[CENSORED]tes the CPU of our PC to extract Monero. False updates to Adobe Flash have been used for years to trick the user into installing malicious software on their computer. Although Flash is practically dead, users still believe that they need to apply an update on their computers, for example, to continue watching some video content. There are still sites that use Flash for the reproduction of content, but HTML5 -native- is the solution that is already used in platforms such as YouTube, for example, and many other streaming video platforms. Be that as it may, under this pretext they are spreading malware to users since last August. It is not an update of Adobe Flash, but a mining tool that uses the CPU of your PC in a malicious way The truth is that an update of the computer software is applied, but the installation of XMRig is included in the fake Adobe Flash installer; that is to say, that without the user detecting it, a cryptocurrency mining software is being installed on his computer which, as is evident, he has never requested. So, as a result of the installation, you may notice that the computer loses performance because the CPU is working constantly for the mining of Monero. And although Windows warns that the installer comes from an unknown editor, the installer seems legitimate and users accept the installation. To avoid this type of problems, it is best to download installers only from reliable sources and, of course, have an updated antivirus on your computer. If we notice that the work of the CPU is anomalous, we can always review what process is demanding in excess and locate the malicious tool that is mining cryptocurrencies with the CPU of our computer. Link to comment Share on other sites More sharing options...
Recommended Posts