Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign

    By
    Sean Michael Kerner
    -
    October 11, 2018
    Share
    Facebook
    Twitter
    Linkedin
      Palo Alto Networks Fake Flash Updater

      The scourge that is unauthorized cryptocurrency mining, often referred to as cryptojacking, is a phenomenon that has been on the rise in 2018, and it could get even worse.

      A new report from Palo Alto Networks’ Unit 42 research group published on Oct. 11, details a new effort where attackers are masquerading as legitimate Adobe Flash updaters in order to install unauthorized cryptocurrency mining software on victims’ systems. According to Palo Alto Networks, the fake updaters are stealthier than what has been seen before.

      “The fake updaters I tested installed the latest Flash version,” Brad Duncan, threat intelligence analyst for Unit 42 at Palo Alto Networks, told eWEEK.

      What also happens is that alongside the actual Flash update, the fake updater installs the open-source XMRig mining software. XMRig mines the Monero cryptocurrency, which has been a favorite of cryptojacking campaigns.

      Many end-user facing cryptojacking campaigns, however, rely on browser-based mining tools, such as Coinhive. Cryptocurrency mining tools consume CPU (and GPU if present) resources on a host system. A browser-based tool is somewhat limited in the resources it can pull and is typically only active while the browser is open. In contrast, XMRig is installed as a running service on the host operating system, potentially consuming more resources and operating constantly while a system is turned on.

      Duncan said that in his research he found 133 different samples of the Fake Flash updater. What he was not certain of was how many victims there have been to date for the campaign.

      Back in June, the U.S. Federal Trade Commission (FTC) issued a warning about the growing trend of cryptojacking and launched a reporting service for consumers. In research released on June 11 by Palo Alto Networks, the firm estimated that to that point non-browser-based cryptojacking attacks had generated at least $143 million in illicit earnings for attackers.

      The Attack

      In his report, Duncan noted that across the different fake Flash updaters, there were at least 473 different file names and URLs that were observed from the period of March 25 through Sept. 10.

      The download included a legitimate Flash update on first run for some of the samples. Duncan said that subsequent malware samples from this campaign just opened the web browser installer page for Adobe Flash Player after installing the Monero coinminer. 

      “I cannot say if Flash version detection was happening in the background, because I only saw the final result,” Duncan said. “However, different families of malware can profile a system to determine what types of software are on the victim’s host, and consistent URL patterns and file names for these Flash installers indicate they are all the same campaign.”

      Duncan added that other campaigns with a Flash updater theme have deployed cryptocurrency miners, but they have different operating characteristics.

      Remediation

      Adobe announced in July 2017 that it will be discontinuing its Flash Player at the end of 2020. Until then, Flash will likely continue to get updates and users might well continue to see fake updaters as well. For Adobe, Duncan isn’t sure there is much the company can do to stop fake updaters.

      “Traffic from these fake updaters looks the same as legitimate updaters from the server side, so I’m not sure how Adobe could block this,” Duncan said.

      That said, for end users and organizations, there are several things that can be done to block malware and limit the risk of unauthorized cryptocurrency mining. Duncan said that platforms like those from Palo Alto Networks detect fake updaters and malware fairly easily. Regardless of the endpoint security technology that is in place, he emphasized that user education is important. 

      “Only get Flash updates from Adobe and protect against downloads from unknown/untrusted sites,” Duncan said. “One should not install software provided by an unexpected window/web page that appears during routine browsing, no matter how convincing it may seem.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×