Categories: Mining

Fake Adobe Flash Player disguises miner virus

A study from cybersecurity company Palo Alto Networks revealed that fake updates for the Adobe Flash Player mask a virus miner for the Monero cryptocurrency.

A group of experts from Palo Alto Networks revealed that the number of mining viruses created and disguised under the updates of Adobe Flash Player clients has sharply increased grow.

The most common virus hit is pop-ups when a user accepts an agreement to download a given XMRig miner virus program, which uses the computing power of the device to mine Monero coins. It is very difficult for the owner of the device to detect it, all due to the fact that scammers use their miner virus in conjunction with new updates of the Adobe Flash Player itself.

As for antiviruses, they can detect a miner virus only if the system performance is at risk or the device’s processor is in constant operation. any user can independently check the device’s tasks for suspicious programs that draw on system resources. Experts from Palo Alto Networks report that these types of files generally begin with “AdobeFlashPlayer.


The group of experts also reports that the number of such virus miners began to gain popularity sharply in March this year and peaked in September, which is why the company calls for updating its antiviruses and analyzing the functioning of the system. And also experts advise to pay attention to the slow operation of the system, since in most such cases there is a virus on the devices.

Based on the results of the new research German experts, the XMR browser miner is even used very actively today. Reported by Bitcoin.com.

In late summer, it was reported that cybersecurity researchers at Kaspersky Lab were informing that a group of cybercriminals from North Korea created a virus for MacOS, due to which hackers infect exchanges and steal digital assets.

It was also previously reported that the attackers were established a new malicious virus called CryptoCurrency Clipboard Hijackers, the main purpose of this malware is to monitor the Windows clipboard for crypto addresses. If such data is detected, the malware will replace it with fake crypto-addresses of the attackers.

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420