Hackers exploit Adobe Flash, IE browser to target porn surfers : The Tribune India

Christel Deskins

San Francisco, September 13 A hacker group is targeting porn surfers running vulnerable and older versions of Adobe Flash Player and Internet Explorer (IE) on their computers as the attackers have infected “practically all adult networks” with malware on the web. The hacking group dubbed Malsmoke has infected popular porn […]

San Francisco, September 13

A hacker group is targeting porn surfers running vulnerable and older versions of Adobe Flash Player and Internet Explorer (IE) on their computers as the attackers have infected “practically all adult networks” with malware on the web.

The hacking group dubbed Malsmoke has infected popular porn sites with malicious ads, using them to attack victims with malware, according to researchers from the cyber security firm Malwarebytes.

Most exploit kits are built around vulnerabilities in Adobe Flash and Internet Explorer as most internet users have now either uninstalled Flash or moved to Google Chrome and Mozilla Firefox.

“Despite recommendations from Microsoft and security professionals, we can only witness that there are still a number of users (consumer and enterprise) worldwide that have yet to migrate to a modern and fully supported browser,” Malwarebytes said in its report.

Once a victim clicks a malicious ad, they are redirected to a page that attempts to start downloading malware if it can exploit vulnerabilities in Internet Explorer or Adobe Flash.

Microsoft has announced to end support for Adobe Flash Player on Microsoft Edge and Internet Explorer 11 at the end of 2020.

There are no security updates available for Adobe’s Flash Player. The last time Adobe Flash got a security update was in June this year.

Microsoft 365 apps and services will no longer support Internet Explorer 11 (IE 11) by August 17 next year, the company has announced as it pushes people to install revamped Chromium-based Edge browser.

According to ZDNet, the role of the hacker group’s malicious ads was to use “JavaScript trickery and redirect users from the adult portal to a malicious site that was hosting an exploit kit”.

The exploit kits would then use vulnerabilities in Adobe Flash Player or Internet Explorer to install malware on the user’s computers, with the most common payloads being “Smoke Loader, Raccoon Stealer, and ZLoader”. IANS

Source Article

Next Post

Nanopore Technology Market 2020 | Research Report, Global Industry Analysis, Growth, Key Players, Latest Trends by 2026

The MarketWatch News Department was not involved in the creation of this content. Sep 23, 2020 (The Expresswire) — Recent technological advancements in digital healthcare devices and equipment is expected to drive the global nanopore technologies market. The emergence of digitalization has transformed the nanopore technologies. In the process of […]