Hacker group Malsmoke exploit Adobe, IE browser to target porn surfers

Microsoft has announced to end support for Adobe Flash Player on Microsoft Edge and Internet Explorer 11 at the end of 2020

hacking, spy
There are no security updates available for Adobe's Flash Player. The last time Adobe Flash got a security update was in June this year.
IANS San Francisco
2 min read Last Updated : Sep 13 2020 | 11:14 AM IST

A hacker group is targeting porn surfers running vulnerable and older versions of Adobe Flash Player and Internet Explorer (IE) on their computers as the attackers have infected "practically all adult networks" with malware on the web.

The hacking group dubbed Malsmoke has infected popular porn sites with malicious ads, using them to attack victims with malware, according to researchers from the cyber security firm Malwarebytes.

Most exploit kits are built around vulnerabilities in Adobe Flash and Internet Explorer as most internet users have now either uninstalled Flash or moved to Google Chrome and Mozilla Firefox.

"Despite recommendations from Microsoft and security professionals, we can only witness that there are still a number of users (consumer and enterprise) worldwide that have yet to migrate to a modern and fully supported browser," Malwarebytes said in its report.

Once a victim clicks a malicious ad, they are redirected to a page that attempts to start downloading malware if it can exploit vulnerabilities in Internet Explorer or Adobe Flash.

Microsoft has announced to end support for Adobe Flash Player on Microsoft Edge and Internet Explorer 11 at the end of 2020.

There are no security updates available for Adobe's Flash Player. The last time Adobe Flash got a security update was in June this year.

Microsoft 365 apps and services will no longer support Internet Explorer 11 (IE 11) by August 17 next year, the company has announced as it pushes people to install revamped Chromium-based Edge browser.

According to ZDNet, the role of the hacker group's malicious ads was to use "JavaScript trickery and redirect users from the adult portal to a malicious site that was hosting an exploit kit".

The exploit kits would then use vulnerabilities in Adobe Flash Player or Internet Explorer to install malware on the user's computers, with the most common payloads being "Smoke Loader, Raccoon Stealer, and ZLoader".

--IANS

na/

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :Adobe IndiaAdobepornHacking

First Published: Sep 13 2020 | 11:07 AM IST

Next Story