Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Fake "Flash Player Pro" update delivers password-stealing trojan

Fake "Flash Player Pro" update delivers password-stealing trojan

2015/03/06

Help Net Security - (International) Security researchers at F-Secure discovered a new malware campaign in which users with previously compromised routers and domain name system (DNS) server settings are being targeted with fake Adobe Flash Player Pro installation notifications that contain the Fareit trojan, allowing attackers to steal passwords and download other malware onto the infected system.

Source: http://www.net-security.org/malware_news.php?id=2982

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:37