July 9, 2015 By Shane Schick 2 min read

Normally, we expect malware to disable older versions of key applications in order to steal information or take over a victim’s computer, but the latest in a string of problems involving Adobe Flash Player has cybercriminals offering a free update to the browser plugin instead.

As first revealed in a blog post by an independent security researcher known only as Kafeine on Malware don’t need Coffee, the latest version of the Kovter malware has been updating Flash as a sort of competitive tactic against other cybercriminals. The Kovter Trojan typically works by taking over a victim’s machine and clicking on online ads to generate revenue through crooked pay-per-click (PPC) affiliate programs.

In some respects, the real victims here may be advertisers, who don’t realize they’re getting impressions obtained by hijacking computers. As Naked Security noted, click-fraud malware can’t really work if it can’t see online ads properly, which is probably one of the reasons this variant of Kovter proactively updates Flash on the user’s behalf.

On the other hand, ensuring that a machine is using the latest version of the browser plugin could also be a way of guaranteeing rival click-fraud malware authors have a tougher time targeting the same computer later. Komando suggested this isn’t entirely a new tactic; earlier viruses could clean up a machine with their own antivirus tools before stealing information or taking control.

Perhaps the best defense strategy is beating Kovter to the punch by updating Flash first. There are certainly enough reasons by now: Just last week, The Guardian reported that a flaw in the plugin was allowing attackers to embed malware in a video file to take over victims’ computers. Around the same time, cybercriminals were taking advantage of the same flaw in drive-by download attacks using the Magnitude exploit kit.

Computerworld suggested malicious actors are getting much faster at seizing such opportunities, so users need to patch as quickly as possible. And as this latest incident involving Kovter proves, cybercriminals are becoming as interested in one-upping each other as they are using malware to steal data or make money.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today