• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 18th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

Skype Users Hit By Fake Flash Player Download Malware Scam

April 4th, 2017 Jahanzaib Hassan Malware, Security 0 comments
Skype Users Hit By Fake Flash Player Download Malware Scam
Share on FacebookShare on Twitter

A few days ago Skype users noticed that the instant messaging service served a malicious malware masquerading as fake Flash player update. Several users reported this incident on Twitter and Reddit and explained that they noticed an ad which was prompting them to download a malicious file disguised as “Flash player.”

Wow not bad, got this in @Skype today, even had the download popup! pic.twitter.com/wyQXavBINm

— caseyfoster (@caseyfosterTV) March 30, 2017

On close inspection of the file, Bleeping Computers discovered that the content of the file was nothing more than a handful of malicious javascript code. The so-called “flash player update” was an HTA file (HTML application file) and was designed to execute a PowerShell script to download a payload. The payload could be a JSE (encrypted JavaScript), but because the domain on which the scam was being hosted was down, a copy of the final payload could not be retrieved. The file was probably going to install a Trojan or ransomware on victims devices.

The domains were spreading the malicious “flash player” virus are oyomakaomojiya[.]org and cievubeataporn[.]net, and according to bleeping computers, both are registered with Cock.li email accounts. They further added that the email accounts were used to register plenty of other shady domains were also registered using the same email accounts and obviously with malicious intent.

The IP addresses that are hosting the sites were previously under the radar for similar kind of shady domains, and with some more digging, Bleeping Computers discovered another email account was also being used for the same purpose.

This only concludes one thing: the domains were registered specifically for malvertising and that a group of skilled crooks is behind this massive operation.

One important thing worth mentioning here is that the user who identified the “Fake flash player” had contacted Skype support to inform them about the incident, and the Skype support refused to take the responsibility for this matter. Also, this is not the first time this kind of thing has happened. Malvertising has been increasing rapidly. In 2016 alone, malvertising saw an increase of 132%, and it is expected that the rate will go only upwards if proper measures are not taken very soon.

Image Source: Norebbo/Scott

[newad][/newad]


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • hacking
  • internet
  • Malvertising
  • Malware
  • Ransomware
  • Scam
  • security
  • Skype
  • TROJAN
Facebook Twitter LinkedIn Pinterest
Previous article 6 Best Alternatives for The Pirate Bay
Next article Hackers can take over Smart Dildos and stream videos online
Jahanzaib Hassan

Jahanzaib Hassan

Related Posts
Top Tips to Upscale Your Netflix Security Instantly

Top Tips to Upscale Your Netflix Security Instantly

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

Warning as hackers breach MFA to target cloud services

Warning as hackers breach MFA to target cloud services

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Top Tips to Upscale Your Netflix Security Instantly
Security

Top Tips to Upscale Your Netflix Security Instantly

306
'Child's Play' - Kids breach and bypass Linux Mint screensaver lock
Security

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

1015
Transferring data between smartphones seamlessly
Technology News

Transferring data between smartphones seamlessly

739

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us