We put in a lot of effort to keep our clients safe from online security threats. Key loggers, which record you as you enter your login information, or DDoS (Distributed Denial of Service) attacks, which flood a service with fake traffic, causing it to crash, are two examples.
As part of our service, we always advise our clients to install critical security software updates as soon as they are available, and we handle that process for them.
However, if you visit a website that requires you to install an Adobe Flash update… STOP!
Flash itself was decommissioned in 2020 and is no longer supported, so any Flash update messages should be regarded as a security risk.
Fake Flash messages are currently being used as a cover for a new ‘botnet’ campaign that installs a malicious browser extension known as Cloud9. You could be a target if you use Google Chrome or Microsoft Edge.
A botnet is a collection of infected devices that work together to steal sensitive data, send spam, or perform DDoS attacks without the owners’ knowledge.
Worse, if not stopped in time, the Cloud9 botnet will attempt to install additional malware on your device or network.
This type of attack is difficult to detect because it appears to be a genuine request, and anyone can become a victim.
However, there are steps you can take to safeguard your company.
To begin, make everyone aware of the danger. If your employees know what to look for, they are less likely to install the update in the first place.
Next, ensure that everyone is using the most recent version of their browser and that their security software is up to date.
Finally, in your browser’s Privacy and Security settings, enable Enhanced Protection. This will alert you if you come across a potentially dangerous website or download.
We can assist you in keeping your company safe from cyber criminals. Just get in touch.