Archinect - News2024-12-22T02:57:40-05:00https://archinect.com/news/article/150368666/hackers-are-using-architects-computers-for-crypto-mining-cybersecurity-firm-warns
Hackers are using architects’ computers for crypto-mining, cybersecurity firm warns Niall Patrick Walsh2023-09-08T11:09:00-04:00>2024-10-25T04:07:38-04:00
<img src="https://archinect.gumlet.io/uploads/de/de526c706d44f41cd448a7b65d3b5210.png?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><p>Cybersecurity firm Cisco Talos <a href="https://blog.talosintelligence.com/cybercriminals-target-graphic-designers-with-gpu-miners/" target="_blank">is warning</a> of the potential for <a href="https://archinect.com/news/tag/730701/cybersecurity" target="_blank">hackers</a> to target architects and other designers with <a href="https://archinect.com/news/tag/1767607/cryptocurrency" target="_blank">crypto-mining</a> malware. The hacking campaign, which has largely targeted French-speaking architects, engineers, and graphic designers, sees the victim’s computer infected with malware via installer tools.</p>
<p>“Cybercriminals are abusing Advanced Installer, a legitimate Windows tool used for creating software packages, to drop cryptocurrency-mining malware on infected machines,” Cisco Talos explains.</p>
<figure><figure><a href="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&enlarge=true&w=1028" target="_blank"><img src="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&enlarge=true&w=514"></a><figcaption>Related on Archinect: <a href="https://archinect.com/news/article/150289975/many-firms-not-capitalizing-on-digital-marketing-or-technology-aia-report-finds" target="_blank">Many firms not capitalizing on digital marketing or technology, AIA report finds</a></figcaption></figure></figure><p>The vulnerability centers on Advanced Installer, a package used in the installations of legitimate software installers such as Adobe Illustrator, Autodesk Revit, and SketchUp. The hackers package such installers with malicious scripts and use Advanced Installer’s Custom Actions feature to make the software installers execute the malicious scripts.</p>
<p>The resulting malware allows h...</p>