Archinect - News 2024-12-22T02:57:40-05:00 https://archinect.com/news/article/150368666/hackers-are-using-architects-computers-for-crypto-mining-cybersecurity-firm-warns Hackers are using architects’ computers for crypto-mining, cybersecurity firm warns Niall Patrick Walsh 2023-09-08T11:09:00-04:00 >2024-10-25T04:07:38-04:00 <img src="https://archinect.gumlet.io/uploads/de/de526c706d44f41cd448a7b65d3b5210.png?fit=crop&auto=compress%2Cformat&enlarge=true&w=1200" border="0" /><p>Cybersecurity firm Cisco Talos <a href="https://blog.talosintelligence.com/cybercriminals-target-graphic-designers-with-gpu-miners/" target="_blank">is warning</a> of the potential for <a href="https://archinect.com/news/tag/730701/cybersecurity" target="_blank">hackers</a> to target architects and other designers with <a href="https://archinect.com/news/tag/1767607/cryptocurrency" target="_blank">crypto-mining</a> malware. The hacking campaign, which has largely targeted French-speaking architects, engineers, and graphic designers, sees the victim&rsquo;s computer infected with malware via installer tools.</p> <p>&ldquo;Cybercriminals are abusing Advanced Installer, a legitimate Windows tool used for creating software packages, to drop cryptocurrency-mining malware on infected machines,&rdquo; Cisco Talos explains.</p> <figure><figure><a href="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&amp;enlarge=true&amp;w=1028" target="_blank"><img src="https://archinect.gumlet.io/uploads/91/91f118ff2a1dfebec9105b9fd6df300d.jpg?auto=compress%2Cformat&amp;enlarge=true&amp;w=514"></a><figcaption>Related on Archinect: <a href="https://archinect.com/news/article/150289975/many-firms-not-capitalizing-on-digital-marketing-or-technology-aia-report-finds" target="_blank">Many firms not capitalizing on digital marketing or technology, AIA report finds</a></figcaption></figure></figure><p>The vulnerability centers on Advanced Installer, a package used in the installations of legitimate software installers such as Adobe Illustrator, Autodesk Revit, and SketchUp. The hackers package such installers with malicious scripts and use Advanced Installer&rsquo;s Custom Actions feature to make the software installers execute the malicious scripts.</p> <p>The resulting malware allows h...</p>