Friday, April 4, 2025

Top 5 This Week

Related News

2,000 Russian Users Are Infected by SilentCryptoMiner Using False VPN Tools

As hackers use the so-called SilentCryptoMiner, a cryptocurrency miner that poses as a genuine internet bypass tool, over 2,000 users have been infected through seemingly innocuous archives and installation instructions that advise victims to turn off their security software, leaving their systems vulnerable to ongoing, covert threats.

This is part of a new wave of cyberattacks that are sweeping through Russia.

Disguised as a legitimate bypass tool

The virus campaign takes advantage of consumers’ need to get around internet limitations. The SilentCryptoMiner is included by attackers in archives that are marketed as deep packet inspection (DPI) bypass tools.

These malicious files, which are distributed through well-known YouTube channels with 60,000 followers, trick gullible people into thinking they are installing a secure program made to get around internet barriers. Actually, the miner payload is finally retrieved by a Python-based loader included in the archive.

Under the hood: attack methodology and evasion tactics

Kaspersky cybersecurity researchers claim that the virus makes use of Windows Packet Divert (WPD) capabilities, a method that is becoming more and more popular for disseminating malware that looks like useful software.

By telling victims to turn off their antivirus software due to false positives, the threat actors go one step further and strengthen their control on the machine. Before starting the miner, the loader first configures Windows Defender exclusions and looks for sandbox environments.

In order to achieve an inflated size of 690 MB, the payload itself—which is based on the open-source miner XMRig—is padded with random data, making it more difficult for traditional antivirus software to automatically analyze it. Additionally, the malware maintains its invisibility and may be remotely managed via a web interface by inserting the miner code into genuine system processes, such as dwm.exe, utilizing process hollowing techniques.

Implications and the broader cybersecurity threat

This campaign serves as both a worrying example of changing cybercriminal tactics and a case study of technological brilliance. Such assaults may open the door for additional exploitation, such as the use of remote access tools (RATs) and stealers, in addition to bitcoin theft. These actors’ use of layered deception is further demonstrated by their strategy of posing as reliable developers in order to influence content authors.

Why organizations should care

Businesses of all kinds and sectors need to pay attention. This exploit emphasizes how important it is to maintain strong cybersecurity hygiene, particularly when it comes to tracking and removing downloads from unreliable sources.

It’s critical to inform staff members about the risks of turning off security software and carefully examining unsolicited installation instructions. Because cyber risks can now arise from everyday activities rather than being limited to targeted assaults, the SilentCryptoMiner incident emphasizes the need for ongoing attention and preventative defenses.

Also read: Viksit Workforce for a Viksit Bharat

Do Follow: The Mainstream formerly known as CIO News LinkedIn Account | The Mainstream formerly known as CIO News Facebook | The Mainstream formerly known as CIO News Youtube | The Mainstream formerly known as CIO News Twitter

About us:

The Mainstream formerly known as CIO News is a premier platform dedicated to delivering latest news, updates, and insights from the tech industry. With its strong foundation of intellectual property and thought leadership, the platform is well-positioned to stay ahead of the curve and lead conversations about how technology shapes our world. From its early days as CIO News to its rebranding as The Mainstream on November 28, 2024, it has been expanding its global reach, targeting key markets in the Middle East & Africa, ASEAN, the USA, and the UK. The Mainstream is a vision to put technology at the center of every conversation, inspiring professionals and organizations to embrace the future of tech.

 

Popular Articles