Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

Researchers reveal mining operations using ISO lures to spread RATs and crypto miners

The State of Trusted Open Source Report

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers reveal mining operations using ISO lures to spread RATs and crypto miners
Identity

Researchers reveal mining operations using ISO lures to spread RATs and crypto miners

By April 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 2, 2026Cryptomining/Malware

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023.

“Beyond cryptomining, threat actors are monetizing infections through CPA (cost per action) fraud, directing victims to content locker pages under the guise of software registration,” Elastic Security Labs researchers Jia Yu Chan, Cyril François, and Remco Sprooten said in an analysis published this week.

The recent campaign also distributed a previously undocumented .NET implant codenamed CNB Bot. These attacks leverage ISO files as infection vectors and loaders protected by .NET Reactor.[詳細]and[とにかく実行]Click to deliver a text file to users with explicit instructions to bypass Microsoft Defender SmartScreen protection against running unrecognized applications.

The loader is designed to call PowerShell, which is responsible for configuring extensive Microsoft Defender Antivirus exclusions and launching CNB Bot in the background under the radar. At the same time, users receive an error message that says, “Unable to start the application. Your system may not meet the required specifications. Please contact support.”

CNB Bot acts as a loader with the ability to download and execute additional payloads, update itself, and perform uninstall and cleanup actions to cover its tracks. Communicate with a command and control (C2) server using HTTP POST requests.

Other campaigns launched by threat actors utilized similar ISO lures to deploy PureRAT, PureMiner, and custom-built .NET-based XMRig loaders. The final XMRig loader accessed a hardcoded URL to extract the mining configuration and launch the miner payload.

As recently seen in the FAUX#ELEVATE campaign, a legitimate, signed, and vulnerable Windows kernel driver, ‘WinRing0x64.sys’, is exploited to gain kernel-level hardware access and modify CPU settings to increase hash rate, thereby improving performance. The use of this driver has been observed in many cryptojacking campaigns over the years. This feature was added to the XMRig miner in December 2019.

Elastic said it has also identified another campaign leading to the deployment of SilentCryptoMiner. In addition to using direct system calls to evade detection, the miner also takes steps to disable Windows sleep and hibernation modes, set persistence through scheduled tasks, and use the “Winring0.sys” driver to fine-tune the CPU for mining operations.

Another notable component of this attack is the watchdog process that ensures that malicious artifacts and persistence mechanisms are restored if removed. This campaign is estimated to have generated an estimated 27.88 XMR ($9,392) across the four wallets tracked, indicating that this operation is delivering consistent financial returns to the attackers.

“Beyond the C2 infrastructure, the attackers are exploiting GitHub as a payload delivery CDN, hosting staged binaries between two identified accounts,” Elastic said. “This technology moves the download and execution steps from operator-controlled infrastructure to a trusted platform, reducing discovery effort.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe State of Trusted Open Source Report
Next Article Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

Related Posts

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

April 2, 2026

The State of Trusted Open Source Report

April 2, 2026

WhatsApp warns 200 users after spyware was installed on fake iOS app; Italian company faces lawsuit

April 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cisco Patch 9.8 CVSS IMC and SSM flaws allow remote systems to be compromised

Researchers reveal mining operations using ISO lures to spread RATs and crypto miners

The State of Trusted Open Source Report

Chemical recycling process transforms acrylic plastic recovery

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.