Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trojanized Game Installer deploys cryptocurrency miners with massive stardobry attacks
Identity

Trojanized Game Installer deploys cryptocurrency miners with massive stardobry attacks

userBy userFebruary 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 19, 2025Hacker NewsWindows Security/Malware

Users keeping an eye on popular games have been invited to download a troiler installer that led to the deployment of cryptocurrency miners on compromised Windows hosts.

The large-scale activity is called Starydobry by the Russian cybersecurity company Kaspersky, which first detected on December 31, 2024. It lasted for a month.

The campaign’s goals include individuals and businesses around the world, with Kaspersky’s telemetry finding higher infection concentrations in Russia, Brazil, Germany, Belarus and Kazakhstan.

“This approach helped threat actors make the most of miners’ implants by targeting powerful gaming machines that can maintain mining activities,” says researchers Tatyana Shishkova and Kirill Korchemny said in an analysis released Tuesday.

Cybersecurity

Xmrig Cryptocurrency Miner Campaign employs popular simulators and physics games such as Beamng.Drive, Garry’s Mod, Dyson Sphere program, Universe Sandbox, and Plutocracy as lures to launch sophisticated attack chains.

This includes uploading addictive game installers set up on various torrent sites using Inno setups in September 2024, with the unidentified threat actors behind the campaign carefully planning the attacks. It shows that.

Users who end up downloading these releases, also known as “repacks,” will be provided with an installer screen to encourage them to proceed with the setup process.

The DLL file only continues running after performing a series of checks to determine whether it is running in a debug or sandbox environment. This is a demonstration of highly evasive behavior.

After that, vote for various sites like api.myip [.]com, ip-api [.]com, and ipwho [.]It involves obtaining the user’s IP address and estimating its location. If this step fails, the country will default to China or Belarus for reasons that are not entirely clear.

The next step is to collect the machine’s fingerprints, decrypt another executable file (“MTX64.EXE”), and write its content to a file on a disk named “windows.graphics.thumbnailhandler.dll”. %\sysnative folder.

MTX64 gains its own gain by modifying the Windows Shell Extension thumbnail handler functionality to load the next step-by-step payload, based on a legitimate open source project called Epubshelxthumbnailhandler.

The blob will be written to disk with the name “unix.directory.iconhandler.dll” in the folder %appdata\roaming\microsoft\currents\%installdate%\, as in the previous step.

The newly created DLL is configured to retrieve the final stage binaries from the remote server responsible for running minor implants, and continuously check taskmgr.exe and procmon.exe in the list of running processes. . If any of the processes are detected, the artifact will immediately terminate.

Cybersecurity

Minor is a slightly tuned version of Xmrig that uses a pre-defined command line to start the mining process on a machine using a CPU with eight or more cores.

“If it’s below 8, the miners won’t start,” the researcher said. “In addition, instead of using what’s publicly available, the attacker chose to host a mining pool server on his infrastructure.”

“Xmrig analyzes command lines built using built-in features. The miners use the same methods as the previous stage to check the process monitors running on the system. I’ll also create a thread.”

Starydobry is still not undertaken given the lack of indicators that can be linked to known Crimeware actors. However, the presence of Russian strings in the sample implies the possibility of a threatening Russian-speaking actor.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMan who threw a pipe bomb on Japanese former PM Kishida in prison for 10 years | Politics News
Next Article What does 3D observation reveal about the Xplanet atmosphere?
user
  • Website

Related Posts

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025

A critical sudo vulnerability allows local users to gain root access to Linux and affect major distributions

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

AI Agent may be leaking data – Watch this webinar and learn how to stop it

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.