• Home
  • Analysis
  • Windows tool attacked by hackers adopts cryptocurrency mining malware.
Windows tool attacked by hackers adopts cryptocurrency mining malware.

Windows tool attacked by hackers adopts cryptocurrency mining malware.

Hackers Exploit Windows Tool to Drop Cryptocurrency-Mining Malware

In a recent analysis by Cisco’s Talos Intelligence, it has been revealed that hackers have been utilizing a Windows tool since November 2021 to distribute cryptocurrency-mining malware. The tool being exploited is Windows Advanced Installer, which developers use to package software installers like Adobe Illustrator. By leveraging this tool, the attacker can execute malicious scripts on compromised machines.

Targeting Graphic Designers and 3D Modeling Software Installers

The malware campaign primarily targets software installers used for 3D modeling and graphic design, with a majority of them being written in French. This suggests that victims are likely from various industries, including architecture, engineering, construction, manufacturing, and entertainment in French-speaking countries.

Geographical Impact and Modus Operandi

The attacks mainly affect users in France and Switzerland, but there have also been infections reported in other countries such as the United States, Canada, Algeria, Sweden, Germany, Tunisia, Madagascar, Singapore, and Vietnam. The attacker establishes a backdoor in the victim’s machine using malicious PowerShell and Windows batch scripts, taking advantage of PowerShell’s ability to run in system memory rather than the hard drive, making detection more challenging.

Example of a software installer packaged with malicious scripts using Advanced Installer. Source: Talos Intelligence.

The Payload: Ethereum-Mining Programs

Once the backdoor is installed, the attacker deploys additional threats, including the Ethereum crypto-mining program PhoenixMiner and the multicoin mining threat lolMiner. These programs utilize the GPU capabilities of infected computers.

“These malicious scripts are executed using Advanced Installer’s Custom Action feature, which allows users to predefine custom installation tasks. The final payloads are PhoenixMiner and lolMiner, publicly available miners relying on computers’ GPU capabilities.”

Understanding Cryptojacking and Its Impact

The use of crypto-mining malware, also known as cryptojacking, involves surreptitiously installing mining code on devices without the user’s knowledge or permission. Signs of mining malware include device overheating and decreased performance. This practice of hijacking devices to mine or steal cryptocurrencies is not new and has been observed targeting sectors such as financial services, healthcare, and government.

Hot Take: Protect Yourself from Crypto-Mining Malware

As the prevalence of crypto-malware continues to rise, it is crucial to stay vigilant and employ robust cybersecurity practices. Regularly update your operating system and software, use reputable antivirus software, and exercise caution when downloading and installing programs. By adopting these measures, you can safeguard your devices and protect your resources from falling into the hands of malicious actors.

Read Disclaimer
This content is aimed at sharing knowledge, it's not a direct proposal to transact, nor a prompt to engage in offers. Lolacoin.org doesn't provide expert advice regarding finance, tax, or legal matters. Caveat emptor applies when you utilize any products, services, or materials described in this post. In every interpretation of the law, either directly or by virtue of any negligence, neither our team nor the poster bears responsibility for any detriment or loss resulting. Dive into the details on Critical Disclaimers and Risk Disclosures.

Share it

Windows tool attacked by hackers adopts cryptocurrency mining malware.