Windows tool attacked by hackers adopts cryptocurrency mining malware.

Windows tool attacked by hackers adopts cryptocurrency mining malware.


Hackers Exploit Windows Tool to Drop Cryptocurrency-Mining Malware

In a recent analysis by Cisco’s Talos Intelligence, it has been revealed that hackers have been utilizing a Windows tool since November 2021 to distribute cryptocurrency-mining malware. The tool being exploited is Windows Advanced Installer, which developers use to package software installers like Adobe Illustrator. By leveraging this tool, the attacker can execute malicious scripts on compromised machines.

Targeting Graphic Designers and 3D Modeling Software Installers

The malware campaign primarily targets software installers used for 3D modeling and graphic design, with a majority of them being written in French. This suggests that victims are likely from various industries, including architecture, engineering, construction, manufacturing, and entertainment in French-speaking countries.

Geographical Impact and Modus Operandi

The attacks mainly affect users in France and Switzerland, but there have also been infections reported in other countries such as the United States, Canada, Algeria, Sweden, Germany, Tunisia, Madagascar, Singapore, and Vietnam. The attacker establishes a backdoor in the victim’s machine using malicious PowerShell and Windows batch scripts, taking advantage of PowerShell’s ability to run in system memory rather than the hard drive, making detection more challenging.

Example of a software installer packaged with malicious scripts using Advanced Installer. Source: Talos Intelligence.

The Payload: Ethereum-Mining Programs

Once the backdoor is installed, the attacker deploys additional threats, including the Ethereum crypto-mining program PhoenixMiner and the multicoin mining threat lolMiner. These programs utilize the GPU capabilities of infected computers.

“These malicious scripts are executed using Advanced Installer’s Custom Action feature, which allows users to predefine custom installation tasks. The final payloads are PhoenixMiner and lolMiner, publicly available miners relying on computers’ GPU capabilities.”

Understanding Cryptojacking and Its Impact

The use of crypto-mining malware, also known as cryptojacking, involves surreptitiously installing mining code on devices without the user’s knowledge or permission. Signs of mining malware include device overheating and decreased performance. This practice of hijacking devices to mine or steal cryptocurrencies is not new and has been observed targeting sectors such as financial services, healthcare, and government.

Hot Take: Protect Yourself from Crypto-Mining Malware

Read Disclaimer
This page is simply meant to provide information. It does not constitute a direct offer to purchase or sell, a solicitation of an offer to buy or sell, or a suggestion or endorsement of any goods, services, or businesses. Lolacoin.org does not offer accounting, tax, or legal advice. When using or relying on any of the products, services, or content described in this article, neither the firm nor the author is liable, directly or indirectly, for any harm or loss that may result. Read more at Important Disclaimers and at Risk Disclaimers.

As the prevalence of crypto-malware continues to rise, it is crucial to stay vigilant and employ robust cybersecurity practices. Regularly update your operating system and software, use reputable antivirus software, and exercise caution when downloading and installing programs. By adopting these measures, you can safeguard your devices and protect your resources from falling into the hands of malicious actors.

Author – Contributor at | Website

Coinan Porter stands as a notable crypto analyst, accomplished researcher, and adept editor, carving a significant niche in the realm of cryptocurrency. As a skilled crypto analyst and researcher, Coinan’s insights delve deep into the intricacies of digital assets, resonating with a wide audience. His analytical prowess is complemented by his editorial finesse, allowing him to transform complex crypto information into digestible formats.