A recent surge in malicious activity has left experts warning of a large-scale cryptocurrency miner campaign targeting Russian users, specifically using the SilentCryptoMiner malware. According to Kaspersky researchers, the attack vector involves disguising the malware as a tool to bypass internet restrictions, effectively using social engineering tactics to trick users into disabling their security tools.
The Campaign in Question
The campaign, which has already infected over 2,000 Russian users, utilizes a modified version of a popular DPI (Dynamic Pixel Injection) bypass tool available on GitHub. The attackers have cleverly disguised the malware as an innocuous executable file with fake installation instructions, urging users to disable their security tools in order to allow its execution.
The Tactics, Techniques, and Procedures (TTPs)
The threat actors employ a range of tactics to spread the malware, including:
* Using fake installation instructions to trick users into disabling their security tools * Manipulating YouTube creators by falsely claiming copyright strikes and threatening channel shutdowns unless they posted videos with malicious links * Utilizing a Telegram channel to distribute an infected archive that had over 40,000 downloads * Spreading the malware through popular YouTube accounts with millions of subscribers
The Malware itself
The SilentCryptoMiner malware is a covert miner that employs process hollowing to inject the miner code into a system process (in this case, dwm.exe). It can mine multiple cryptocurrencies (ETH, ETC, XMR, RTM, and others) using various algorithms. The malware uses Pastebin to store its configuration, with multiple accounts distributing the malicious files.
The Evolution of Threat Actors
The researchers at Kaspersky have warned that this campaign marks a new level of sophistication in the threat actors' tactics. By exploiting the restriction bypass tools, they can distribute more complex attacks, including data theft and downloading other malware.
Conclusion
While SilentCryptoMiner may seem like a harmless tool, it poses a serious threat to user data security. The use of social engineering tactics and the exploitation of restriction bypass tools highlights the need for users to remain vigilant and take proactive measures to protect themselves from such threats.