Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个名为REF1695的网络犯罪活动,他们从2023年11月开始利用虚假安装程序传播远程访问木马和加密货币挖矿软件。攻击者还通过CPA欺诈获利,诱导用户访问内容锁定页面。最近他们还部署了一个新的.NET植入程序CNB Bot,使用ISO文件作为感染媒介,并绕过微软的智能屏幕保护。CNB Bot可以下载额外的有效载荷,更新自身,并与C2服务器通信。攻击者还滥用合法的WinRing0x64.sys驱动来提升挖矿性能,并通过GitHub分发恶意软件,以降低检测风险。整个活动已经产生了相当可观的收益。 现在我需要把这些信息浓缩到100字以内,确保涵盖主要攻击手段、恶意软件、滥用技术以及财务收益等方面。同时,要避免使用“文章内容总结”这样的开头。 可能的结构是:描述攻击活动的基本情况,使用的恶意软件和手段,以及财务影响。 最终总结可能如下: REF1695网络犯罪活动利用虚假安装程序传播远程访问木马和加密货币挖矿软件,并通过CPA欺诈获利。攻击者部署了新的.NET植入程序CNB Bot,使用ISO文件作为感染媒介,并绕过微软智能屏幕保护。他们滥用合法驱动提升挖矿性能,并通过GitHub分发恶意软件以降低检测风险。该活动已产生可观收益。 </think> REF1695网络犯罪活动利用虚假安装程序传播远程访问木马和加密货币挖矿软件,并通过CPA欺诈获利。攻击者部署了新的.NET植入程序CNB Bot,使用ISO文件作为感染媒介,并绕过微软智能屏幕保护。他们滥用合法驱动提升挖矿性能,并通过GitHub分发恶意软件以降低检测风险。该活动已产生可观收益。 2026-4-2 11:42:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023.

"Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration," Elastic Security Labs researchers Jia Yu Chan, Cyril François, and Remco Sprooten said in an analysis published this week.

Recent iterations of the campaign have also been found to deliver a previously undocumented .NET implant codenamed CNB Bot. These attacks leverage an ISO file as the infection vector to deliver a .NET Reactor-protected loader and a text file with explicit instructions to the user to bypass Microsoft Defender SmartScreen protections against running unrecognized applications by clicking on "More info" and "Run anyway."

The loader is designed to invoke PowerShell, which is responsible for configuring broad Microsoft Defender Antivirus exclusions to fly under the radar and launch CNB Bot in the background. At the same time, the user is displayed an error message: "Unable to launch the application. Your system may not meet the required specifications. Please contact support."

CNB Bot functions as a loader with capabilities to download and execute additional payloads, update itself, and uninstall and perform cleanup actions to cover up the tracks. It communicates with a command-and-control (C2) server using HTTP POST requests.

Other campaigns mounted by the threat actor have leveraged similar ISO lures to deploy PureRAT, PureMiner, and a bespoke .NET-based XMRig loader, the last of which reaches out to a hard-coded URL to extract the mining configuration and launch the miner payload.

As recently observed in the FAUX#ELEVATE campaign, "WinRing0x64.sys," a legitimate, signed, and vulnerable Windows kernel driver, is abused to obtain kernel-level hardware access and modify CPU settings to boost hash rates, thereby enabling performance improvement. The use of the driver has been observed in many cryptojacking campaigns over the years. The functionality was added to XMRig miners in December 2019.

Elastic said it also identified another campaign that leads to the deployment of SilentCryptoMiner. The miner, besides using direct system calls to evade detection, takes steps to disable Windows Sleep and Hibernate modes, set up persistence via a scheduled task, and uses the "Winring0.sys" driver to fine-tune the CPU for mining operations.

Another notable component of the attack is a watchdog process that ensures the malicious artifacts and persistence mechanisms are restored in the event they are deleted. The campaign is estimated to have accrued 27.88 XMR ($9,392) across four tracked wallets, indicating that the operation is yielding consistent financial returns to the attacker.

"Beyond the C2 infrastructure, the threat actor abuses GitHub as a payload delivery CDN, hosting staged binaries across two identified accounts," Elastic said. "This technique shifts the download-and-execute step away from operator-controlled infrastructure to a trusted platform, reducing detection friction."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
如有侵权请联系:admin#unsafe.sh