• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Over mij
  • Secondary Navigation Social Media Icons

    • Email
    • Facebook
    • Instagram
    • Pinterest
AYNI

AYNI

Stay Informed

  • Landing Page
  • Over mij
  • Gutenberg Blocks
  • Landing Page

Windows tool targeted by hackers deploys crypto-mining malware

07.09.23 | | No Comments

Software installers affected are mainly used for 3D modeling and graphic design, with French being the most frequent language used in the malware campaign.

Hackers have been using a Windows tool to drop cryptocurrency-mining malware since November 2021, according to an analysis from Cisco’s Talos Intelligence. The attacker exploits Windows Advanced Installer — an application that helps developers package other software installers, such as Adobe Illustrator — to execute malicious scripts on infected machines. 

According to a Sept. 7 blog post, the software installers affected by the attack are mainly used for 3D modeling and graphic design. Additionally, most of the software installers used in the malware campaign are written in French. The findings suggest that the “victims are likely across business verticals, including architecture, engineering, construction, manufacturing, and entertainment in French language-dominant countries,” explains the analysis.

The attacks predominantly affect users in France and Switzerland, with a few infections in other countries, including the United States, Canada, Algeria, Sweden, Germany, Tunisia, Madagascar, Singapore and Vietnam, the post notes based on DNS request data sent to the attacker’s command and control host.

The illicit crypto mining campaign identified by Talos involves the deployment of malicious PowerShell and Windows batch scripts to execute commands and establish a backdoor in the victim’s machine. PowerShell, specifically, is well-known for running in the memory of the system instead of the hard drive, making it harder to identify an attack.

Example of a software installer packaged with malicious scripts using Advanced Installer. Source: Talos Intelligence.

Once the backdoor is installed, the attacker executes additional threats, such as the Ethereum crypto-mining program PhoenixMiner, and lolMiner, a multicoin mining threat.

“These malicious scripts are executed using Advanced Installer’s Custom Action feature, which allows users to predefine custom installation tasks. The final payloads are PhoenixMiner and lolMiner, publicly available miners relying on computers’ GPU capabilities.”

The use of crypto-mining malware is known as cryptojacking, and it involves installing crypto-mining code on a device without the user’s knowledge or permission in order to illegally mine cryptocurrencies. Signs that mining malware may be running on a machine include overheating and poorly performing devices.

Using malware families to hijack devices to mine or steal cryptocurrencies isn’t a new practice. Former smartphone giant BlackBerry recently identified malware scripts actively targeting at least three sectors, including financial services, healthcare and government.

Magazine: ‘Moral responsibility’ — Can blockchain really improve trust in AI?

Read More from Ana Paula Pereira on cointelegraph.com
← Previous Post
JPMorgan moves into deposit tokens for settlements: Report
Next Post →
CFTC Goes After Opyn, Other DeFi Operations in Enforcement Sweep

About

Primary Sidebar

Hey, it's me!


Add content about you in this widget.

Find us online

  • Email
  • Facebook
  • Instagram
  • Pinterest

Join our list

Footer

Buy Isla

Does Isla look like the perfect theme for you? No need to wait! You can get it on the Code + Coconut website right away!

Buy Isla

Join our list

You'll get access to our sales + get a list of our fave products.

  • Email
  • Facebook
  • Instagram
  • Pinterest

Copyright © 2025 · Your Site Name

Isla Theme by Code + Coconut