Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Silentcryptominer infects 2000 Russian users using fake tools vpn and dpi
Global Security

Silentcryptominer infects 2000 Russian users using fake tools vpn and dpi

AdminBy AdminMarch 10, 2025No Comments3 Mins Read
SilentCryptoMiner Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 10, 2025Red LakshmananIntelligence threats / cybercrime

Silentcryptominer Marware

New mass malicious campaign – infects users named miner cryptocurrency Silentcryptominer Making it as a tool designed to bypass Internet units and restrictions around the Internet service.

Cyberski Russian Cyosporsky said activity is part of a greater trend when cybercrime is increasingWpd) Tools for distribution of malware under the guise of bypass restriction programs.

“Such software is often distributed as archives with the instructions for the installation of the text in which the developers recommend that the security decisions, citing false positives,” – researchers Leonid Bezverchenko, Dmitry Pikush and Oleg Kupreeviev – Note. “This plays in the hands of the attackers, allowing them to be stored in an unprotected system without the risk of detection.”

Cybersecurity

The approach was used within the frames that distribute the theft, remote access tools (rats), Trojan, providing hidden remote access, and miners cryptocurrencies such as NJRAT, XWOMM, PHEMEDRON and DCRAT.

The last turn in this tactic is a company that has compromised more than 2000 Russian users with a miner, masked in the tool for handling blocks based on packages (DPI). The program is said to be advertised as a link to the malicious archive through the YouTube channel with 60,000 subscribers.

Silentcryptominer Marware

In the subsequent escalation of the tactics, noticed in November 2024, the threats subjects were found that such as developers threaten the channels of channel reports about the author’s rights and demand to go in videos with harmful connections or risk closing their channels.

“In December 2024, the users reported the distribution of the miner, the infected version of the same instrument through other YouTube telegrams and channels that have been closed since then,” Kaspersky said.

It was found that the archives undergoing the fasteners were packed with an additional executable file, with one of the legitimate packaging scenarios changed to launch binary via Powershell. In case the antivirus software installed on the system interferes with the attack chain and removes malicious binary, users reflect the error message calling them to overload the file and run it after disabling security.

Cybersecurity

The executive file is a Python-based loader, which is designed to search for malicious software, another Python scenario that loads the useful load of Silentcryptominer Miner and sets up, but it does not work in the sandbox and tunes Windows Defender.

Shakhtar, based on an open source Xmrig, subjected to random data blocks to artificially inflate the file size up to 690 MB and eventually prevents automatic analysis from antiviral solutions and sandy.

“For SilentcryPomplower, SilentcryPlower uses the process that exposes to bring the miner code into the system process (in this case, dwm.exe),” Kaspersky said. “Malicious software can stop mining as long as the processes indicated in the configuration are active. It can be monitored by the web panel.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.