Guard Against Hackers Using Email Replies for Crypto Mining Malware

Guard Against Hackers Using Email Replies for Crypto Mining Malware

Reinout te Brake | 25 Sep 2024 21:39 UTC

Hackers Exploit Automated Email Replies to Deploy Stealthy crypto Mining Malware

Cybersecurity researchers have recently uncovered a new method used by hackers to compromise systems and deploy stealthy crypto mining malware. According to a report by the threat intelligence firm Facct, attackers are leveraging automated email replies from compromised accounts to target organizations in Russia, including companies, marketplaces, and financial institutions.

The goal of these cybercriminals is to install the XMRig miner on victims’ devices, allowing them to mine digital assets covertly without the knowledge of the device owners.

150 Emails Containing XMRig Miner Identified

Facct's investigation has revealed that since late May, approximately 150 emails containing the XMRig miner have been identified. Fortunately, the firm's business email protection system successfully blocked these malicious emails before they could reach their intended targets.

Dmitry Eremenko, a senior analyst at Facct, emphasized the unique danger posed by this attack vector, highlighting the potential risks associated with such a method of infiltration.

Unlike traditional phishing campaigns where recipients can easily disregard suspicious emails, this tactic preys on the expectations of the recipients. Since the victims are initiating the communication by sending an email first, they are more likely to trust the subsequent auto-reply they receive, unknowingly engaging with compromised accounts.

"In this scenario, even if the email doesn’t appear convincing, the established communication chain may reduce suspicion, making the recipient more likely to engage with the malicious attachment," said Eremenko.

To combat such threats, Facct advises organizations to bolster their cybersecurity measures by providing regular training to employees on current threats and best practices. They also recommend implementing strong password policies and multi-factor authentication to enhance security against potential attacks.

This incident is not the first time hackers have utilized XMRig in their operations. The open-source application, designed for mining the Monero cryptocurrency, has been frequently integrated into malicious campaigns since 2020.

In previous instances, XMRig was used in conjunction with malware such as “Lucifer” and the “FritzFrog” botnet to target vulnerable systems and exploit outdated software vulnerabilities.

North Korean Hackers Use Malware to Steal crypto Keys

In a separate development, the FBI recently issued a warning about a sophisticated Android malware called SpyAgent, discovered by McAfee. This malicious software is designed to target cryptocurrency private keys stored on smartphones, utilizing optical character recognition (OCR) technology to extract text from images and screenshots on the device.

SpyAgent is distributed through malicious links sent via text messages and poses a significant risk to users' crypto assets by targeting their private keys.

Additionally, another malware threat known as the “Cthulhu Stealer” has been identified, affecting MacOS systems. This malware disguises itself as legitimate software and targets sensitive information, including MetaMask passwords, IP addresses, and cold wallet private keys.

Furthermore, Microsoft recently uncovered a vulnerability in Google Chrome that was exploited by the North Korean hacker group Citrine Sleet. The group used the vulnerability to create fake cryptocurrency exchanges and fraudulent job applications, further highlighting the persistent threat posed by cybercriminals in the digital landscape.

As the frequency of crypto-related scams continues to rise, it is essential for individuals and organizations to remain vigilant and implement robust security measures to safeguard their assets and information from malicious actors.

Want to stay updated about Play-To-Earn Games?

Join our weekly newsletter now.

See All

Play To Earn Games: Best Blockchain Game List For NFTs and Crypto

Play-to-Earn Game List
No obligationsFree to use