Russian Users Targeted by SilentCryptoMiner Disguised as Internet Restriction Bypass Tool

Large-scale cryptocurrency miner campaign targets Russian users with SilentCryptoMiner

  • Kaspersky uncovered a cryptocurrency mining Malware campaign targeting Russian users by disguising malware as internet restriction bypass tools.
  • Over 2,000 victims were identified, with the malicious archive downloaded more than 40,000 times from the fake site gitrok[.]com.
  • Attackers used blackmail tactics against YouTubers and manipulated social media channels to spread SilentCryptoMiner, which uses process hollowing to inject mining code into system processes.

Russian internet users have become targets of a sophisticated cryptocurrency mining operation, according to security researchers. Kaspersky has identified a widespread malware campaign distributing SilentCryptoMiner malware disguised as tools that help bypass internet restrictions, specifically targeting Russian users looking to circumvent online limitations.

- Advertisement -

The campaign was discovered during Kaspersky’s investigation into the increasing abuse of Windows Packet Divert (WPD) tools by cybercriminals. Attackers distribute the malware in compressed archives with fake installation instructions that convince users to disable their security software, allowing the malicious code to execute undetected.

This social engineering technique has proven effective in deploying various malware families including NJRat, XWorm, Phemedrone, and DCRat. However, this particular campaign focuses specifically on cryptocurrency mining malware.

The attackers modified a popular GitHub tool, creating a malicious version that has already infected at least 2,000 Russian users. The true infection count could be significantly higher. In one case, a YouTube creator with 60,000 subscribers inadvertently helped spread the malware by including a link to the malicious archive in videos that accumulated 400,000 views before the link was removed.

Distribution channels for the malware included the fake website gitrok[.]com, where the infected archive was downloaded over 40,000 times. The attackers employed aggressive tactics, including blackmailing YouTubers with false copyright strike claims, threatening to shut down their channels unless they posted videos containing malicious links.

By December 2024, additional versions of the miner-infected tools were being distributed through both Telegram channels and YouTube accounts, including one with 340,000 subscribers.

The technical analysis revealed a multi-stage infection process. The malicious archives contained an additional executable with a modified start script designed to trick victims into disabling their antivirus protection. The first-stage malware consists of a Python-based loader packed with PyInstaller and sometimes obfuscated with PyArmor, which fetches a second-stage payload from hardcoded domains and executes it as t.py in a temporary folder. Notably, the payload was only accessible from Russian IP addresses, confirming the targeted nature of the campaign.

- Advertisement -

“The downloaded di.exe is a SilentCryptoMiner sample based on the open-source miner XMRig. This is a covert miner able to mine multiple cryptocurrencies (ETH, ETC, XMR, RTM and others) using various algorithms. For stealth, SilentCryptoMiner employs process hollowing to inject the miner code into a system process (in this case, dwm.exe),” explains the report published by Kaspersky.

SilentCryptoMiner includes several sophisticated features to avoid detection. It can pause mining operations when specific monitoring processes are running, verify it’s not executing in a virtualized environment, and check its file size to ensure it was launched by the intended loader. The malware’s configuration is Base64-encoded and AES-CBC encrypted, with updates fetched every 100 minutes from Pastebin.

“The topic of restriction bypass tools is being actively exploited to distribute malware. The above campaign limited itself to distributing a miner, but threat actors could start to use this vector for more complex attacks, including data theft and downloading other malware. This underscores once again that, while such tools may look enticing, they pose a serious threat to user data security,” concludes the Kaspersky report.

- Advertisement -

While this campaign appears to focus exclusively on Russian users, it demonstrates the evolving tactics of cryptocurrency mining malware distributors, who increasingly leverage legitimate-seeming tools and social media manipulation to deploy their payloads.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

Stay in the Loop

Get exclusive crypto insights, breaking news, and market analysis delivered straight to your inbox. No fluff, just facts.

    1 Email per day. Unsubscribe at any time.

    - Advertisement -

    Latest News

    VexTrio Viper Pushes Scam Apps on Apple, Google Stores, Millions Hit

    Fake apps linked to VexTrio Viper appeared on official Apple and Google app stores,...

    MetaMask to Launch mmUSD Stablecoin in Partnership with Stripe

    MetaMask is preparing to launch a dollar-backed stablecoin called mmUSD in collaboration with Stripe.The...

    Bitcoin Fee Cuts Spark Network Fork Risks, “Wreck” Compact Blocks

    Bitcoin mining pools lowered minimum transaction fees to a record low on July 15,...

    Delhi Court Orders WazirX Owner to Disclose Binance Deal, Hack Probe

    The Delhi High Court ordered Zettai Pte Ltd, owner of crypto exchange WazirX, to...

    Microsoft Unveils AI Agent ‘Project Ire’ for Autonomous Malware Detection

    Microsoft has developed an autonomous AI system, called Project Ire, to classify software and...

    Must Read

    10 Best Crypto to Mine Without Special Hardware Equipment

    A lot of people mostly think that it takes a difficult process to mine cryptocurrency. today we are going to show you some of...