Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
    Cybersecurity

    Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

    adminBy adminFebruary 24, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts.

    “Analysis of the recovered dropper, persistence triggers, and mining payload reveals a sophisticated, multi-stage infection prioritizing maximum cryptocurrency mining hashrate, often destabilizing the victim system,” Trellix researcher Aswath A said in a technical report published last week.

    “Furthermore, the malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments.”

    The entry point of the attack is the use of social engineering decoys, advertising free premium software in the form of pirated software bundles, such as installers for office productivity suites, to trick unsuspecting users into downloading malware-laced executables.

    The binary acts as the central nervous system of the infection, serving different roles as an installer, watchdog, payload manager, and cleaner to oversee different aspects of the attack lifecycle. It features a modular design that separates the monitoring features from the core payloads responsible for cryptocurrency mining, privilege escalation, and persistence if it’s terminated.

    This flexibility, or mode switching, is achieved via command-line arguments –

    • No parameters for environment validation and migration during the early installation phase.
    • 002 Re:0, for dropping the main payloads, starting the miner, and entering a monitoring loop.
    • 016, for restarting the miner process if it’s killed.
    • barusu, for initiating a self-destruct sequence by terminating all malware components and deleting files.

    Present within the malware is a logic bomb that operates by retrieving the local system time and comparing it against a predefined timestamp –

    • If it’s before December 23, 2025, the malware proceeds with installing the persistence modules and launching the miner.
    • If it’s after December 23, 2025, the binary is launched with the “barusu” argument, resulting in a “controlled decommissioning” of the infection.

    The hard deadline of December 23, 2025, indicates that the campaign was designed to run indefinitely on compromised systems, with the date likely either signaling the expiration of rented command-and-control (C2) infrastructure, a predicted shift in the cryptocurrency market, or a planned move to a new malware variant, Trellix said.

    Caption – Overall file inventory

    In the case of the standard infection routine, the binary – which acts as a “self-contained carrier” for all malicious payloads – writes the different components to disk, including a legitimate Windows Telemetry service executable that’s used to sideload the miner DLL.

    Also dropped are files to ensure persistence, terminate security tools, and execute the miner with elevated privileges by using a legitimate but flawed driver (“WinRing0x64.sys”) as part of a technique called bring your own vulnerable driver (BYOVD). The driver is susceptible to a vulnerability tracked as CVE-2020-14979 (CVSS score: 7.8) that allows privilege escalation.

    The integration of this exploit into the XMRig miner is to have greater control over the CPU’s low-level configuration and boost the mining performance (i.e., the RandomX hashrate) by 15% to 50%.

    “A distinguishing feature of this XMRig variant is its aggressive propagation capability,” Trellix said. “It does not rely solely on the user downloading the dropper; it actively attempts to spread to other systems via removable media. This transforms the malware from a simple Trojan into a worm.”

    Evidence shows that the mining activity took place, albeit sporadically, throughout November 2025, before spiking on December 8, 2025.

    “This campaign serves as a potent reminder that commodity malware continues to innovate,” the cybersecurity company concluded. “By chaining together social engineering, legitimate software masquerades, worm-like propagation, and kernel-level exploitation, the attackers have created a resilient and highly efficient botnet.”

    Caption – A “Circular Watchdog” topology to ensure persistence

    The disclosure comes as Darktrace said it identified a malware artifact likely generated using a large language model (LLM) that exploits the React2Shell vulnerability (CVE-2025-55182, CVSS score: 10.0) to download a Python toolkit, which leverages the access to drop an XMRig miner by running a shell command.

    “While the amount of money generated by the attacker in this case is relatively low, and cryptomining is far from a new technique, this campaign is proof that AI-based LLMs have made cybercrime more accessible than ever,” researchers Nathaniel Bill and Nathaniel Jones said.

    “A single prompting session with a model was sufficient for this attacker to generate a functioning exploit framework and compromise more than ninety hosts, demonstrating that the operational value of AI for adversaries should not be underestimated.”

    Attackers have also been putting to use a toolkit dubbed ILOVEPOOP to scan for exposed systems still vulnerable to React2Shell, likely in an effort to lay the groundwork for future attacks, according to WhoisXML API. The probing activity has particularly targeted government, defense, finance, and industrial organizations in the U.S.

    “What makes ILOVEPOOP unusual is a mismatch between how it was built and how it was used,” said Alex Ronquillo, vice president of product at WhoisXML API. “The code itself reflects expert-level knowledge of React Server Components internals and employs attack techniques not found in any other documented React2Shell kit.”

    “But the people deploying it made basic operational mistakes when interacting with WhoisXML API’s honeypot monitoring systems – errors that a sophisticated attacker would normally avoid. In practical terms, this gap points to a division of labor.”

    “We might be looking at two different groups: one that built the tool and one that’s using it. We see this pattern in state-sponsored operations – a capable team develops the tooling, then hands it off to operators who run mass scanning campaigns. The operators don’t need to understand how the tool works – they just need to run it.”

    Bomb BYOVD Campaign exploit Logic TimeBased Wormable XMRig
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article4 Sites That Recovered From Google’s December 2025 Core Update
    Next Article Google Messages is getting real-time location sharing
    admin
    • Website

    Related Posts

    New Defender deployment tool streamlines Windows device onboarding with single executable

    March 3, 2026

    Star Citizen game dev discloses breach affecting user data

    March 3, 2026

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    New Defender deployment tool streamlines Windows device onboarding with single executable

    March 3, 2026

    Significant Advancement In Long-Context AI

    March 3, 2026

    Android Device Policy 152.26.1 (10604640) APK Download by Google LLC

    March 3, 2026

    Star Citizen game dev discloses breach affecting user data

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (575)
    • Privacy & Online Earning (80)
    • SEO & Digital Marketing (359)
    • Tech Tools & Mobile / Apps (711)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    New Defender deployment tool streamlines Windows device onboarding with single executable

    March 3, 2026

    Significant Advancement In Long-Context AI

    March 3, 2026

    Android Device Policy 152.26.1 (10604640) APK Download by Google LLC

    March 3, 2026
    Most Popular
    • New Defender deployment tool streamlines Windows device onboarding with single executable
    • Significant Advancement In Long-Context AI
    • Android Device Policy 152.26.1 (10604640) APK Download by Google LLC
    • Star Citizen game dev discloses breach affecting user data
    • Samsung seems very committed to putting Exynos in every future Galaxy
    • Researchers Uncover Method to Track Cars via Tire Sensors
    • How to revise your old content for AI search optimization
    • Best High-Yield Checking Accounts for March 2026
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.