Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
    Cybersecurity

    Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

    adminBy adminApril 2, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 02, 2026Cryptomining / Malware

    A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023.

    “Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration,” Elastic Security Labs researchers Jia Yu Chan, Cyril François, and Remco Sprooten said in an analysis published this week.

    Recent iterations of the campaign have also been found to deliver a previously undocumented .NET implant codenamed CNB Bot. These attacks leverage an ISO file as the infection vector to deliver a .NET Reactor-protected loader and a text file with explicit instructions to the user to bypass Microsoft Defender SmartScreen protections against running unrecognized applications by clicking on “More info” and “Run anyway.”

    The loader is designed to invoke PowerShell, which is responsible for configuring broad Microsoft Defender Antivirus exclusions to fly under the radar and launch CNB Bot in the background. At the same time, the user is displayed an error message: “Unable to launch the application. Your system may not meet the required specifications. Please contact support.”

    CNB Bot functions as a loader with capabilities to download and execute additional payloads, update itself, and uninstall and perform cleanup actions to cover up the tracks. It communicates with a command-and-control (C2) server using HTTP POST requests.

    Other campaigns mounted by the threat actor have leveraged similar ISO lures to deploy PureRAT, PureMiner, and a bespoke .NET-based XMRig loader, the last of which reaches out to a hard-coded URL to extract the mining configuration and launch the miner payload.

    As recently observed in the FAUX#ELEVATE campaign, “WinRing0x64.sys,” a legitimate, signed, and vulnerable Windows kernel driver, is abused to obtain kernel-level hardware access and modify CPU settings to boost hash rates, thereby enabling performance improvement. The use of the driver has been observed in many cryptojacking campaigns over the years. The functionality was added to XMRig miners in December 2019.

    Elastic said it also identified another campaign that leads to the deployment of SilentCryptoMiner. The miner, besides using direct system calls to evade detection, takes steps to disable Windows Sleep and Hibernate modes, set up persistence via a scheduled task, and uses the “Winring0.sys” driver to fine-tune the CPU for mining operations.

    Another notable component of the attack is a watchdog process that ensures the malicious artifacts and persistence mechanisms are restored in the event they are deleted. The campaign is estimated to have accrued 27.88 XMR ($9,392) across four tracked wallets, indicating that the operation is yielding consistent financial returns to the attacker.

    “Beyond the C2 infrastructure, the threat actor abuses GitHub as a payload delivery CDN, hosting staged binaries across two identified accounts,” Elastic said. “This technique shifts the download-and-execute step away from operator-controlled infrastructure to a trusted platform, reducing detection friction.”

    Crypto ISO Lures Miners mining Operation RATs researchers spread Uncover
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleEFF’s Submission to the UN OHCHR on Protection of Human Rights Defenders in the Digital Age
    Next Article I used to stare out my window while I worked, now these apps are getting me outside exploring
    admin
    • Website

    Related Posts

    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    April 16, 2026

    CIOs fret over rising security concerns amid AI adoption

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Microsoft makes it easier to import Google PMax campaigns

    April 16, 2026

    EFF pushes back on Google data scandal response: ‘Google screwed up’

    April 16, 2026

    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    April 16, 2026

    How Push Notifications Can Betray Your Privacy (and What to Do About It)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,349)
    • Privacy & Online Earning (169)
    • SEO & Digital Marketing (829)
    • Tech Tools & Mobile / Apps (1,614)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Microsoft makes it easier to import Google PMax campaigns

    April 16, 2026

    EFF pushes back on Google data scandal response: ‘Google screwed up’

    April 16, 2026

    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    April 16, 2026
    Most Popular
    • Microsoft makes it easier to import Google PMax campaigns
    • EFF pushes back on Google data scandal response: ‘Google screwed up’
    • Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
    • How Push Notifications Can Betray Your Privacy (and What to Do About It)
    • Try Using the 3-3-3 Rule to Stick to an Exercise Routine
    • CIOs fret over rising security concerns amid AI adoption
    • ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows
    • Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.