Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Altura Enables On-chain Lending With AVLT on Morpho

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Cryptojacking Campaign Exploits Driver to Boost Monero Mining
Cryptojacking Campaign Exploits Driver to Boost Monero Mining
Security

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

February 18, 2026No Comments3 Mins Read

A newly identified cryptojacking campaign that spreads through pirated software installers has been uncovered by researchers, revealing a multi-stage infection chain designed for persistence, stealth and maximum cryptocurrency mining output.

The operation, discovered by security firm Trellix, centres on a customised XMRig miner and a controller component that maintains long-term access to infected systems.

Unlike earlier browser-based cryptojacking schemes, this campaign deploys system-level malware. It relies on deceptive installers masquerading as office productivity software, luring users with free premium applications.

Once executed, the dropper installed a primary controller named Explorer.exe in the user directory and initiated a staged deployment of mining and persistence components.

Modular Design Enhances Resilience

The controller functioned as a state-driven orchestrator rather than a simple loader. Depending on command-line arguments, it could install, monitor, relaunch or remove components.

Trellix found references to the anime Re:Zero – Starting Life in Another World embedded in the code, including a “002 Re:0” parameter that activates the main infection mode and a “barusu” argument that triggered a structured cleanup routine.

Read more on cryptojacking threats: New Cryptojacking Malware Targets Docker with Novel Mining Technique

A hardcoded expiration date of December 23, 2025, acted as a time-based kill switch. Before that date, the malware operated normally. Afterward, it initiated self-removal procedures, suggesting a finite campaign lifecycle.

To maintain persistence, the malware deployed multiple watchdog processes disguised as legitimate software, including fake Microsoft Edge and WPS executables.

If one component was terminated, another relaunched it within seconds. In some cases, the malware attempted to terminate the legitimate Windows Explorer shell to disrupt user activity and regain control.

See also  Bybit Security exposes macOS malware campaign targeting users searching for Claude Code

Kernel Exploit Boosts Hashrate

A notable feature was the use of a vulnerable signed driver, WinRing0x64.sys, associated with CVE-2020-14979.

By loading this driver, the attackers gained kernel-level access and modified CPU registers to disable hardware prefetchers. This optimization reportedly increased Monero RandomX mining performance by 15% to 50%.

The campaign connected to the Kryptex mining pool at xmr-sg.kryptex.network:8029 and used a Monero wallet for payouts. At the time of analysis, researchers observed one active worker generating approximately 1.24 KH/s, with mining activity increasing from December 8, 2025.

“This campaign serves as a potent reminder that commodity malware continues to innovate,” Trellix warned. 

“As long as legacy drivers with known vulnerabilities remain validly signed and loadable, attackers will continue to use them as keys to the kingdom, bypassing the sophisticated protections of Ring 3 to operate with impunity in the Kernel.”

The company advised organisations to enable Microsoft’s vulnerable driver blocklist, restrict USB device access and block outbound traffic to known mining pools.

Source link

Boost Campaign Cryptojacking Driver exploits Mining Monero

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Google Cloud teams up with MultiversX amid blockchain firm’s focus on metaverse

October 21, 2023

FTX Employees Knew About the Backdoor to Alameda Months Before Collapse: WSJ

October 5, 2023

Bitcoin futures show renewed confidence amidst price surge

September 23, 2023

Type above and press Enter to search. Press Esc to cancel.