Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Cyber-criminals Exploit GPUs in Graphic Design Software
Cyber-criminals Exploit GPUs in Graphic Design Software
Security

Cyber-criminals Exploit GPUs in Graphic Design Software

September 23, 2023No Comments2 Mins Read

Security researchers at Cisco Talos have uncovered a scheme that preys on graphic designers and 3D modelers. Cyber-criminals are using cryptocurrency-mining malware to hijack the Graphics Processing Units (GPUs) commonly used in these fields.

According to an advisory published by Cisco Talos on Thursday, this campaign has been active since at least November 2021. The attackers exploit “Advanced Installer,” a legitimate Windows tool for software packaging, to bundle cryptocurrency-mining malware with legitimate software like Adobe Illustrator and Autodesk 3ds Max.

The reason behind this campaign’s focus on graphic design and 3-D modeling software is the high GPU power these tools demand, which suits the cyber-criminals’ cryptocurrency-mining needs. Cisco Talos explained these threat actors sneaked malicious scripts into the software installation process using Advanced Installer’s “Custom Actions” feature, enabling them to deploy threats.

The payloads include the M3_Mini_Rat client stub, creating a backdoor, and cryptocurrency-mining malware like PhoenixMiner and the versatile lolMiner.

“Cryptocurrency mining, especially on machines with high-end GPUs, can be lucrative, and the malware can often run stealthily in the background, consuming just a fraction of available resources. This allows the malicious activity to persist longer, potentially going unnoticed by the users,” explained Callie Guenther, cyber threat research senior manager at Critical Start.

“Moreover, the approach of trojanizing popular software installers offers threat actors an easier distribution method. Leveraging tactics like search engine optimization poisoning can lead to a higher rate of downloads and subsequent infections.”

Read more on cryptocurrency miners: US Regulators Warn Banks About Cryptocurrency Security Risks

This campaign mainly affects French-speaking users, primarily in France and Switzerland. However, there have been isolated infections in countries including the United States, Canada, Algeria, Sweden, Germany, Tunisia, Madagascar, Singapore and Vietnam.

See also  Treasury Sanctions Crypto Firm After North Korea’s $620m Heist

Graphic designers and 3-D modelers are advised to be cautious when installing software.

“Long-running, persistent campaigns like this are subtle and difficult to detect but can have a lasting impact on organizations,” commented Shawn Surber, senior director of technical account management at Tanium.

“This is also a great example of why operations and security teams need to work together across their traditional silos. Once inside, this type of attack is virtually invisible to traditional security tools. Hence, it’s important that operational tools, like performance monitoring, be tuned to observe and alert on anomalous behavior like this.”

Source link

Cybercriminals Design Exploit GPUs Graphic Software

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

SBI, Sony back Startale’s $63 million push to expand Japan’s tokenized finance stack

March 25, 2026

Terra Classic community elects to cease USTC minting

September 24, 2023

Perp DEXs Made Simple: Smart Contracts, Funding, Leverage & Risks

February 24, 2026

Type above and press Enter to search. Press Esc to cancel.