Stealthy Miner Abuses Signed Drivers via Pirated Software

Stealthy Miner Abuses Signed Drivers via Pirated Software

A recently uncovered cryptojacking campaign demonstrates a significant evolution in malware tactics, leveraging the allure of pirated premium software to deploy a highly persistent and efficient Monero miner. This operation moves far beyond rudimentary browser-based attacks, employing a sophisticated, multi-stage infection chain that grants it deep system-level access. By exploiting a legitimately signed driver to gain kernel privileges, the malware optimizes its mining performance while meticulously evading detection. This campaign serves as a stark reminder that even seemingly low-impact threats like illicit cryptomining are becoming increasingly complex, borrowing techniques once reserved for advanced persistent threats to maximize their longevity and profitability. The intricate design, which includes redundant persistence mechanisms and unique operational triggers, underscores a growing trend of commodity malware adopting sophisticated, low-level system manipulation to achieve its objectives.

An Intricate Web of Deception

The attack’s lifecycle begins when an unsuspecting user downloads and executes a malicious installer disguised as popular office productivity software, initiating a carefully orchestrated, multi-stage infection process. The initial dropper module is responsible for deploying the campaign’s central controller, a malicious executable named Explorer.exe. This controller acts as the operation’s nerve center, possessing a modular architecture that allows it to install, monitor, relaunch, or completely remove other malware components based on specific command-line arguments it receives. To ensure its long-term survival on the compromised system, the malware establishes a resilient persistence framework. It deploys multiple watchdog processes that masquerade as legitimate software, such as components of Microsoft Edge. These watchdogs constantly monitor the miner and its controller; if one process is terminated by the user or security software, another immediately relaunches it, creating a frustrating and resilient infection. In some instances, the malware even terminates the genuine Windows Explorer shell, a disruptive tactic designed to confuse the user and maintain its grip on the system.

Further analysis of the malware’s code revealed several unique characteristics that provide insight into its developers and operational design, including a predefined end-of-life. The malware’s command structure incorporated unusual embedded references to the popular anime series Re:Zero, which were used as triggers for specific actions, giving the threat a distinct and identifiable fingerprint. This cultural footnote suggests a specific profile for the malware authors and distinguishes it from more generic cryptojacking tools. More strategically, the malware contained a hardcoded kill switch, a self-destruct mechanism scheduled for December 23, 2025. This feature would have initiated a comprehensive self-removal procedure, scrubbing most traces of the infection from the system automatically. Such a feature indicates a calculated effort by the attackers to manage their operation’s lifecycle, likely to avoid long-term detection and analysis. All mining activity was funneled to the Kryptex mining pool, a known destination for both legitimate and illicit cryptocurrency mining operations, consolidating the profits from this widespread campaign.

Exploiting Trust for Kernel-Level Control

The cornerstone of this campaign’s success is its ability to gain elevated system privileges by exploiting a known vulnerability in a legitimately signed third-party driver. The attackers specifically targeted WinRing0x64.sys, a driver associated with the vulnerability designated as CVE-2020-14979. Because this driver carries a valid digital signature, it is often trusted by the operating system and some security solutions, allowing it to be loaded into the kernel without raising immediate alarms. This “bring your own vulnerable driver” (BYOVD) technique is a well-established method used by threat actors to bypass modern security protections like Driver Signature Enforcement. By leveraging this trusted but flawed component, the malware effectively bridges the gap from user space to the highly privileged kernel space. This grants the malware nearly unrestricted access to the system’s hardware and core processes, a level of control that is essential for its advanced optimization techniques and a clear indicator of the ongoing trend of attackers abusing legacy software to undermine contemporary defenses.

Once kernel-level access was achieved, the malware’s primary objective was to significantly boost its mining efficiency through direct hardware manipulation, a feat impossible from standard user-mode. With its newfound privileges, the malware could directly modify CPU Model-Specific Registers (MSRs) to disable hardware prefetchers. Hardware prefetching is a CPU feature that speculatively loads data into the cache to speed up normal operations, but it can hinder the performance of the RandomX algorithm used by Monero, which is designed to be resistant to specialized hardware. By turning off these prefetchers, the malware tailored the CPU’s behavior to better suit the specific demands of cryptocurrency mining. This technical optimization resulted in a dramatic increase in the mining hashrate, with observed performance gains ranging from 15% to 50%. This maneuver highlights the attackers’ deep technical knowledge and their focus on maximizing profitability by fine-tuning the compromised hardware for a single, resource-intensive task, transforming infected machines into highly efficient, unwilling participants in their mining operation.

A Retrospective on Mitigation and Evolving Threats

The discovery of this campaign underscored the critical importance of proactive defense strategies that address the abuse of legitimate, albeit vulnerable, system components. Organizations that had already implemented Microsoft’s recommended vulnerable driver blocklist were better positioned to thwart the initial privilege escalation attempt, as this security feature is designed to prevent drivers with known exploits from being loaded into the kernel. This single measure could have effectively neutralized the core mechanism of the attack. Furthermore, network-level defenses, such as blocking outbound traffic to known cryptocurrency mining pools, provided another crucial layer of protection. By severing the malware’s connection to its command-and-control infrastructure and profit center, this strategy rendered the infection inert, even if the malware itself managed to persist on the endpoint. This incident served as a powerful case study, demonstrating that a defense-in-depth approach, combining endpoint hardening with robust network security policies, was essential for mitigating such multifaceted threats.

Advertisement

You Might Also Like

Advertisement
shape

Get our content freshly delivered to your inbox. Subscribe now ->

Receive the latest, most important information on cybersecurity.
shape shape