Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Knots leader says Bitcoin Core v30 could host illegal adult content

    September 3, 2025

    U.S. Bancorp reenters Bitcoin custody market in post-SEC landscape

    September 3, 2025

    Crypto prediction markets open ‘Trump out’ bet amid death rumors

    September 3, 2025
    Facebook X (Twitter) Instagram
    Wednesday, September 3
    • About
    • Contact us
    • Privacy Policy
    Facebook X (Twitter) LinkedIn YouTube
    Blockchain Echo
    Banner
    • Lithosphere News Releases
    • Bitcoin
    • Crypto
    • Ethereum
    • Litecoin
    • Altcoins
    • Blockchain
    Blockchain Echo
    Home » Darktrace flags new cryptojacking campaign able to bypass Windows Defender
    Crypto

    Darktrace flags new cryptojacking campaign able to bypass Windows Defender

    John SmithBy John SmithSeptember 3, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Cybersecurity firm Darktrace has identified a new cryptojacking campaign designed to bypass Windows Defender and deploy a crypto mining software.

    Summary

    • Darktrace has identified a cryptojacking campaign that targets Windows systems.
    • The campaign involves stealthily deploying the NBminer to mine cryptocurrencies.

    The cryptojacking campaign, first identified in late July, involves a multi-stage infection chain that quietly hijacks a computer’s processing power to mine cryptocurrency, Darktrace researchers Keanna Grelicha and Tara Gould explained in a report shared with crypto.news.

    According to the researchers, the campaign specifically targets Windows-based systems by exploiting PowerShell, Microsoft’s built-in command-line shell and scripting language, through which bad actors are able to run malicious scripts and gain privileged access to the host system.

    These malicious scripts are designed to run directly on system memory (RAM) and, as a result, traditional antivirus tools that typically rely on scanning files on a system’s hard drives are unable to detect the malicious process.

    Subsequently, attackers use the AutoIt programming language, which is a Windows tool typically used by IT professionals to automate tasks, to inject a malicious loader into a legitimate Windows process, which then downloads and executes a cryptocurrency mining program without leaving obvious traces on the system.

    As an added line of defense, the loader is programmed to perform a series of environment checks, such as scanning for signs of a sandbox environment and inspecting the host for installed antivirus products.

    Execution only proceeds if Windows Defender is the sole active protection. Further, if the infected user account lacks administrative privileges, the program attempts a User Account Control bypass to gain elevated access.

    When these conditions are met, the program downloads and executes the NBMiner, a well-known crypto mining tool that uses a computer’s graphics processing unit to mine cryptocurrencies such as Ravencoin (RVN) and Monero (XMR).

    In this instance, Darktrace was able to contain the attack using its Autonomous Response system by “preventing  the device from making outbound connections and blocking specific connections to suspicious endpoints.”

    “As cryptocurrency continues to grow in popularity, as seen with the ongoing high valuation of the global cryptocurrency market capitalization (almost USD 4 trillion at time of writing), threat actors will continue to view cryptomining as a profitable venture,” Darktrace researchers wrote.

    Back in July, Darktrace flagged a separate campaign where bad actors were using complex social engineering tactics, such as impersonating real companies, to trick users into downloading altered software that deploys crypto-stealing malware.

    Unlike the aforementioned cryptojacking scheme, this approach targeted both Windows and macOS systems and was executed by unaware victims themselves who believed they were interacting with company insiders. 



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFears of $27M Venus Protocol hack turn out to be phishing attack on power user
    Next Article Crypto prediction markets open ‘Trump out’ bet amid death rumors
    John Smith

    Related Posts

    U.S. Bancorp reenters Bitcoin custody market in post-SEC landscape

    September 3, 2025

    World Liberty Financial burns 47M tokens — will WLFI price recover?

    September 3, 2025

    SEC and CFTC join forces to clear regulatory path for crypto

    September 3, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Solana, Cardano, XYZ: How high can these coins climb by the next 60-day cycle?

    July 5, 2025

    How Tether-backed Twenty One plans to rival MicroStrategy

    July 5, 2025

    Trump-backed World Liberty Financial (WLFI) to be tradable?

    July 5, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    About Us

    Stay updated on the world of cryptocurrency
    Your one-stop source for daily crypto news and insights
    Blockchainecho.info: Your trusted daily crypto companion

    Most Popular

    Solana, Cardano, XYZ: How high can these coins climb by the next 60-day cycle?

    July 5, 2025

    How Tether-backed Twenty One plans to rival MicroStrategy

    July 5, 2025

    Trump-backed World Liberty Financial (WLFI) to be tradable?

    July 5, 2025
    Copyright © 2025
    • Home
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.