Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCryptojacking Campaign Exploits Driver to Boost Monero Mining
Cryptojacking Campaign Exploits Driver to Boost Monero Mining
CybersecurityCrypto

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

•February 18, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Feb 18, 2026

Why It Matters

The campaign demonstrates a shift from browser‑based cryptojacking to sophisticated, kernel‑level malware, raising the threat profile for enterprises and highlighting the need for stricter driver controls.

Key Takeaways

  • •Pirated installers deliver system‑level XMRig miner.
  • •Kernel driver WinRing0x64.sys boosts Monero hash rate.
  • •Controller named Explorer.exe ensures self‑healing persistence.
  • •Hard‑coded kill switch expires Dec 23 2025.
  • •Recommended: block vulnerable drivers, restrict USB, filter mining pools.

Pulse Analysis

The latest cryptojacking campaign illustrates how cybercriminals are moving beyond lightweight browser scripts to full‑fledged system malware. By embedding the miner in popular‑looking installers, attackers bypass traditional web filters and lure users into executing native code. This approach not only widens the infection surface but also enables the deployment of advanced components, such as a state‑driven controller that can install, monitor, and clean up its own artifacts, making detection considerably harder for conventional antivirus solutions.

A critical innovation in this operation is the exploitation of the signed driver WinRing0x64.sys, linked to CVE‑2020‑14979. Loading the driver grants kernel‑level privileges, allowing the malware to tweak CPU registers and disable hardware prefetchers—optimizations that translate into a 15‑50% increase in Monero RandomX hash rates. The miner’s modular design, with watchdog processes masquerading as legitimate executables, ensures continuous operation even if individual components are terminated. The inclusion of a hard‑coded expiration date provides a controlled campaign lifecycle, reducing the risk of long‑term exposure for the attackers.

For organizations, the takeaway is clear: traditional endpoint protection must be complemented by driver hygiene and network controls. Enabling Microsoft’s vulnerable driver blocklist, restricting unauthorized USB device usage, and blocking outbound connections to known mining pools are immediate mitigations. As legacy drivers remain signed and loadable, attackers will continue to weaponize them, underscoring the importance of proactive patch management and zero‑trust network segmentation to thwart future kernel‑level cryptojacking threats.

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...