
The campaign demonstrates a shift from browser‑based cryptojacking to sophisticated, kernel‑level malware, raising the threat profile for enterprises and highlighting the need for stricter driver controls.
The latest cryptojacking campaign illustrates how cybercriminals are moving beyond lightweight browser scripts to full‑fledged system malware. By embedding the miner in popular‑looking installers, attackers bypass traditional web filters and lure users into executing native code. This approach not only widens the infection surface but also enables the deployment of advanced components, such as a state‑driven controller that can install, monitor, and clean up its own artifacts, making detection considerably harder for conventional antivirus solutions.
A critical innovation in this operation is the exploitation of the signed driver WinRing0x64.sys, linked to CVE‑2020‑14979. Loading the driver grants kernel‑level privileges, allowing the malware to tweak CPU registers and disable hardware prefetchers—optimizations that translate into a 15‑50% increase in Monero RandomX hash rates. The miner’s modular design, with watchdog processes masquerading as legitimate executables, ensures continuous operation even if individual components are terminated. The inclusion of a hard‑coded expiration date provides a controlled campaign lifecycle, reducing the risk of long‑term exposure for the attackers.
For organizations, the takeaway is clear: traditional endpoint protection must be complemented by driver hygiene and network controls. Enabling Microsoft’s vulnerable driver blocklist, restricting unauthorized USB device usage, and blocking outbound connections to known mining pools are immediate mitigations. As legacy drivers remain signed and loadable, attackers will continue to weaponize them, underscoring the importance of proactive patch management and zero‑trust network segmentation to thwart future kernel‑level cryptojacking threats.
Comments
Want to join the conversation?
Loading comments...