CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

cryptonews 2025-06-11 14:51:47

Hackers Turn Russian Devices Into Crypto Mining Machines While Stealing Private Keys

A sophisticated cybercriminal operation targeting Russian companies has transformed legitimate business computers into covert crypto mining operations while also stealing sensitive financial data. According to research by Kaspersky, the Librarian Ghouls APT group, also known as Rare Werewolf and Rezet, has orchestrated an ingenious dual-purpose attack that weaponizes victims’ own hardware against them. The attack establishes unauthorized remote access to deploy Monero miners while harvesting cryptocurrency wallet credentials and private keys. The attackers have maintained relentless activity through May 2025, primarily targeting industrial enterprises and engineering schools across Russia and the Commonwealth of Independent States. How Hackers Steal and Mine Crypto on Russian Devices The Librarian Ghouls’ operation begins with meticulously crafted phishing emails containing password-protected archives masquerading as official documents from legitimate organizations. PDF document imitating a payment order Source: Kaspersky A complex infection chain starts operating once victims extract and execute these files. The malware installer deploys the legitimate 4t Tray Minimizer window manager to obscure malicious activities while establishing communication with servers to download additional payloads. Complicating the attack, the attackers implemented an automated schedule that wakes compromised machines at 1 AM and shuts them down at 5 AM. This creates a narrow four-hour window for unauthorized access while minimizing the likelihood of detection by unsuspecting users. During this window, the malware systematically searches for cryptocurrency-related files, targeting wallet.dat files, seed phrases, private keys, and any documents containing terms like “bitcoin,” “ethereum,” or “wallet” in multiple languages. The stolen data is then packaged into password-protected archives and transmitted via SMTP to attacker-controlled email accounts. Source: Kaspersky Following data exfiltration, the system installs XMRig cryptocurrency mining software, which is configured to connect to mining pools under the attackers’ control. This dual-purpose approach ensures continuous revenue generation long after the initial data theft, effectively turning each compromised machine into a persistent income source. The mining operation runs covertly in the background, utilizing the victim’s computational resources and electricity costs while generating Monero cryptocurrency for the threat actors. Global Implications and Escalating Threats Towards Crypto The Librarian Ghouls campaign emerges against increasingly sophisticated and damaging cryptocurrency-related cybercrime. Recent data breaches have exposed sensitive information from major exchanges, including Gemini and Binance , with dark web marketplaces actively trading user databases containing personal details, email addresses, and location data. Hackers operating on the dark web are claiming to possess and sell sensitive personal data of users from major crypto exchanges Gemini and Binance. #Hackers #Darkweb https://t.co/VrMHbX6Snf — Cryptonews.com (@cryptonews) March 28, 2025 These compromised datasets fuel secondary criminal activities, including fraud schemes, recovery scams, and targeted phishing campaigns that exploit victims’ existing relationships with legitimate cryptocurrency platforms. More notably, the North Korean connection to large-scale exchange breaches is a particularly concerning development, as these state-sponsored operations show technical capability to infiltrate almost any system. North Korean hackers have successfully laundered at least $300 million from their record-breaking $1.5 billion cryptocurrency heist. #NorthKorea #Bybit https://t.co/QaDxLtuXq3 — Cryptonews.com (@cryptonews) March 10, 2025 A March Cryptonews report shows that the Lazarus Group has successfully laundered $300 million from its recent $1.5 billion Bybit heist. In fact, experts estimate that 20% of the stolen funds have already “gone dark,” likely converted through sophisticated money laundering networks across multiple jurisdictions and cryptocurrency platforms. This convergence of all these constant threats is showing the maturity of an ecosystem under sustained assault from multiple vectors, requiring coordinated industry-wide responses to protect both individual users and institutional infrastructure, as demonstrated by Bybit in its last attack. The post Hackers Turn Russian Devices Into Crypto Mining Machines While Stealing Private Keys appeared first on Cryptonews .

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.