Saturday, March 1, 2025
HomecryptocurrencyHackers Tried to use 'Spider-Man: No Way Home' movie to Deliver Monero...

Hackers Tried to use ‘Spider-Man: No Way Home’ movie to Deliver Monero Cryptominer

Published on

SIEM as a Service

Follow Us on Google News

The cyber security experts at ReasonLabs have recently detected that hackers are using the ‘Spider-Man: No Way Home’ movie to deliver Monero crytominer through which they mine Monero crytocurrency (XMR). So, the fans of ‘Spider-Man: No Way Home’ beware of torrenting the movie.

During the analysis, they discovered several Monero miners on Russian torrent trackers of this new film. The film has already set a new box office record and became the first tape since the start of the COVID-19 pandemic.

The ‘Spider-Man: No Way Home’ movie has managed to make more than $800 million in theaters around the world. And that’s why to take advantage of its fame, the hackers selected this medium to accomplish their malicious goals.

Here, for distributing the malware or miner the hackers have used the torrents as a distribution mechanism.

Technical Analysis

The malware found in the spiderman_net_putidomoi.torrent.exe file is unsigned, which is written in .net, and currently not in Virus Total. 

Not only that, even the mining malware tries to avoid being seen by researchers by using legitimate names for its files and processes like it claim to be owned by Google and creates files with names such as sihost64.exe, insinuating them into svchost.exe.

The malware also adds itself to Windows Defender exceptions and maintains a constant presence in the system, to keep itself active it spawns a special process.

Here’s what the security analysts explained:-

“The Spiderman malware is actually a new ‘revision’ of the previously known malware, which in the past has masqueraded as various popular applications, including Windows Updater and Discord. Now it has turned its table to the movie Spiderman.”

Operation Technique

At this stage two PowerShell encoded commands get started by the program, and then to Microsoft Defender, it adds the following extended exclusions:-

  • Ignore all folders under the user profile
  • The system drive (i.e. “c:\\”)
  • All files with extensions of “.exe” or “.dll”

Here’s what the experts stated:-

“One easy precaution you can take is to always check that the file extension matches the file you are expecting e.g. in this case, a movie file should end with ‘.mp4’, not ‘.exe’. Try to gather information about the file, and always think twice before double-clicking on it. To make sure you see the real file extension, open a folder, go to ‘View’ and check ‘File name extensions.’ This will make sure you see the full file type.”

Moreover, the cybersecurity analysts at ReasonLabs are still seeking to hunt down the origins of the miner since nowadays as common exploring programs the threat actors are constantly and widely using or deploying miners.

However, they have strongly recommended users to take extra care while downloading any file from non-official sources, avoid downloading any cracked tools or software, and also avoid downloading any files from a torrent download that was sent by an unknown sender.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...