Friday, July 19, 2024
EHA

Hackers Tried to use ‘Spider-Man: No Way Home’ movie to Deliver Monero Cryptominer

The cyber security experts at ReasonLabs have recently detected that hackers are using the ‘Spider-Man: No Way Home’ movie to deliver Monero crytominer through which they mine Monero crytocurrency (XMR). So, the fans of ‘Spider-Man: No Way Home’ beware of torrenting the movie.

During the analysis, they discovered several Monero miners on Russian torrent trackers of this new film. The film has already set a new box office record and became the first tape since the start of the COVID-19 pandemic.

The ‘Spider-Man: No Way Home’ movie has managed to make more than $800 million in theaters around the world. And that’s why to take advantage of its fame, the hackers selected this medium to accomplish their malicious goals.

Here, for distributing the malware or miner the hackers have used the torrents as a distribution mechanism.

Technical Analysis

The malware found in the spiderman_net_putidomoi.torrent.exe file is unsigned, which is written in .net, and currently not in Virus Total. 

Not only that, even the mining malware tries to avoid being seen by researchers by using legitimate names for its files and processes like it claim to be owned by Google and creates files with names such as sihost64.exe, insinuating them into svchost.exe.

The malware also adds itself to Windows Defender exceptions and maintains a constant presence in the system, to keep itself active it spawns a special process.

Here’s what the security analysts explained:-

“The Spiderman malware is actually a new ‘revision’ of the previously known malware, which in the past has masqueraded as various popular applications, including Windows Updater and Discord. Now it has turned its table to the movie Spiderman.”

Operation Technique

At this stage two PowerShell encoded commands get started by the program, and then to Microsoft Defender, it adds the following extended exclusions:-

  • Ignore all folders under the user profile
  • The system drive (i.e. “c:\\”)
  • All files with extensions of “.exe” or “.dll”

Here’s what the experts stated:-

“One easy precaution you can take is to always check that the file extension matches the file you are expecting e.g. in this case, a movie file should end with ‘.mp4’, not ‘.exe’. Try to gather information about the file, and always think twice before double-clicking on it. To make sure you see the real file extension, open a folder, go to ‘View’ and check ‘File name extensions.’ This will make sure you see the full file type.”

Moreover, the cybersecurity analysts at ReasonLabs are still seeking to hunt down the origins of the miner since nowadays as common exploring programs the threat actors are constantly and widely using or deploying miners.

However, they have strongly recommended users to take extra care while downloading any file from non-official sources, avoid downloading any cracked tools or software, and also avoid downloading any files from a torrent download that was sent by an unknown sender.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles