Menu

Search

  |   Digital Currency

Menu

  |   Digital Currency

Search

Crypto Hackers Weaponize Auto-Replies to Install Hidden Mining Software

Hackers use auto-reply emails to covertly install crypto mining software. Credit: EconoTimes

Hackers are exploiting auto-reply emails from compromised accounts to distribute XMRig crypto mining software, targeting Russian businesses and banks, cybersecurity firm Facct reports. This method tricks victims into initiating contact, making malicious emails appear trustworthy.

Cointelegraph elaborates that cybersecurity researchers have uncovered a new tactic by hackers: using automated email replies to conceal their crypto mining software.

Hackers Use Auto-Replies to Spread XMRig Crypto Miner

Hackers hit Russian businesses, marketplaces, and banks via auto-reply emails sent from hacked accounts, according to researchers at threat intelligence firm Facct.

In order to mine digital assets, the attackers used this approach to install the XMRig miner on their victims' devices.

According to the security firm, 150 emails with XMRig have been detected since May's end. However, the cybersecurity company also boasted that its email defense system warded off any harmful messages that might have reached its customers.

Victims Unknowingly Communicate with Hacked Accounts

According to Facct senior analyst Dmitry Eremenko, the method of delivery is risky since possible victims start the conversations. Email recipients typically have the choice to disregard communications they do not find relevant when using conventional mass delivery methods.

Victims of auto-replies, on the other hand, mistakenly believe they will hear back from the original sender of their email, even though the compromised account is actually communicating with someone else.

Cybersecurity Training and Strong Authentication Essential

Companies should regularly teach their personnel to expand their awareness of cybersecurity and current risks, according to the cybersecurity firm. Strong passwords and multifactor authentication should be implemented, the business emphasized.

An authentic open-source program that can mine the Monero coin is the XMRig. On the other hand, since 2020, hackers have been installing the program into various systems using a variety of ways, integrating it into their attacks.

  • Market Data
Close

Welcome to EconoTimes

Sign up for daily updates for the most important
stories unfolding in the global economy.