Cryptojacking Threats Evolving with Sophisticated Malware

05 Sep 2025

Cryptojacking remains a formidable threat in digital security, as evidenced by a recent case where sophisticated malware exploited the Windows Character Map tool to mine Monero cryptocurrency. The incident was first uncovered by Darktrace’s autonomous detection system, which identified abnormal behavior when a desktop device made an unexpected HTTP connection, utilizing a PowerShell user agent.

Unveiling the Attack

The investigation revealed the attackers’ strategic use of obfuscated script chains to deploy NBMiner, a mining tool, with the intent to capitalize on cryptojacking without detection. The initial phase of the attack involved the download of a compromised PowerShell script from the URL 45.141.87.195:8000 which injected both legitimate and malicious binaries into the system.

Central to the malware campaign was the ingenious use of Windows’ Character Map application, charmap.exe. Attackers employed an AutoIt loader to inject mining code directly into charmap.exe, evading detection by Windows Defender, which was the primary antivirus defense in the setup. This AutoIt loader not only decrypted the hidden miner but also executed a sophisticated check for various system attributes, such as the presence of Task Manager, user privileges, and antivirus software.

In addition to utilizing charmap.exe for concealment, the malware effectively used UAC bypass techniques via Fodhelper, a Microsoft utility, to gain elevated privileges necessary for its operations. Subsequently, the mining process remained stealthy, obfuscating its window from users and ensuring continuity by re-downloading itself if terminated. It proceeded to initiate connections with mining pools like asia.ravenminer.com and monerooceans.stream to begin the mining process.

Detection and Prevention

Darktrace's analysis revealed several layers of sophistication, including heavy obfuscation techniques, the sideloading of legitimate binaries, persistence within the registry, and process injection methods. As the malware established DNS requests and connection attempts to Monero endpoints, it triggered high-fidelity alerts in Darktrace’s system. This prompted the deployment of Rapid Autonomous Response (RAR) technology, which effectively blocked over 130 external call attempts, thereby neutralizing the threat.

Through this case study, Darktrace underscored the critical role of artificial intelligence in intercepting cryptojacking operations. Such technologies map potential attack vectors—the kill chain—and enable automated responses to isolate and mitigate threats in real-time, thereby protecting digital environments from compromise.

In light of these findings, businesses are urged to stay informed about evolving cryptojacking strategies and the continuous development of adaptive threat detection methodologies. The incident reminded the cybersecurity community of the need for vigilance and the importance of advanced security solutions in combating sophisticated digital threats.

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508630
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735704
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746793
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497307
downloads

Comments (0)

No comments yet. Be the first to comment!