Hackers Exploit Automated Email Replies to Deploy Stealthy Crypto Mining Malware

Bitcoin Bitcoin Scam Scam
The attackers aim to install the XMRig miner on victims’ devices.
Author
Author
Ruholamin Haqshanas
About Author

Ruholamin Haqshanas is a contributing crypto writer for CryptoNews. He is a crypto and finance journalist with over four years of experience. Ruholamin has been featured in several high-profile crypto...

Last updated: 
Why Trust Cryptonews
Cryptonews has covered the cryptocurrency industry topics since 2017, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas - from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews

Cybersecurity researchers are using automated email replies to compromise systems and deliver stealthy crypto mining malware.

According to a report by the threat intelligence firm Facct, hackers have been leveraging auto-reply emails from compromised accounts to target organizations in Russia, including companies, marketplaces, and financial institutions.

The attackers aim to install the XMRig miner on victims’ devices, enabling them to mine digital assets covertly.

150 Emails Containing XMRig Miner Identified

Facct’s investigation revealed that since late May, approximately 150 emails containing the XMRig miner were identified.

However, the firm’s business email protection system successfully blocked these malicious emails before they could reach their clients.

Dmitry Eremenko, a senior analyst at Facct, highlighted the unique danger posed by this attack vector.

Unlike typical mass phishing campaigns where potential victims can easily ignore suspicious emails, this method preys on the expectations of recipients.

Since the victims initiate the communication by sending an email first, they are more likely to trust the auto-reply they receive, unaware that the email account they contacted is compromised.

“In this scenario, even if the email doesn’t appear convincing, the established communication chain may reduce suspicion, making the recipient more likely to engage with the malicious attachment.”

Facct urged organizations to enhance their cybersecurity measures by regularly training employees on current threats and best practices.

They also recommended the use of strong passwords and multi-factor authentication to safeguard against such attacks.

This is not the first time hackers have employed XMRig in their operations.

XMRig, an open-source application designed to mine the Monero cryptocurrency, has been frequently integrated into malicious campaigns since 2020.

In June 2020, a malware dubbed “Lucifer” exploited outdated Windows vulnerabilities to deploy XMRig.

Later, in August 2020, a botnet named “FritzFrog” targeted millions of IP addresses, including government offices and financial institutions, to distribute the crypto mining software.

North Korean Hackers Use Malware to Steal Crypto Keys

Earlier this month, the FBI issued a warning about a sophisticated new Android malware called SpyAgent, discovered by McAfee, which is designed to steal cryptocurrency private keys from users’ smartphones.

SpyAgent targets private keys by leveraging optical character recognition (OCR) technology to scan and extract text from screenshots and images stored on the device.

The malware is distributed through malicious links sent via text messages.

The alert came on the heels of another malware threat identified in August.

The “Cthulhu Stealer,” which affects MacOS systems, similarly disguises itself as legitimate software and targets personal information, including MetaMask passwords, IP addresses, and cold wallet private keys.

The same month saw Microsoft uncover a vulnerability in Google Chrome, which North Korean hacker group Citrine Sleet exploited to create fake cryptocurrency exchanges and fraudulent job applications.

As reported, August saw a surge in crypto-related scams, with a staggering $310 million lost to various exploits, making it the second-highest monthly total this year.

Logo

Why Trust Cryptonews

In the Article
Bitcoin
BTC
$105,233
1.21 %
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors
editors
+ 66 More

Best Crypto ICOs

Discover trending tokens still in presale — early-stage picks with potential

Explore Our Tools

Smart tools made for everyday crypto users

Market Overview

  • 7d
  • 1m
  • 1y
Market Cap
$3,379,696,814,559
-4.65
Trending Crypto

More Articles

Altcoin News
Analysts Says Ripple IPO Could Trigger ‘Insane Valuation’ — What It Means for XRP Price
Amin Ayan
Amin Ayan
2025-06-18 08:05:11
Altcoin News
Archetyp Market Shut Down in Europol Raid, But TRM Labs Questions Long-Term Impact
Amin Ayan
Amin Ayan
2025-06-18 06:50:16
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors