Kaspersky Unveils Powerful Malware Posing as Crypto Miner Infecting Over 1 Million Computers

Monero
Ad Disclosure
Ad Disclosure

We believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. However, this potential compensation never influences our analysis, opinions, or reviews. Our editorial content is created independently of our marketing partnerships, and our ratings are based solely on our established evaluation criteria. Read More
Last updated:
Ad Disclosure
Ad Disclosure

We believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. However, this potential compensation never influences our analysis, opinions, or reviews. Our editorial content is created independently of our marketing partnerships, and our ratings are based solely on our established evaluation criteria. Read More
Author
Sujha Sundararajan
Author Categories
About Author

Sujha has been recognised as 🟣 Women In Crypto 2024 🟣 by BeInCrypto for her leadership in crypto journalism.

Last updated:
Why Trust Cryptonews
Cryptonews has covered the cryptocurrency industry topics since 2017, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas - from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews
Ad DisclosureWe believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. Read more
Source: Pixabay

Global cybersecurity and digital privacy firm Kaspersky’s researchers have discovered highly sophisticated malware affecting over a million victims since 2017.

The malware – “StripedFly” – initially masqueraded as a cryptocurrency miner and was later found to be a complex multi-functional wormable framework. According to the Kaspersky report published Thursday, StripedFly infected over 1 million Windows and Linux computers for five years.

“It comes equipped with a built-in TOR network tunnel for communication with command servers, along with update and delivery functionality through trusted services such as GitLab, GitHub, and Bitbucket, all using custom encrypted archives.”

Kaspersky researchers discovered the malicious framework last year and noted that the effort in creating the framework was “truly remarkable.”

“In 2022, we came across two unexpected detections within the WININIT.EXE process of an older code which was earlier observed in Equation malware,” the researchers wrote. “Subsequent analysis revealed earlier instances of suspicious code dating back to 2017.”

The malware was wrongly classified as just a Monero cryptocurrency miner and it is unclear whether this was utilized for revenue generation or cyber espionage. Experts maintained that the mining module was the key factor enabling the malware to evade detection for a long period.

The findings further added that the attacker behind the malware has acquired extensive capabilities to spy on victims. The malware “collects a range of sensitive information from all active users,” it added.

It extracts website login usernames and passwords and personal autofill data including name, address, phone number, company, and job title. “It also captures known Wi-Fi network names and the associated passwords,” the report revealed.

Similar to EternalBlue


StripedFly’s origins remain unknown however further investigations reveal that the malware uses similar techniques as EternalBlue ‘SMBv1’ exploit to infiltrate the victim’s systems.

EternalBlue was leaked in April 2017 and continues to threaten unpatched Windows servers. The infamous exploit was created and used by an NSA hacking group known as the Equation Group.

Kaspersky disclosed that StripedFly was initially detected in April 2016, a year before the EternalBlue detection. In early 2017, Microsoft released a patch for the EternalBlue exploit.

“Created quite some time ago, StripedFly has undoubtedly fulfilled its intended purpose by successfully evading detection over the years. Many high-profile and sophisticated malicious software have been investigated, but this one stands out and truly deserves attention and recognition.”

More Articles

Podcast
Gregg Bell, SVP of HBAR Foundation, on Hedera, Creating New Investment Vehicles, Tokenization, and Creating the Trust Layer of the Internet | Ep. 408
2025-02-07 10:48:44
Ethereum News
Ether Outflows from Derivatives Exchanges Hit Highest Level Since August 2023, Signaling Bullish Trend
Ruholamin Haqshanas
Ruholamin Haqshanas
2025-02-07 08:51:10
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors