Hackers are exploiting auto-reply emails from compromised accounts to distribute XMRig crypto mining software, targeting Russian businesses and banks, cybersecurity firm Facct reports. This method tricks victims into initiating contact, making malicious emails appear trustworthy.
Cointelegraph elaborates that cybersecurity researchers have uncovered a new tactic by hackers: using automated email replies to conceal their crypto mining software.
Hackers Use Auto-Replies to Spread XMRig Crypto Miner
Hackers hit Russian businesses, marketplaces, and banks via auto-reply emails sent from hacked accounts, according to researchers at threat intelligence firm Facct.
In order to mine digital assets, the attackers used this approach to install the XMRig miner on their victims' devices.
According to the security firm, 150 emails with XMRig have been detected since May's end. However, the cybersecurity company also boasted that its email defense system warded off any harmful messages that might have reached its customers.
Victims Unknowingly Communicate with Hacked Accounts
According to Facct senior analyst Dmitry Eremenko, the method of delivery is risky since possible victims start the conversations. Email recipients typically have the choice to disregard communications they do not find relevant when using conventional mass delivery methods.
Victims of auto-replies, on the other hand, mistakenly believe they will hear back from the original sender of their email, even though the compromised account is actually communicating with someone else.
Cybersecurity Training and Strong Authentication Essential
Companies should regularly teach their personnel to expand their awareness of cybersecurity and current risks, according to the cybersecurity firm. Strong passwords and multifactor authentication should be implemented, the business emphasized.
An authentic open-source program that can mine the Monero coin is the XMRig. On the other hand, since 2020, hackers have been installing the program into various systems using a variety of ways, integrating it into their attacks.
Comment 0