By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
Computing

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

News Room
Last updated: 2026/04/02 at 9:03 AM
News Room Published 2 April 2026
Share
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
SHARE

Ravie LakshmananApr 02, 2026Cryptomining / Malware

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023.

“Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration,” Elastic Security Labs researchers Jia Yu Chan, Cyril François, and Remco Sprooten said in an analysis published this week.

Recent iterations of the campaign have also been found to deliver a previously undocumented .NET implant codenamed CNB Bot. These attacks leverage an ISO file as the infection vector to deliver a .NET Reactor-protected loader and a text file with explicit instructions to the user to bypass Microsoft Defender SmartScreen protections against running unrecognized applications by clicking on “More info” and “Run anyway.”

The loader is designed to invoke PowerShell, which is responsible for configuring broad Microsoft Defender Antivirus exclusions to fly under the radar and launch CNB Bot in the background. At the same time, the user is displayed an error message: “Unable to launch the application. Your system may not meet the required specifications. Please contact support.”

CNB Bot functions as a loader with capabilities to download and execute additional payloads, update itself, and uninstall and perform cleanup actions to cover up the tracks. It communicates with a command-and-control (C2) server using HTTP POST requests.

Other campaigns mounted by the threat actor have leveraged similar ISO lures to deploy PureRAT, PureMiner, and a bespoke .NET-based XMRig loader, the last of which reaches out to a hard-coded URL to extract the mining configuration and launch the miner payload.

As recently observed in the FAUX#ELEVATE campaign, “WinRing0x64.sys,” a legitimate, signed, and vulnerable Windows kernel driver, is abused to obtain kernel-level hardware access and modify CPU settings to boost hash rates, thereby enabling performance improvement. The use of the driver has been observed in many cryptojacking campaigns over the years. The functionality was added to XMRig miners in December 2019.

Elastic said it also identified another campaign that leads to the deployment of SilentCryptoMiner. The miner, besides using direct system calls to evade detection, takes steps to disable Windows Sleep and Hibernate modes, set up persistence via a scheduled task, and uses the “Winring0.sys” driver to fine-tune the CPU for mining operations.

Another notable component of the attack is a watchdog process that ensures the malicious artifacts and persistence mechanisms are restored in the event they are deleted. The campaign is estimated to have accrued 27.88 XMR ($9,392) across four tracked wallets, indicating that the operation is yielding consistent financial returns to the attacker.

“Beyond the C2 infrastructure, the threat actor abuses GitHub as a payload delivery CDN, hosting staged binaries across two identified accounts,” Elastic said. “This technique shifts the download-and-execute step away from operator-controlled infrastructure to a trusted platform, reducing detection friction.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Exclusive: Beehiiv expands into podcasting, taking aim at Patreon |  News Exclusive: Beehiiv expands into podcasting, taking aim at Patreon | News
Next Article Foldable Phones Have Solved Nearly Every Trade-Off, Well Before Apple Debuts One Foldable Phones Have Solved Nearly Every Trade-Off, Well Before Apple Debuts One
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

iPhone 18 Pro Will Not Be Back in Black This Year, Insider Says
iPhone 18 Pro Will Not Be Back in Black This Year, Insider Says
News
How to watch ‘Pizza Movie’ online from anywhere — stream Daniel Radcliffe comedy from anywhere
How to watch ‘Pizza Movie’ online from anywhere — stream Daniel Radcliffe comedy from anywhere
News
I Built a Wizard-Driven SaaS. Then I Had to Gut It for Customers Without Eyes | HackerNoon
I Built a Wizard-Driven SaaS. Then I Had to Gut It for Customers Without Eyes | HackerNoon
Computing
Save 60% on a Find My Tracker and Never Lose Your Wallet Again
Save 60% on a Find My Tracker and Never Lose Your Wallet Again
News

You Might also Like

I Built a Wizard-Driven SaaS. Then I Had to Gut It for Customers Without Eyes | HackerNoon
Computing

I Built a Wizard-Driven SaaS. Then I Had to Gut It for Customers Without Eyes | HackerNoon

17 Min Read
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Computing

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

4 Min Read
Startup launched by former AWS energy team emerges with M to help solve data center power crunch
Computing

Startup launched by former AWS energy team emerges with $7M to help solve data center power crunch

4 Min Read
Linux Fixes Performance Bug Affecting Qualcomm Ath11k & Ath12k WiFi Drivers
Computing

Linux Fixes Performance Bug Affecting Qualcomm Ath11k & Ath12k WiFi Drivers

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?