Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations

Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations

Posted on December 5, 2025December 5, 2025 By CWS

Cybercriminals are actively spreading CoinMiner malware by USB drives, concentrating on workstations throughout South Korea to mine Monero cryptocurrency.

This ongoing marketing campaign makes use of misleading shortcut information and hidden folders to trick customers into executing malicious scripts with out their data.

The assault leverages a mixture of VBS, BAT, and DLL information that work collectively to put in XMRig, a preferred cryptocurrency mining device, on contaminated methods.

The malware hides inside a folder named “sysvolume” on contaminated USB drives, displaying solely a shortcut file labeled “USB Drive.lnk” to the consumer.

When victims double-click this file, it triggers a series of malicious operations whereas concurrently opening a folder containing their authentic information.

Flowchart (Supply – ASEC)

This enables customers to entry their knowledge usually, making the an infection troublesome to detect. ASEC safety researchers recognized this malware pressure of their ongoing evaluation of USB-based threats.

The attackers have refined their methods since earlier variations documented in February 2025, with Mandiant categorizing these threats as DIRTYBULK and CUTFAIL of their July 2025 report.

The an infection begins when customers execute the misleading shortcut file, which runs a VBS script with a randomly generated filename similar to “u566387.vbs”.

This script then triggers BAT malware that performs a number of essential operations, together with including Home windows Defender exclusion paths and making a folder with an area in its identify at “C:Home windows System32” to evade detection.

Information contained in the contaminated USB (Supply – ASEC)

The BAT script copies and renames the dropper malware as “printui.dll” and hundreds it by the respectable “printui.exe” program.

An infection Mechanism and Persistence Ways

The dropper part establishes persistence by registering a DLL with the DcomLaunch service.

Malware set up scripts (Supply – ASEC)

As soon as registered, the malware designated as PrintMiner adjusts system energy settings to forestall sleep mode and communicates with command-and-control servers to obtain encrypted payloads.

The decrypted information embrace XMRig configured to mine Monero utilizing the next parameters:-

-o r2.hashpoolpx[.]internet:443 –tls –max-cpu-usage=50

The malware displays working processes and terminates XMRig when customers launch video games or course of monitoring instruments like Course of Explorer, Process Supervisor, and System Informer.

Course of tree (Supply – ASEC)

This evasion approach helps the miner keep away from detection whereas decreasing efficiency impacts that may alert customers. USB-based assaults stay efficient when mixed with social engineering.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, CoinMiner, Deploying, Drives, Infecting, Malware, Threat, USB, Workstations

Post navigation

Previous Post: MuddyWater Hackers Using UDPGangster Backdoor to Attack Windows Systems Evading Network Defenses
Next Post: Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

Related Posts

Authorities Seized Thousands of Servers from Rogue Hosting Company Used to Fuel Cyberattacks Authorities Seized Thousands of Servers from Rogue Hosting Company Used to Fuel Cyberattacks Cyber Security News
SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature Cyber Security News
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them 5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them Cyber Security News
Chinese MURKY PANDA Attacking Government and Professional Services Entities Chinese MURKY PANDA Attacking Government and Professional Services Entities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News