Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto Mining Malware Targets Air-Gapped Systems via USB

Crypto Mining Malware Targets Air-Gapped Systems via USB

Posted on February 19, 2026 By CWS

A new and sophisticated cryptocurrency mining campaign has been identified, posing a threat to systems via external storage devices, with the capability to infiltrate even air-gapped environments. This malware uses advanced techniques to ensure persistence and expand its reach.

Infection Mechanics and Propagation

The malware initiates its attack through pirated software that pretends to be legitimate office productivity suite installers. Once activated, it deploys multiple components that work together to maintain its presence and maximize Monero cryptocurrency mining output. Its persistence is further supported by watchdog processes that ensure the malware can recover quickly if any component is terminated.

What sets this campaign apart is its ability to spread through external drives. When a user connects a USB flash drive or an external hard disk, the malware automatically transfers itself to the device, creating hidden folders with misleading shortcuts. This enables the malware to move across networks, even affecting air-gapped systems through physical media transfer.

Technical Sophistication and Kernel Exploitation

The malware employs kernel-level exploitation to enhance its performance. By using a Bring Your Own Vulnerable Driver technique, it deploys a legitimate but vulnerable driver, WinRing0x64.sys, which contains CVE-2020-14979. This allows the malware to gain kernel privileges, bypassing standard security measures.

With kernel access, the malware modifies CPU registers to optimize the RandomX mining algorithm, increasing the Monero mining efficiency by 15 to 50 percent. This is achieved without writing malicious drivers, utilizing the vulnerable driver’s valid digital signature instead.

Preventive Measures and Security Recommendations

The campaign operates with a planned lifecycle, utilizing temporal controls that activate cleanup routines after December 23, 2025, suggesting strategic planning by the attackers. To combat this threat, organizations are advised to enforce Microsoft’s Vulnerable Driver Blocklist and implement device control policies to restrict the use of removable media.

Additionally, security teams should configure web filtering to block connections to mining pools and raise awareness about the risks of pirated software. These steps are crucial in preventing the spread of this sophisticated malware.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Make CSN a preferred source on Google for instant news.

Cyber Security News Tags:air-gapped systems, crypto-mining, Cybersecurity, device control policies, kernel-level exploitation, Malware, Monero, network security, USB drives, vulnerable drivers

Post navigation

Previous Post: Deutsche Bahn Faces Major DDoS Attack Disruption
Next Post: Microsoft Defender Boosts Threat Response with New Script Library

Related Posts

AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks Cyber Security News
Hackers Exploited 73 0-Day Vulnerabilities and Earned ,024,750 Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750 Cyber Security News
Top 3 CISO Challenges And How To Solve Them  Top 3 CISO Challenges And How To Solve Them  Cyber Security News
DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools Cyber Security News
Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Cyber Security News
New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records
  • AI’s Impact on Cybersecurity Response Times
  • Hackers Exploit Cline’s npm Token for 8 Hours
  • Venice Security Secures $33M for Access Management

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • XWorm Malware Targets Latin American Businesses
  • Figure Tech Data Breach Exposes 1 Million User Records
  • AI’s Impact on Cybersecurity Response Times
  • Hackers Exploit Cline’s npm Token for 8 Hours
  • Venice Security Secures $33M for Access Management

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News