Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto Mining Malware Targets Air-Gapped Systems via USB

Crypto Mining Malware Targets Air-Gapped Systems via USB

Posted on February 19, 2026 By CWS

A new and sophisticated cryptocurrency mining campaign has been identified, posing a threat to systems via external storage devices, with the capability to infiltrate even air-gapped environments. This malware uses advanced techniques to ensure persistence and expand its reach.

Infection Mechanics and Propagation

The malware initiates its attack through pirated software that pretends to be legitimate office productivity suite installers. Once activated, it deploys multiple components that work together to maintain its presence and maximize Monero cryptocurrency mining output. Its persistence is further supported by watchdog processes that ensure the malware can recover quickly if any component is terminated.

What sets this campaign apart is its ability to spread through external drives. When a user connects a USB flash drive or an external hard disk, the malware automatically transfers itself to the device, creating hidden folders with misleading shortcuts. This enables the malware to move across networks, even affecting air-gapped systems through physical media transfer.

Technical Sophistication and Kernel Exploitation

The malware employs kernel-level exploitation to enhance its performance. By using a Bring Your Own Vulnerable Driver technique, it deploys a legitimate but vulnerable driver, WinRing0x64.sys, which contains CVE-2020-14979. This allows the malware to gain kernel privileges, bypassing standard security measures.

With kernel access, the malware modifies CPU registers to optimize the RandomX mining algorithm, increasing the Monero mining efficiency by 15 to 50 percent. This is achieved without writing malicious drivers, utilizing the vulnerable driver’s valid digital signature instead.

Preventive Measures and Security Recommendations

The campaign operates with a planned lifecycle, utilizing temporal controls that activate cleanup routines after December 23, 2025, suggesting strategic planning by the attackers. To combat this threat, organizations are advised to enforce Microsoft’s Vulnerable Driver Blocklist and implement device control policies to restrict the use of removable media.

Additionally, security teams should configure web filtering to block connections to mining pools and raise awareness about the risks of pirated software. These steps are crucial in preventing the spread of this sophisticated malware.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Make CSN a preferred source on Google for instant news.

Cyber Security News Tags:air-gapped systems, crypto-mining, Cybersecurity, device control policies, kernel-level exploitation, Malware, Monero, network security, USB drives, vulnerable drivers

Post navigation

Previous Post: Deutsche Bahn Faces Major DDoS Attack Disruption
Next Post: Microsoft Defender Boosts Threat Response with New Script Library

Related Posts

Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication Cyber Security News
Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions Cyber Security News
New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks New Streamlit Vulnerability Allows Hackers to Launch Cloud Account Takeover Attacks Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
Malicious Outlook Add-in Exposes 4,000 Accounts Malicious Outlook Add-in Exposes 4,000 Accounts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News