Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto Mining Malware Targets Air-Gapped Systems via USB

Crypto Mining Malware Targets Air-Gapped Systems via USB

Posted on February 19, 2026 By CWS

A new and sophisticated cryptocurrency mining campaign has been identified, posing a threat to systems via external storage devices, with the capability to infiltrate even air-gapped environments. This malware uses advanced techniques to ensure persistence and expand its reach.

Infection Mechanics and Propagation

The malware initiates its attack through pirated software that pretends to be legitimate office productivity suite installers. Once activated, it deploys multiple components that work together to maintain its presence and maximize Monero cryptocurrency mining output. Its persistence is further supported by watchdog processes that ensure the malware can recover quickly if any component is terminated.

What sets this campaign apart is its ability to spread through external drives. When a user connects a USB flash drive or an external hard disk, the malware automatically transfers itself to the device, creating hidden folders with misleading shortcuts. This enables the malware to move across networks, even affecting air-gapped systems through physical media transfer.

Technical Sophistication and Kernel Exploitation

The malware employs kernel-level exploitation to enhance its performance. By using a Bring Your Own Vulnerable Driver technique, it deploys a legitimate but vulnerable driver, WinRing0x64.sys, which contains CVE-2020-14979. This allows the malware to gain kernel privileges, bypassing standard security measures.

With kernel access, the malware modifies CPU registers to optimize the RandomX mining algorithm, increasing the Monero mining efficiency by 15 to 50 percent. This is achieved without writing malicious drivers, utilizing the vulnerable driver’s valid digital signature instead.

Preventive Measures and Security Recommendations

The campaign operates with a planned lifecycle, utilizing temporal controls that activate cleanup routines after December 23, 2025, suggesting strategic planning by the attackers. To combat this threat, organizations are advised to enforce Microsoft’s Vulnerable Driver Blocklist and implement device control policies to restrict the use of removable media.

Additionally, security teams should configure web filtering to block connections to mining pools and raise awareness about the risks of pirated software. These steps are crucial in preventing the spread of this sophisticated malware.

Stay informed with the latest updates in cybersecurity by following us on Google News, LinkedIn, and X. Make CSN a preferred source on Google for instant news.

Cyber Security News Tags:air-gapped systems, crypto-mining, Cybersecurity, device control policies, kernel-level exploitation, Malware, Monero, network security, USB drives, vulnerable drivers

Post navigation

Previous Post: Deutsche Bahn Faces Major DDoS Attack Disruption
Next Post: Microsoft Defender Boosts Threat Response with New Script Library

Related Posts

CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks CISA Warns of Citrix Netscaler 0-day RCE Vulnerability Exploited in Attacks Cyber Security News
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Cyber Security News
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild Cyber Security News
Silver Fox APT Employs Advanced Malware Tactics in Asia Silver Fox APT Employs Advanced Malware Tactics in Asia Cyber Security News
VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store Cyber Security News
Top 10 Best Autonomous Endpoint Management Tools in 2025 Top 10 Best Autonomous Endpoint Management Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark