Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Fake Resumes to Launch Crypto Miners

Hackers Exploit Fake Resumes to Launch Crypto Miners

Posted on March 24, 2026 By CWS

An alarming phishing operation is currently targeting French-speaking businesses by utilizing counterfeit resumes to introduce cryptocurrency miners and information-stealing malware into systems. This campaign, revealed by Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee, employs heavily obfuscated VBScript files that masquerade as resume documents sent via phishing emails.

Phishing Tactics and Attack Methodology

The attack, codenamed FAUX#ELEVATE, is notable for exploiting legitimate services and infrastructures for malicious purposes. The attackers use Dropbox to stage payloads, Moroccan WordPress sites for hosting command-and-control configurations, and mail[.]ru SMTP servers to extract stolen credentials and files. This strategy exemplifies a ‘living-off-the-land’ approach, allowing attackers to bypass defenses and infiltrate targets discreetly.

Once executed, the script performs various checks to avoid sandbox detection and initiates a persistent User Account Control loop, urging users to execute it with elevated privileges. Despite its large size of 9.7MB, the script contains only a small fraction of executable code, with the remainder being filled with irrelevant comments to obfuscate its intent.

Advanced Techniques for Credential Theft

After gaining administrative access, the malware swiftly disables security features and conceals its presence by altering Microsoft Defender settings and disabling User Account Control through registry tweaks. It retrieves two password-protected 7-Zip archives from Dropbox: one containing executables for data theft and cryptocurrency mining, and the other equipped with tools for maintaining persistence and cleanup.

The attackers employ components like the ChromElevator project to bypass encryption protections and extract data from browsers. Additional tools include a VBScript for stealing Mozilla Firefox credentials and another for exfiltrating desktop files. An XMRig cryptocurrency miner, activated by a configuration from a compromised site, and a Windows kernel driver to enhance CPU mining capabilities are also used in the attack.

Implications and Future Outlook

The exfiltration of browser data is executed via two mail[.]ru accounts with identical passwords, targeting another email managed by the threat actors. Following the completion of credential theft and data exfiltration, the operation initiates a thorough cleanup to minimize its forensic footprint, leaving only the miner and Trojan components behind.

Securonix highlights the FAUX#ELEVATE campaign as a sophisticated, multi-stage operation that seamlessly combines several advanced techniques. The rapid execution, completing the infection chain in about 25 seconds, and the selective targeting of enterprise machines, make this campaign particularly perilous for corporate security teams. As businesses grapple with such threats, enhancing vigilance and implementing robust security protocols remain crucial to safeguard critical data and resources.

The Hacker News Tags:attack chain, ChromElevator, credential theft, cryptocurrency mining, Cybersecurity, data exfiltration, endpoint security, enterprise security, fake resumes, living-off-the-land, Malware, Monero mining, Phishing, Securonix, VBScript

Post navigation

Previous Post: Roundcube Webmail Update Fixes Critical Security Flaws
Next Post: Israel Leverages Iran’s Surveillance for Strategic Advantage

Related Posts

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows The Hacker News
Adds Device Fingerprinting, PNG Steganography Payloads Adds Device Fingerprinting, PNG Steganography Payloads The Hacker News
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution The Hacker News
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark