Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Cryptojacking Campaign Exploits Vulnerable Drivers to Evade Security and Gain Privileges

    New Cryptojacking Campaign Exploits Vulnerable Drivers to Evade Security and Gain Privileges

    May 22, 2024

    Cybersecurity researchers uncovered a sophisticated cryptojacking campaign that leverages vulnerable drivers to disable well-known security solutions, thereby evading detection.

    This technique that allows attackers to perform privileged actions through the exploit of known flaws in signed drivers is referred to as a Bring Your Own Vulnerable Driver (BYOVD) attack.

    Campaign Deploys GHOSTENGINE Payload

    Researchers from Elastic Security Labs identified the new cryptojacking campaign referred to it as REF4578. The campaign uses the GHOSTENGINE core payload to deactivate security tools, complete the initial infection, and execute a crypto-miner. Researchers from Antiy Labs also observed the campaign, referring to it as HIDDEN SHOVEL.

    The campaign was found to primarily target servers in China, with significant impacts also reported in Hong Kong, the Netherlands, Japan, the U.S., Germany, South Africa, and Sweden. The exact scope and the identities of the threat actors behind the campaign remain unknown.

    The attack begins with the execution of an executable file named “Tiworker.exe,” which masquerades as a legitimate Windows file. This executable runs a PowerShell script that retrieves an obfuscated script called “get.png” from the attacker’s command-and-control (C2) server.

    The “get.png” script then attempts several actions such as disabling Microsoft Defender Antivirus, clearing Windows System/Security event logs and creating scheduled tasks for continued persistence. The script also checks for a minimum of 10MB storage space before downloading additional malicious modules, including:

    aswArPot.sys: A vulnerable Avast driver used to terminate EDR processes.
    IObitUnlockers.sys: A vulnerable IObit driver used to delete security agent binaries.
    smartsscreen.exe: The core payload (GHOSTENGINE) responsible for deactivating security processes and executing the XMRig miner.
    oci.dll: A DLL used for persistence and updating the malware.
    backup.png: A PowerShell script functioning as a backdoor for remote command execution.
    kill.png: A PowerShell script designed to inject and load an executable file to delete security agents.

    The PowerShell script creates multiple scheduled tasks to ensure persistence:

    “OneDriveCloudSync” runs a malicious service DLL every 20 minutes.
    “DefaultBrowserUpdate” runs a batch script every hour.
    “OneDriveCloudBackup” executes “smartsscreen.exe” every 40 minutes.

    Subsequently, the XMRig miner is downloaded and executed to mine cryptocurrency. XMRig is a legitimate high-performance open-source application able to mine the monero cryptocurrency and is commonly used by threat actors. A configuration file directs all generated cryptocurrency to an attacker-controlled wallet.

    The campaign incorporates several fallback mechanisms to ensure continued operation. If the primary C2 domains are unavailable, it uses backup servers and an FTP-based fallback system. The PowerShell script “kill.png” provides redundancy by having similar capabilities as “smartsscreen.exe” to delete security agent binaries.

    The malware also uses a DLL file (“oci.dll”) loaded by a Windows service to maintain additional persistence and download further updates from the C2 server.

    Attackers Employ BYOVD Technique To Escalate Privileges and Evade Detection

    The drivers exploited in the campaign run at ring 0, the highest level of privilege offered in the operating system, allowing for direct access to critical system resources. The threat actors exploit the Avast driver “aswArPot.sys” to terminate security processes and the IObit driver “IObitUnlockers.sys” to delete security agent binaries.

    As the attack evades Endpoint Detection and Response (EDR) systems, to defend against this sophisticated campaign, security teams should monitor for unusual PowerShell execution, suspicious process activities and network traffic pointing to the identified crypto-mining pools.

    The researchers have provided YARA rules to help identify GHOSTENGINE infections. Additionally, organizations should consider blocking the creation of files by vulnerable drivers such as “aswArPot.sys” and “IObitUnlockers.sys.”

    The advanced level of sophistication demonstrated in the REF4578/HIDDEN SHOVEL cryptojacking campaign makes it a cause of concern and demands urgent remediate action.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBEC and Healthcare Benefits Scammer Sentenced to 10 Years Over $4.5M Fraud
    Next Article Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-47893 – VMware GPU Firmware Memory Disclosure

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    The Perfect Colour Palette For Your Website

    Development

    The best vlogging cameras of 2024: Expert tested and reviewed

    Development

    UX/UI Case Study: Designing a World-Class Investing Experience for Garanti BBVA Securities

    Development
    Model Resource Helper Functions in Laravel 12.7

    Model Resource Helper Functions in Laravel 12.7

    Development
    Hostinger

    Highlights

    The Art of Simple Presentations

    June 15, 2024

    Apple: compared to WWDC 2023, in which Apple started with a reserved, if not slightly…

    CVE-2021-32601 – Apache Struts Deserialization Vulnerability

    April 25, 2025

    Researchers at Oxford Presented Policy-Guided Diffusion: A Machine Learning Method for Controllable Generation of Synthetic Trajectories in Offline Reinforcement Learning RL

    April 16, 2024

    Using withoutWrapping to flatten API responses

    December 20, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.