{"id":1117672,"date":"2023-09-09T21:08:38","date_gmt":"2023-09-10T01:08:38","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/attackers-leverage-windows-advanced-installer-to-drop-sc-media\/"},"modified":"2023-09-09T21:08:38","modified_gmt":"2023-09-10T01:08:38","slug":"attackers-leverage-windows-advanced-installer-to-drop-sc-media","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/attackers-leverage-windows-advanced-installer-to-drop-sc-media\/","title":{"rendered":"Attackers leverage Windows Advanced Installer to drop &#8230; &#8211; SC Media"},"content":{"rendered":"<p><p>    Attackers with IP addresses based in France, Luxembourg and    Germany have been using Advanced Installer, a legitimate    Windows tool, for creating software packages to drop     cryptocurrency mining malware on computers across several    sectors.  <\/p>\n<p>    In a blog post Sept.    7, Cisco Talos researchers said the payloads included the    M3_Mini_RAT client stub. Such a remote access trojan would let    the attackers establish a backdoor and download and execute    additional threats, such as the Ethereum cryptocurrency mining    malware PhoenixMiner, and IOIMiner, a multi-coin mining threat.  <\/p>\n<p>    The Cisco Talos researchers said the campaign targets verticals    that are heavy users of 3D modeling and graphic design because    they use computers with high GPU specifications and powerful    graphics cards useful for generating    cryptocurrency. The researchers said the attackers used    Advanced Installer to package other legitimate software    installers such as Adobe Illustrator and Autodesk 3ds Max with    malicious scripts. They then leverage the Custom Action feature    in the Windows tool to make the software installers execute the    malicious scripts on computers in the architecture,    engineering, construction, manufacturing and engineering    sectors.  <\/p>\n<p>    These attacks predominantly target users in France and    Switzerland, the researchers said, with a few infections in    other areas, including the United States, Canada, Algeria,    Sweden, Germany, Tunisia, Madagascar, Singapore, and Vietnam.    Most of the software installers used in this campaign are    written in French, which supports the observation by Cisco    Talos that the campaign primarily targets French-speaking    users.  <\/p>\n<p>    Long-running, persistent campaigns like this are subtle and    difficult to detect, but can have a lasting impact on    organizations, explained Shawn Surber, senior director of    technical account management at Tanium. Surber said once an    attacker gets this deep inside a network, they are often doing    a lot more than just hijacking GPU cycles: they can gather and    exfiltrate confidential data and plant logic bombs that could    turn their stealth attack into a loud ransomware boom.  <\/p>\n<p>    Even if they don't, the draw on these powerful GPU systems can    have a significant financial and operational effect by slowing    work output, shortening the lifespan of expensive hardware, and    significantly increasing power usage, Surber said.  <\/p>\n<p>    Such attacks are good examples of why operations and security    teams need to work together across their traditional silos, he    continued. \"Once inside, this type of attack is virtually    invisible to traditional security tools, so it's important that    operational tools, like performance monitoring, be tuned to    observe and alert on anomalous behavior like this.  <\/p>\n<p>    Callie Guenther, cyber threat research senior manager at    Critical Start, added that threat actors have numerous    motivations and methods for choosing their targets. Based on    this blog, Guenther said the threat actors have chosen a rather    indirect method to generate revenue via cryptomining by    targeting users of specific software installers, especially    those for 3D modeling and graphic design.  <\/p>\n<p>    Generally, banks by nature have some of the most robust    cybersecurity defenses in place, said Guenther. Breaking    directly into a bank's systems is a challenging endeavor that    carries a high risk of detection. It requires specialized tools    and methods, and the potential legal repercussions are    significant.  <\/p>\n<p>    By contrast, Guenther said individual users or businesses,    especially those in fields like 3D modeling or graphic design,    might not always have stringent cybersecurity measures. Such    machines are often equipped with powerful GPU resources vital    for design work, but equally valuable for cryptomining    operations.  <\/p>\n<p>    Cryptocurrency mining, especially on machines with high-end    GPUs, can be lucrative, and the malware can often run    stealthily in the background, consuming just a fraction of    available resources, said Guenther. This lets the malicious    activity persist longer, potentially going unnoticed by the    users. Moreover, trojanizing popular software installers offers    threat actors an easier distribution method. Leveraging tactics    like search engine optimization poisoning can lead to a higher    rate of downloads and subsequent infections. This method is    less complex than the multifaceted techniques required to    infiltrate a bank's defenses.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scmagazine.com\/news\/attackers-leverage-windows-advanced-installer-to-drop-cryptocurrency-malware-on-heavy-3d-graphics-users\" title=\"Attackers leverage Windows Advanced Installer to drop ... - SC Media\" rel=\"noopener\">Attackers leverage Windows Advanced Installer to drop ... - SC Media<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Attackers with IP addresses based in France, Luxembourg and Germany have been using Advanced Installer, a legitimate Windows tool, for creating software packages to drop cryptocurrency mining malware on computers across several sectors.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptocurrency-2\/attackers-leverage-windows-advanced-installer-to-drop-sc-media\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94874],"tags":[],"class_list":["post-1117672","post","type-post","status-publish","format-standard","hentry","category-cryptocurrency-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1117672"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1117672"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1117672\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1117672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1117672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1117672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}