silentcryptominer

The Rise of Windows Packet Divert Abuse

In recent months, a surge in the use of Windows Packet Divert (WinDivert) drivers has been observed, primarily to intercept and modify network traffic on Windows systems. These drivers, widely used in legitimate utilities to bypass internet restrictions, have become an attractive tool for cybercriminals.

Over the past six months, over 2.4 million detections of WinDivert drivers on user devices have been logged, signaling a troubling trend. Attackers are now exploiting these tools by embedding malware into restriction bypass software, deceiving unsuspecting users into infecting their own devices.

How Attackers Exploit WinDivert for Malware Distribution

Cybercriminals have adapted their strategies to spread stealers, remote access tools (RATs), and cryptocurrency miners under the guise of legitimate network tools. Some of the most commonly used malware families include:

  • NJRat
  • XWorm
  • Phemedrone
  • DCRat

These malicious applications are often distributed as compressed archives with installation instructions. Users are instructed to disable their security software due to “false positives,” a tactic that allows the malware to remain undetected on an unprotected system.


Blackmail as a New Infection Scheme

A disturbing new malware campaign has emerged, using blackmail tactics to force YouTubers to distribute SilentCryptoMiner, a covert cryptocurrency miner. Attackers masquerade as developers of legitimate restriction bypass tools and leverage copyright strikes to coerce content creators into sharing malicious links in their video descriptions.

Case Study: A YouTuber’s Forced Compliance

One significant case involved a YouTuber with 60,000 subscribers, who uploaded tutorials on bypassing internet restrictions. Their videos included download links to a malicious archive hosted on a site called gitrok[.]com. At its peak, this link received over 40,000 downloads before being taken down.

Further discussions revealed that attackers were striking videos with copyright claims and threatening channel bans unless content creators agreed to promote infected files.

Manipulation at Scale

  • One affected YouTube video reached over 400,000 views before the malicious link was removed.
  • A Telegram channel with 340,000 subscribers was also identified distributing infected builds.
  • Since December 2024, reports of miner-infected versions of these tools have surfaced across multiple YouTube and Telegram channels.

Inside the Infected Archives

Each discovered infected archive contained a hidden executable file, cleverly embedded within a modified start script (general.bat).

Malware Execution Breakdown

  1. If security software removes the malware, the script prompts the user to disable their antivirus and re-download the file.
  2. The script launches a Python-based loader, which fetches additional malware from a hardcoded domain.
  3. Obfuscation techniques include:
    • Packing the malware with PyInstaller
    • Encoding data using PyArmor

Example of the Malicious Python Loader:

malware malicious python loader

SilentCryptoMiner: The Hidden Threat

Stealth Tactics & Execution

The SilentCryptoMiner variant is based on XMRig, an open-source miner. To evade detection, it:

  • Uses process hollowing to inject itself into system processes (e.g., dwm.exe).
  • Monitors running processes and stops mining when task managers or monitoring tools (e.g., Taskmgr.exe, ProcessHacker.exe) are detected.
  • Obfuscates configurations using AES encryption.

Example of the Miner Configuration

The miner retrieves its configuration from Pastebin, an online service commonly used by malware operators to distribute command-and-control (C2) instructions.


Takeaways: Protecting Against This Threat

This campaign underscores the dangers of downloading restriction bypass tools from unverified sources. While this specific attack involved a miner, future campaigns could deploy more advanced threats, including data theft, banking malware, and ransomware.

How to Stay Safe

Never disable security software based on installation instructions.
Download tools only from official sources (GitHub, vendor websites).
Beware of software requiring manual execution of scripts.
Verify YouTube video descriptions & comments for suspicious edits.
Monitor system performance—unexpected slowdowns could indicate mining activity.


Indicators of Compromise (IOCs)

Infected Archives

  • 574ed9859fcdcc060e912cb2a8d1142c
  • 91b7cfd1f9f08c24e17d730233b80d5f

Malicious Domains & IPs

  • hxxp://gitrok[.]com
  • hxxp://swapme[.]fun
  • hxxp://canvas[.]pet
  • hxxp://9x9o[.]com
  • 193.233.203[.]138
  • 150.241.93[.]90

This campaign demonstrates how cybercriminals exploit popular demand for restriction bypass tools, tricking both content creators and users into spreading SilentCryptoMiner. Staying informed and practicing security awareness is key to avoiding these threats.

See the full story here

Secure Your Internet with a VPNNordVPN (Up to 72% Off)
Protect Your Passwords with a Password ManagerNordPass (Secure & Encrypted)

📌 More Cybersecurity and Online Privacy News: StealthAnon.com

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *