In a recent cybersecurity development, hackers have been leveraging popular YouTubers to distribute SilentCryptoMiner, a covert cryptocurrency mining malware, under the guise of restriction bypass tools.
The campaign, which has affected over 2,000 victims in Russia, exploits the growing demand for Windows Packet Divert drivers used in various utilities for bypassing network restrictions.
Malware Campaign Exploits Restriction Bypass Tools
The attackers employed a sophisticated approach, blackmailing content creators with copyright strikes to force them into posting links to infected files.
This manipulation of YouTubers’ reputation has led to the malware being distributed through channels with significant followings, including one with 60,000 subscribers.

The infection chain begins with a malicious archive containing a modified start script and an additional executable.
According to the Secure List Report, this loader, written in Python and packed using PyInstaller, downloads a second-stage payload from predetermined domains.
The second-stage loader performs environment checks, adds exclusions to Microsoft Defender, and ultimately installs the SilentCryptoMiner.
Blackmail Tactics and Infection Chain
SilentCryptoMiner, based on the open-source XMRig miner, is capable of mining multiple cryptocurrencies using various algorithms.
It employs process hollowing techniques to inject its code into system processes, enhancing its stealth capabilities.
The miner is configured to temporarily halt operations when specific programs are running and can be remotely controlled via a web panel.
The campaign’s sophistication is further evidenced by its use of file size manipulation to hinder automated analysis by antivirus solutions.
The malware expands its executable to between 680 MB and 800 MB by appending random data blocks.
This incident highlights the evolving tactics of cybercriminals, who are now exploiting the popularity of restriction bypass tools and leveraging social engineering techniques to distribute malware.
It serves as a stark reminder of the risks associated with using unauthorized tools to bypass network restrictions, even when they appear to come from trusted sources.
As this campaign primarily targeted users in Russia, it underscores the importance of maintaining vigilance against region-specific cyber threats.
Users worldwide should exercise caution when downloading and installing software, especially those promising to bypass network restrictions, and ensure their systems are protected with up-to-date security solutions.