Hundreds of Russian devices hit by Rare Werewolf cryptomining attacks

Avatar

A hacker group known as Rare Werewolf has been hijacking computers across Russia and neighboring countries to secretly mine cryptocurrency, according to new research.

The cybercriminals are deploying XMRig software — a legitimate tool for mining crypto — on victims’ devices, said researchers at Russian cybersecurity firm Kaspersky. The campaign has affected hundreds of Russian users, particularly targeting industrial enterprises and engineering schools, with additional victims reported in Belarus and Kazakhstan.

Kaspersky said the attackers gain initial access through phishing emails written in Russian. These emails contain password-protected archives with malicious executable files and are typically disguised as messages from legitimate organizations, appearing to be official documents or payment orders.

Once inside the system, the hackers steal login credentials and install XMRig to generate cryptocurrency using the victims’ computing power. The hackers also use a novel method to maintain access and avoid detection, programming infected devices to shut down at 5 a.m. daily. Before the shutdown, a script launches Microsoft Edge at 1 a.m. to wake up the computer, giving the attackers a four-hour window to establish remote access.

The attackers collect information about available CPU cores and GPUs to optimally configure the crypto miner, and this data is sent to their servers, the report said.

Rare Werewolf has been active since at least 2019, according to previous reports. The group typically relies on legitimate third-party software and utilities rather than developing its own malicious tools to execute its attacks. The group’s origin has not yet been identified.

Kaspersky said the current campaign began in December 2024 and was ongoing as of last month, with attackers continuously refining their tactics. In addition to cryptocurrency mining, the group has also focused on stealing sensitive documents, passwords and compromising Telegram messenger accounts in their previous campaigns. 

The group’s methods — including the use of self-extracting archives and legitimate utilities — resemble those often associated with hacktivist groups, Kaspersky said.

XMRig has been widely abused by cybercriminals, who are consistently devising new methods to deliver the installer to victims’ devices. In previous cases targeting Russian firms, hackers delivered it through malicious versions of popular pirated games.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Next Post

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Related Posts

HackerFest 2024

September 26, 2024Location: Prague, Czech Republic The Czechoslovak security conference HackerFest will be held on September 26, 2024.…
Avatar
Read More

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users to fake websites masquerading as Kling AI with the goal of tricking victims into downloading malware. Kling AI is an artificial intelligence (AI)-powered platform to synthesize images and videos from text and image prompts. Launched in June 2024, it's developed by Kuaishou Technology,
Avatar
Read More