Advanced Crypto Mining Malware Targets Air-Gapped Systems


Sophisticated Monero mining malware spreads through external drives and infects air-gapped networks. Trellix researchers uncovered the multi-stage campaign in late 2025 that uses kernel exploits and self-healing processes. It propagates via USB devices with deceptive hidden folders and shortcuts.

The infection starts with pirated office software bundles. Once running, it deploys controller and payload components. Watchdog processes ensure persistence by resurrecting terminated modules within seconds.

The malware monitors USB insertions continuously. When drives connect, it copies itself automatically and creates hidden persistence mechanisms. This worm-like behavior breaches air-gapped systems through physical media transfer.

Malware Architecture

Controller handles lightweight monitoring and decision logic. Payloads execute resource-heavy mining and defense operations. Separation avoids security tool detection.

Self-healing mechanism:

  • Watchdog monitors critical processes
  • Termination triggers immediate resurrection
  • Circular dependencies prevent full removal
  • Multiple redundant components

Mining uses RandomX algorithm optimized for Monero. Kernel access boosts hashrate 15-50%.

Kernel Exploitation Details

BYOVD technique: Drops legitimate WinRing0x64.sys driver with CVE-2020-14979.
Privilege escalation: Gains Ring 0 kernel access through vulnerable driver.
CPU optimization: Modifies Model Specific Registers to disable prefetchers.
Mining boost: 15-50% hashrate improvement without custom drivers.

Signed vulnerable driver bypasses protections. No malicious kernel code needed.

Propagation Method

VectorMechanismImpact
USB DrivesAuto-copy + hidden shortcutsNetwork lateral movement
External HDDsHidden persistence foldersAir-gapped infection
Pirated SoftwareInitial infection vectorBroad distribution

USB infection flow:

  1. Monitors WMI for device insertion events
  2. Copies malware to hidden system folder
  3. Creates deceptive LNK shortcuts
  4. Autorun.inf triggers on next insertion

Defensive Capabilities

Malware actively terminates:

  • Security software processes
  • Windows Explorer (explorer.exe)
  • Antivirus services
  • EDR endpoints

Controller remains stealthy while payloads execute aggressive defense.

Temporal Controls

Hardcoded deadline: December 23, 2025

  • Before: Full infection and mining
  • After: Cleanup mode deletes files, terminates components

Suggests planned campaign lifecycle.

File Inventory Table

ComponentPurposeLocation
WinRing0x64.sysKernel accessSystem32/drivers
Controller.exeMonitoring/decision%AppData% hidden
Miner payloadMonero miningTemp directories
WatchdogSelf-healingStartup persistence
USB dropperPropagationHidden autorun

Detection Indicators

Process anomalies:

  • explorer.exe termination events
  • Unusual CPU register modifications
  • WinRing0x64.sys loading

Network:

  • Monero mining pool connections
  • Consumer-grade pool IPs

File system:

  • Hidden USB folders with LNK files
  • Suspicious driver deployments

Protection Measures

Immediate:

  • Enable Microsoft Vulnerable Driver Blocklist
  • Device control policies for removable media
  • Block WinRing0x64.sys loading

Preventive:

  • Ban pirated software downloads
  • Web filtering for mining pools
  • USB device encryption/monitoring

Defender Actions

  • Hunt for WinRing0x64.sys across endpoints
  • Monitor USB insertion events
  • Check CPU MSRs for mining optimizations
  • Analyze explorer.exe crashes

FAQ

How does malware spread?

USB drives with hidden autorun folders. 

What kernel exploit used?

CVE-2020-14979 in legitimate WinRing0x64.sys driver.

Air-gapped infection possible?

Yes, through physical USB media transfer.

Self-healing mechanism?

Watchdog resurrects terminated components instantly.

Mining optimization?

Disables CPU prefetchers via MSRs; 15-50% hashrate boost.

Campaign end date?

December 23, 2025 triggers cleanup mode.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages