A new malware campaign, known as SilentCryptoMiner, has infected over 2,000 Russian users by disguising itself as a tool for bypassing internet restrictions.
Cybercriminals are spreading the malware by using Windows Packet Divert (WPD) tools to distribute malicious software.
The malware is concealed within booby-trapped archives and delivered in two stages, using Python scripts and process hollowing techniques.
The SilentCryptoMiner is built on the open-source XMRig, making it harder to be detected by antivirus tools, and can be controlled remotely via a web panel.