radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

sourceThe Hacker News
calendar_todayFebruary 23, 2026
schedule2 min read
lightbulb

EXECUTIVE SUMMARY

Sophisticated Cryptojacking Campaign Exploits BYOVD and Logic Bomb Tactics

Summary

A new cryptojacking campaign has been uncovered, leveraging pirated software to deploy a custom XMRig miner on compromised systems. The attack utilizes a Bring Your Own Vulnerable Driver (BYOVD) exploit and a time-based logic bomb to maximize cryptocurrency mining efficiency.

Key Points

  • The campaign uses pirated software bundles as a lure to distribute the XMRig miner.
  • It employs a BYOVD exploit, allowing attackers to bypass security measures by using legitimate but vulnerable drivers.
  • A time-based logic bomb is integrated, triggering the mining process at specific intervals to avoid detection.
  • The infection process is multi-stage, focusing on achieving high cryptocurrency mining hashrate.
  • The campaign can destabilize victim systems due to its resource-intensive mining activities.

Analysis

This campaign highlights the increasing sophistication of cryptojacking attacks, combining multiple advanced techniques to evade detection and maximize profits. The use of BYOVD exploits and logic bombs demonstrates a significant evolution in attack strategies, posing a heightened risk to systems running pirated software. IT professionals should be aware of these tactics to better protect their networks.

Conclusion

IT professionals should ensure that all software is legitimate and up-to-date, and implement robust security measures to detect and prevent cryptojacking activities. Regular monitoring for unusual system behavior can also help in identifying potential infections early.