DMR News

Advancing Digital Conversations

Hackers Exploit Email Auto-Reply Feature to Stealthily Mine Cryptocurrency

ByDayne Lee

Sep 28, 2024

Hackers Exploit Email Auto-Reply Feature to Stealthily Mine Cryptocurrency

Cybersecurity experts have unveiled a new method by which hackers are infiltrating systems to conduct stealthy cryptocurrency mining. This technique exploits the automated email reply feature commonly used in business communications. Researchers from Facct, a threat intelligence firm, have observed this tactic being primarily used to target Russian corporations, marketplaces, and financial institutions, embedding malware through seemingly innocuous auto-replies.

Discovery of the Exploit

Facct’s team has tracked the use of this novel delivery mechanism since the end of May, identifying over 150 emails embedded with the XMRig miner, a legitimate open-source application repurposed by hackers to mine the Monero cryptocurrency on compromised devices. Despite the innovative use of auto-replies, Facct’s email protection systems have successfully intercepted these malicious emails before they could reach client systems.

The strategy hinges on the trust and expectation built into the auto-reply system. Unlike typical phishing attempts where recipients might ignore unsolicited emails, this method leverages the fact that the initial contact comes from the victim themselves. When victims receive an auto-reply, they are less likely to suspect foul play, as they anticipate a response from their initial communication.

Previous Incidents

The exploitation of the XMRig miner is not new; it has been a component of various cyberattacks since 2020:

  • June 2020: The “Lucifer” malware exploited vulnerabilities in older Windows systems to install XMRig.
  • August 2020: The “FritzFrog” malware botnet targeted millions of IP addresses, including those of government offices, educational institutions, and financial organizations, to deploy the XMRig mining app.

These incidents underline the continuous evolution of cyber threats and the increasingly sophisticated methods employed by hackers to exploit digital systems for financial gain.

In light of these findings, Facct’s senior analyst, Dmitry Eremenko, emphasizes the need for heightened vigilance and improved security practices:

  • Employee Training: Regular sessions to update staff on the latest cybersecurity threats and prevention techniques.
  • Strong Authentication: Implementation of robust passwords and multifactor authentication to safeguard access to systems.
  • Device Diversification: Ethical hacker Marwan Hachem suggests using different communication devices to isolate and limit exposure to potential malware.

The discovery of hackers using email auto-replies to distribute crypto-mining malware highlights a critical vulnerability in digital communication systems. As cybercriminals continue to exploit these weaknesses, the importance of advanced protective measures and continuous monitoring of network interactions becomes ever more apparent. Businesses and individuals alike must stay informed and proactive in implementing security measures to safeguard their digital environments against such insidious threats.


Featured image credit: rawpixel via Freepik

Follow us for more breaking news on DMR

Dayne Lee

With a foundation in financial day trading, I transitioned to my current role as an editor, where I prioritize accuracy and reader engagement in our content. I excel in collaborating with writers to ensure top-quality news coverage. This shift from finance to journalism has been both challenging and rewarding, driving my commitment to editorial excellence.

Leave a Reply

Your email address will not be published. Required fields are marked *