Archetyp Links

Dark Mode

Article Details

New Malware uses Windows Character Map to minister cryptocurrencies

Published on September 9, 2025

According to the DarkTrace artificial intelligence cybersecurity company, a new hacker campaign is bringing malicious cryptomineration software to Windows computers through an ingenious infiltration process.Practice is known as Cryptojacking, when PC processing power is used to minister cryptocurrencies for hackers. Those responsible for the analysis were cyberanalist Keanna Gralicha and the leader researcher of threats Tara Gould.The company team noticed the event in a customer through the use of a new PowerShell agent, an unusual indicative of foreign activities on the network.This is the first time a specific tool - an overshadowed loader - has been used to bring malicious computers software, in this case the NBMiner. Invasion through the character map Canaltech is on WhatsApp!Enter the channel and follow news and technology tips WhatsApp Continues after advertising Analyzes showed the complex script path to download and run cryptomineration malware directly from the computer RAM.The initial code was disguised under several layers of other codes, evading detection.Injection was done by applying Character Mapping (Charmap.exe), using various tactics to hide, how to check for programs like the task manager was open and if Windows Defender was the only installed security software. Once active, the cryptocurrency miner tried to connect with a mining pool called gulf.moneroocean.stream, to start working.Thus, malware silently increased its privileges and continued hidden, avoiding Red Flags commonly observed by security programs.Cryptomineration remains a great threat as it can be cast in infecting several devices at once. Although initially “only” affects the electricity bill and computer velocity, Cryptojacking can lead to other problems, such as personal data theft and espionage.DarkTrace has managed to contain the threat by preventing the infected device from connecting to hacker servers, but the incident shows how important measures are important, including the active blockade of invaders. See also: Video |Why does Bitcoin look like pyramid and other blows? Continues after advertising Source: DarkTrace