SteelFox Malware Exploits Vulnerable Driver to Hijack Windows PCs for Crypto Mining and Data Theft

The newly discovered SteelFox malware leverages a vulnerable driver to escalate privileges, enabling it to steal sensitive data and mine cryptocurrency on Windows machines. Distributed through cracked software on forums and torrent sites, SteelFox presents significant risks to users of popular programs like AutoCAD, JetBrains, and Foxit PDF Editor.
- Distribution Channels: SteelFox is spread via torrent trackers and online forums as cracked tools for legitimate software activation.
- Privilege Escalation: Uses the “bring your own vulnerable driver” method with WinRing0.sys to gain SYSTEM-level privileges.
- Multi-Faceted Attack: Combines cryptocurrency mining with data theft, targeting credit card data, browsing history, and other information.
- Browser Data Extraction: Retrieves sensitive details from 13 browsers, including saved credit card info and RDP connection data.
- Advanced Stealth: Hides command-and-control (C2) domain via Google Public DNS and DNS over HTTPS (DoH), making detection challenging.
- Global Reach: Primarily impacts users in Brazil, China, Russia, Mexico, and other regions, focusing on commonly cracked applications.

SteelFox is an advanced, multi-functional malware that combines cryptomining with data theft by exploiting a known vulnerability in Windows drivers. Users should exercise caution when downloading cracked software and maintain updated security solutions to defend against this rapidly spreading threat.
Comment(s)
Categories
- Other (42)
- Ransomware (148)
- Events and News (27)
- Features (45)
- Security (473)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (218)
- Cyber Attack (265)
- Data Backup (11)
- Data Breach (103)
- Phishing (159)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (57)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (6)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
Recent Posts
Archive
Tags
cyber attack
phishing
phishing attacks
data breach
cyber threats
ransomware
ransomeware
phishing attack
malware
android malware
data theft
cyberthreats
cyber security
credential theft
financial security
phishingattack
cybercrime
data stealing
phishing scam
network security
ddos attack
data security
critical vulnerability
net protector total security
trojan
cert-in
financial fraud
phishing email
microsoft
lockbit
cybercriminals
cyberattack
cyber crime
ddos
cyber threat
data protection
india
twitter
cyber fraud
clop
ransomware attacks
server security
malicious apps
android apps
credit card theft
play store
databreach
pakistan-backed hacker
winrar
email phishing