• Home
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • XRP
    • Litecoin
    • Altcoin
    • Cardano
    • Tether
    • DOGE
    • Solano
    • XLM
    • DOT
    • XDC
    • SHIBA
    • BNB
    • Ape
    • HBAR
    • QNT
  • Blockchain
  • Regulation
  • Market
  • Live
    • Prices
    • ICO
  • Meta
    • NFT
  • Technical Analysis
    • XRP
    • BTC
    • XLM
    • ADA
    • TETHER
    • ETC
    • ETH
    • DOGE
    • LTC
  • Exchange
  • Mining
Sunday, September 21, 2025
  • Login
  • Register
Coin24h.com
  • Home
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • XRP
    • Litecoin
    • Altcoin
    • Cardano
    • Tether
    • DOGE
    • Solano
    • XLM
    • DOT
    • XDC
    • SHIBA
    • BNB
    • Ape
    • HBAR
    • QNT
  • Blockchain
  • Regulation
  • Market
  • Live
    • Prices
    • ICO
  • Meta
    • NFT
  • Technical Analysis
    • XRP
    • BTC
    • XLM
    • ADA
    • TETHER
    • ETC
    • ETH
    • DOGE
    • LTC
  • Exchange
  • Mining
No Result
View All Result
  • Home
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • XRP
    • Litecoin
    • Altcoin
    • Cardano
    • Tether
    • DOGE
    • Solano
    • XLM
    • DOT
    • XDC
    • SHIBA
    • BNB
    • Ape
    • HBAR
    • QNT
  • Blockchain
  • Regulation
  • Market
  • Live
    • Prices
    • ICO
  • Meta
    • NFT
  • Technical Analysis
    • XRP
    • BTC
    • XLM
    • ADA
    • TETHER
    • ETC
    • ETH
    • DOGE
    • LTC
  • Exchange
  • Mining
No Result
View All Result
Coin24h.com
No Result
View All Result
Ledger Nano X - The secure hardware wallet
ADVERTISEMENT

Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger

30 August 2022
in Mining
Reading Time: 4 mins read
A A
0
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter
cryptotrader
ADVERTISEMENT

Researchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed through popular software download sites. The malicious payload delivery, which includes a cryptocurrency mining program, is done in stages with long delays that can add up to almost a month.

“After the initial software installation, the attackers delayed the infection process for weeks and deleted traces from the original installation,” researchers from security firm Check Point Software Technologies said in a new report. “This allowed the campaign to successfully operate under the radar for years.”

Trojanized app campaign began in 2019

According to the Check Point Research team, a Turkish-speaking software developer called Nitrokod is behind the campaign, which has been running since at least 2019. Nitrokod’s website claims that the developer has been creating free software applications including video and music converters, video downloaders and music players since 2017 with a combined install base of around 500,000 users.

Some of Nitrokod’s Trojanized programs can be found on app download sites such as Softpedia and Uptodown. The app Check Point analyzed is called Google Translate Desktop and is a desktop application that allows people to use Google Translate’s service, which is normally only available as a web service through a browser.

In fact, the Google Translate Desktop app itself is built using the open-source Chromium Embedded Framework (CEF) project that allows app developers to implement the Chrome browser in their apps to display web content. This allowed the Nitrokod authors to create functioning apps without too much effort.

In addition to Google Translate Desktop, the developer also distributes similarly built apps like Yandex Translate Desktop, Microsoft Translator Desktop, YouTube Music Desktop and Mp3 Download Manager, Pc Auto Shutdown. Check Point has identified users of these Trojanized applications in 11 countries.

Delayed malware deployment to avoid detection

Once the user downloads and installs an app, the deployment of malicious payloads doesn’t happen immediately, which is a strategy to avoid detection. First, the app installer, which is built with a free tool called Inno Setup, reaches out to the developer’s website and downloads a password-protected RAR archive that contains the application files. These are deployed under the Program Files (x86)\Nitrokod\[application name] path.

The app then checks for the presence of a component called update.exe. If it’s not found, it deploys it under the Nitrokod folder and sets up a system scheduled task to execute it after every restart. The installer then collects some information about the victim’s system and sends it to the developer’s server.

Up to this point, the installation is not very unusual for how a legitimate application would behave: collecting some system data for statistics purposes and deploying what looks like an automatic update component. However, after around four system restarts on four different days, update.exe downloads and deploys another component called chainlink1.07.exe. This mechanism of delaying the deployment and requiring multiple restarts is likely an attempt to defeat sandbox analysis systems, which do not test application behavior across multiple restarts.

The chainlink1.07.exe stager creates four different scheduled tasks that will execute with different delays. One of them, which executes every three days, uses PowerShell to delete system logs. Another one is set to execute every 15 days and downloads another RAR archive from a different domain that uses the intentionally deceptive name intelserviceupdate. A third scheduled task executes every two days and is set to unpack the RAR archive if it exists, while the fourth task executes every day and is set to execute another component from the archive.

Even though they are set to run with higher frequency, the third and fourth tasks don’t do anything until the 15-day delayed task that downloads the RAR archive runs, since otherwise there’s no archive to extract and no executable to execute.

“At this point, all related files and evidence are deleted and the next stage of the infection chain will continue after 15 days by the Windows utility schtasks.exe,” the researchers said. “This way, the first stages of the campaign are separated from the ones that follow, making it very hard to trace the source of the infection chain and block the initial infected applications.”

The new malicious component is an intermediary dropper that further prepares the system for the final stages. First, it checks the running processes for known virtual machine applications and security products and if any is found, it halts execution. If this check is passed, it adds a new firewall rule for the next components, as well as exclusions for them in Windows Defender.

Finally, the dropper deploys another component called nniawsoykfo1.8.exe, which then deploys two other executable files called nniawsoykfo.exe and powermanager.exe. The latter is a copy of the open-source XMRig cryptocurrency mining program, while the former is a component that controls the miner and connects to a domain with nvidiacenter in its name where the attackers’ common and control server is hosted.

The program sends information about the system such as idle time, number of CPU cores, whether it’s a desktop or laptop, the antivirus programs installed, the version of the deployed Powermanager.exe (XMRig) and more.

Strong application use policies main defense against Trojanized apps

While fake or Trojanized apps are not a new attack vector, stealthy campaigns like this that manage to fly under the radar for years highlight why it’s critically important for organizations to have strong application use policies and to enforce them for employees. Application whitelisting solutions can also be used on sensitive systems to restrict what applications and from where can be downloaded and installed by employees.

Copyright © 2022 IDG Communications, Inc.

Source link

Related articles

No, Russia did not just lift its ban on domestic crypto use

No, Russia did not just lift its ban on domestic crypto use

30 July 2024
New US Bitcoin Mining Hardware Creates B Opportunity, Could Disrupt China’s Mining Dominance: Bernstein – Canaan (NASDAQ:CAN)

New US Bitcoin Mining Hardware Creates $20B Opportunity, Could Disrupt China’s Mining Dominance: Bernstein – Canaan (NASDAQ:CAN)

30 July 2024
Cryptohopper
ADVERTISEMENT
[crypto-donation-box]
Tags: AppsCryptoMiningDelayHideslegitimateMalwaremonthlongMultistageTrigger
Share76Tweet47
Ledger Nano X - The secure hardware wallet
Previous Post

Shiba Inu Burn Rate Jumps 300%, With Nearly 2 Billion SHIB Burned in Past Week

Next Post

Elon Musk Sends Second Letter Terminating Twitter Acquisition

Related Posts

No, Russia did not just lift its ban on domestic crypto use

No, Russia did not just lift its ban on domestic crypto use

30 July 2024
0

A fake news story circulated today about Russia’s supposed embrace of bitcoin mining and crypto payments. According to excited social...

New US Bitcoin Mining Hardware Creates B Opportunity, Could Disrupt China’s Mining Dominance: Bernstein – Canaan (NASDAQ:CAN)

New US Bitcoin Mining Hardware Creates $20B Opportunity, Could Disrupt China’s Mining Dominance: Bernstein – Canaan (NASDAQ:CAN)

30 July 2024
0

A new report estimates a $20 billion revenue opportunity in Bitcoin BTC/USD mining chips and hardware over the next five...

Russia Races to Legalize Crypto as Sanctions Weigh On Firms – BNN Bloomberg

Russia Races to Legalize Crypto as Sanctions Weigh On Firms – BNN Bloomberg

30 July 2024
0

(Bloomberg) -- Russia is moving to regulate the use of cryptocurrencies, as companies wrestle with increasing difficulties in foreign payments...

Russia Advances Crypto and Mining Regulations as US Sanctions Impact Economy

Russia Advances Crypto and Mining Regulations as US Sanctions Impact Economy

30 July 2024
0

The Russian central bank plans to initiate international payments in cryptocurrencies by the end of the year to overcome delays...

Wall Street Bitcoin Miner Taps Institutional Investor for £6.5 Million Capital Boost

Wall Street Bitcoin Miner Taps Institutional Investor for £6.5 Million Capital Boost

30 July 2024
0

Listed both on Wall Street and the London Stock Exchange (LSE) Bitcoin miner Argo Blockchain, has announced a £6.5 million...

Load More
Next Post
Elon Musk Sends Second Letter Terminating Twitter Acquisition

Elon Musk Sends Second Letter Terminating Twitter Acquisition

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Plugin Install : Widget Tab Post needs JNews - View Counter to be installed
  • Trending
  • Comments
  • Latest
Managing Crypto Payroll for BNB: Navigating Risks and Strategies – OneSafe

Managing Crypto Payroll for BNB: Navigating Risks and Strategies – OneSafe

20 September 2025
Is A New Bullish Phase About To Commence?

Is A New Bullish Phase About To Commence?

20 September 2025
Investing in Crypto: 2025’s Leading Coins Compared; BlockDAG, NEAR, BNB & TRX – livebitcoinnews.com

Investing in Crypto: 2025’s Leading Coins Compared; BlockDAG, NEAR, BNB & TRX – livebitcoinnews.com

20 September 2025
Solana price prediction, Cardano news & which is the best crypto to buy now – Latest news from Azerbaijan

Solana price prediction, Cardano news & which is the best crypto to buy now – Latest news from Azerbaijan

20 September 2025

About Us

We publish a comprehensive news feed covering all news relevant to the crypto user, covering main industry news, politics and regulation as well as consumer-level “news you can use” (practical stuff), including handy DIY tips, links to useful tools, unbiased reviews and opinions revolving around cryptocurrency. Simple logic and real-world examples are preferred before technical jargon and personal rants.

Categories

  • Altcoin
  • ApeCoin
  • Bitcoin
  • Blockchain
  • BNB
  • Cardano
  • Cryptocurrency
  • DOGE
  • DOT
  • Ethereum
  • HBAR
  • Litecoin
  • Market
  • Meta News
  • Mining
  • NFT
  • QNT
  • Regulation
  • SHIBA
  • Solano
  • Tether
  • Uncategorized
  • XDC
  • XLM
  • XRP

What’s New Here!

  • Managing Crypto Payroll for BNB: Navigating Risks and Strategies – OneSafe
  • Is A New Bullish Phase About To Commence?
  • Investing in Crypto: 2025’s Leading Coins Compared; BlockDAG, NEAR, BNB & TRX – livebitcoinnews.com
  • Solana price prediction, Cardano news & which is the best crypto to buy now – Latest news from Azerbaijan
  • BNB Surges Past $1000: Binance Coin’s New Era in the Crypto Race – Azat TV

Subscribe Now

Our Partner

Round Main Logo
  • About Us
  • Privacy Policy
  • Contact Us

© 2022-2025 coin24h.com

No Result
View All Result
  • Home
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • XRP
    • Litecoin
    • Altcoin
    • Cardano
    • Tether
    • DOGE
    • Solano
    • XLM
    • DOT
    • XDC
    • SHIBA
    • BNB
    • Ape
    • HBAR
    • QNT
  • Blockchain
  • Regulation
  • Market
  • Live
    • Prices
    • ICO
  • Meta
    • NFT
  • Technical Analysis
    • XRP
    • BTC
    • XLM
    • ADA
    • TETHER
    • ETC
    • ETH
    • DOGE
    • LTC
  • Exchange
  • Mining

© 2020 coin24h.com

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • bitcoinBitcoin (BTC) $ 115,544.00
  • ethereumEthereum (ETH) $ 4,472.17
  • xrpXRP (XRP) $ 2.98
  • tetherTether (USDT) $ 1.00
  • bnbBNB (BNB) $ 1,077.74
  • solanaSolana (SOL) $ 240.41
  • usd-coinUSDC (USDC) $ 0.999703
  • dogecoinDogecoin (DOGE) $ 0.267994
  • staked-etherLido Staked Ether (STETH) $ 4,465.44
  • tronTRON (TRX) $ 0.345928
  • cardanoCardano (ADA) $ 0.893744
  • wrapped-stethWrapped stETH (WSTETH) $ 5,421.96
  • chainlinkChainlink (LINK) $ 23.30
  • wrapped-beacon-ethWrapped Beacon ETH (WBETH) $ 4,821.53
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 115,451.00
  • hyperliquidHyperliquid (HYPE) $ 53.92
  • ethena-usdeEthena USDe (USDE) $ 1.00
  • avalanche-2Avalanche (AVAX) $ 32.89
  • suiSui (SUI) $ 3.65
  • figure-helocFigure Heloc (FIGR_HELOC) $ 1.00
  • stellarStellar (XLM) $ 0.386084
  • bitcoin-cashBitcoin Cash (BCH) $ 597.39
  • wrapped-eethWrapped eETH (WEETH) $ 4,808.60
  • wethWETH (WETH) $ 4,470.28
  • hedera-hashgraphHedera (HBAR) $ 0.241235
  • leo-tokenLEO Token (LEO) $ 9.47
  • litecoinLitecoin (LTC) $ 114.08
  • usdsUSDS (USDS) $ 1.00
  • crypto-com-chainCronos (CRO) $ 0.228616
  • the-open-networkToncoin (TON) $ 3.09
  • shiba-inuShiba Inu (SHIB) $ 0.000013
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 115,482.00
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.999413
  • polkadotPolkadot (DOT) $ 4.33
  • whitebitWhiteBIT Coin (WBT) $ 43.27
  • world-liberty-financialWorld Liberty Financial (WLFI) $ 0.225893
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.20
  • uniswapUniswap (UNI) $ 9.16
  • moneroMonero (XMR) $ 297.05
  • mantleMantle (MNT) $ 1.67
  • ethenaEthena (ENA) $ 0.676135
  • daiDai (DAI) $ 1.00
  • aaveAave (AAVE) $ 296.51
  • pepePepe (PEPE) $ 0.000011
  • memecoreMemeCore (M) $ 2.56
  • okbOKB (OKB) $ 201.24
  • story-2Story (IP) $ 12.78
  • nearNEAR Protocol (NEAR) $ 3.12
  • bitget-tokenBitget Token (BGB) $ 5.35
  • jito-staked-solJito Staked SOL (JITOSOL) $ 296.10