New Blitz Malware Targets Windows Servers to Deploy Monero Miner

New Blitz Malware Targets Windows Servers to Deploy Monero Miner

A new Windows-based malware named Blitz has been identified in 2024, with an updated version detected in early 2025.

This malware, actively developed and distributed through deceptive game cheats, poses a significant threat by deploying a Monero cryptocurrency miner alongside information-stealing and denial-of-service (DoS) capabilities.

Detailed analysis by Palo Alto Networks’ Unit 42 reveals that Blitz operates in two stages a downloader and a bot payload leveraging unconventional platforms like Hugging Face Spaces for its command and control (C2) infrastructure.

– Advertisement –
Monero Miner
Most recent Blitz infection chain.

This strategic abuse of legitimate AI code repositories highlights the evolving tactics of cybercriminals aiming to evade detection while targeting unsuspecting users, particularly in the gaming community.

Technical Intricacies

Blitz malware primarily spreads through backdoored game cheats for the popular mobile game Standoff 2, which boasts over 100 million downloads by April 2025.

These malicious packages, named Elysium_CrackBy@sw1zzx_dev.zip and Nerest_CrackBy@sw1zzx_dev.zip, are distributed via a Telegram channel operated by a Russian-speaking individual using the moniker sw1zzx.

Monero Miner
File contents of Nerest_CrackBy@sw1zzx_dev.zip.

Once executed, the backdoored executables deploy the Blitz downloader, which subsequently retrieves and installs the Blitz bot.

This bot is equipped with advanced features like keylogging, screenshot capture, and DoS attacks against web servers.

Furthermore, the malware employs sophisticated anti-sandbox techniques, such as timing loop iterations and floating-point instruction checks, to avoid detection in virtual environments.

The use of Hugging Face Spaces as a C2 host is particularly notable, as it stores the bot payload and an XMRig miner, which is injected into explorer.exe to mine Monero cryptocurrency.

The malware communicates via a REST API built on the FastAPI framework, with endpoints facilitating victim registration and command execution across 289 infections in 26 countries by late April 2025, predominantly in Russia, Ukraine, and Belarus.

Implications

The implications of Blitz are severe, especially given its ability to persist through Windows registry entries and inject payloads into legitimate processes like RuntimeBroker.exe.

The malware operator’s alleged departure in early May 2025, accompanied by a partially effective removal tool, raises questions about the future of this threat.

However, the historical evolution of Blitz, including a previous version from late 2024 that spread via trojanized installers and Discord channels, suggests that such threats may resurface under new guises.

Palo Alto Networks has fortified defenses through products like Advanced WildFire, Advanced Threat Prevention, and Cortex XDR, which detect and mitigate Blitz-related activities.

Organizations are urged to avoid cracked software and remain vigilant against social engineering tactics targeting gaming communities.

Indicators of Compromise (IOC)

Type Indicator
SHA256 (Backdoored Cheats) 14467edd617486a1a42c6dab287ec4ae21409a5dc8eb46d77b853427b67d16d6, etc.
SHA256 (Downloader) 0e80fe5636336b70b1775e94aaa219e6aa27fcf700f90f8a5dd73a22c898d646, etc.
SHA256 (Blitz Bot) ae2f4c49f73f6d88b193a46cd22551bb31183ae6ee79d84be010d6acf9f2ee57, etc.
SHA256 (XMRig Miner) 47ce55095e1f1f97307782dc4903934f66beec3476a45d85e33e48d63e1f2e15
Hugging Face C2 Domains e445a00fffe335d6dac0ac0fe0a5accc-9591beae439b860-b5c7747.hf[.]space, etc.
Telegram Channel t[.]me/sw1zzx_dev

To Upgrade Your Cybersecurity Skills, Take Diamond Membership With 150+ Practical Cybersecurity Courses Online – Enroll Here


Source link