Close Menu
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
What's Hot

Smarter ways to shop online this holiday season

December 8, 2025

Chowking Marks 40 Years With 40 Awards Honoring Its Craft and Creativity 

December 8, 2025

PIXEL by Eplayment unveils Charess as its first ambassador

December 8, 2025
Facebook X (Twitter) Instagram
Manila Republic
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
Manila Republic
Home»Lifestyle»“SteelFox” Malware Exploits Foxit & AutoCAD for Banking Data Theft and Crypto Mining
Lifestyle

“SteelFox” Malware Exploits Foxit & AutoCAD for Banking Data Theft and Crypto Mining

Team Manila RepublicBy Team Manila RepublicNovember 11, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Kaspersky’s Global Research and Analysis Team has uncovered a new and ongoing malicious campaign that exploits popular software, such as Foxit PDF Editor, AutoCAD, and JetBrains. The attackers employ stealer malware to capture victims’ credit card information and details about their infected devices, while also operating as a cryptominer and secretly utilizing the power of infected computers to mine cryptocurrency. In just three months, Kaspersky’s technologies have thwarted over 11,000 attack attempts, with the majority of affected users located in Brazil, China, Russia, Mexico, the UAE, Egypt, Algeria, Vietnam, India, and Sri Lanka.

In August 2024, Kaspersky’s Global Research and Analysis Team (GReAT) uncovered a series of attacks involving a previously unknown bundle of miner and stealer malware, which they dubbed SteelFox.

The initial attack vector involves posts on forums and torrent trackers, where the SteelFox dropper is advertised as a way to activate legitimate software products for free. These droppers masquerade as cracks for popular programs such as Foxit PDF Editor, JetBrains, and AutoCAD. While they offer the promised functionality, they also deliver sophisticated malware directly onto users’ computers.

The campaign consists of two main components: the stealer module, and a cryptominer. SteelFox gathers extensive information from victims’ computers, including browser data, account credentials, credit card information, and details about installed software and antivirus solutions. It can also capture Wi-Fi passwords, system information, and timezone data.

Additionally, the attackers utilize a modified version of XMRig, an open-source miner, to leverage the power of infected devices for cryptocurrency mining, likely targeting Monero.

GReAT research shows that the campaign has been active since at least February 2023 and continues to pose a threat today. Throughout its operation, while the cybercriminals behind the SteelFox campaign did not significantly change its functionality, they worked to modify its techniques and code to evade detection. “The attackers have gradually diversified their infection vectors, initially targeting Foxit Reader users. Once they confirmed that the malicious campaign was effective, they expanded their reach to include cracks for JetBrains products. Three months later, they began exploiting AutoCAD’s name as well. The campaign remains active, and we anticipate that they may start distributing their malware under the guise of other more popular products,” comments Dmitry Galov, Head of Research Center for Russia and CIS at Kaspersky’s GReAT.

SteelFox operates on a large scale, affecting anyone who encounters the compromised software. From August to the end of October, Kaspersky security solutions detected over 11,000 attacks, with the majority of affected users located in Brazil, China, Russia, Mexico, the UAE, Egypt, Algeria, Vietnam, India, and Sri Lanka.

To minimize the risks of falling victim to such malicious campaigns, Kaspersky experts also recommend:

  • Download applications only from official sources.
  • Regularly update your operating system and installed applications.
  • Install a reliable security solution from a developer whose products are validated by independent testing laboratories, such as Kaspersky Premium.

Kaspersky’s products detect this threat as HEUR:Trojan.Win64.SteelFox.gen, Trojan.Win64.SteelFox.*.

Details of the malicious campaign are available on Securelist.com.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Team Manila Republic

    Related Posts

    Smarter ways to shop online this holiday season

    December 8, 2025

    PIXEL by Eplayment unveils Charess as its first ambassador

    December 8, 2025

    Auto Loan 101: Fueling your passion for the drive this Christmas Season

    December 8, 2025
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    Smarter ways to shop online this holiday season

    December 8, 2025

    Chowking Marks 40 Years With 40 Awards Honoring Its Craft and Creativity 

    December 8, 2025

    PIXEL by Eplayment unveils Charess as its first ambassador

    December 8, 2025

    Auto Loan 101: Fueling your passion for the drive this Christmas Season

    December 8, 2025

    Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

    December 8, 2025
    Advertisement
    Don't Miss

    Smarter ways to shop online this holiday season

    GabrielDecember 8, 2025

    Let’s be real: holiday shopping is stressful. Between finding the perfect gifts and dodging “sale”…

    Chowking Marks 40 Years With 40 Awards Honoring Its Craft and Creativity 

    December 8, 2025

    PIXEL by Eplayment unveils Charess as its first ambassador

    December 8, 2025

    Auto Loan 101: Fueling your passion for the drive this Christmas Season

    December 8, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    © 2025 ThemeSphere. Designed by ThemeSphere.
    • Home
    • Lifestyle
    • Tech
    • Travel
    • Review
    • About
    • Contact

    Type above and press Enter to search. Press Esc to cancel.