New SteelFox malware hijacks Windows PCs using vulnerable driver

Share:

A new malicious package called ‘SteelFox’ mines for cryptocurrency and steals credit card data by using the “bring your own vulnerable driver” technique to get SYSTEM privileges on Windows machines.

The malware bundle dropper is distributed through forums and torrent trackers as a crack tool that activates legitimate versions of various software like Foxit PDF Editor, JetBrains and AutoCAD.

Using a vulnerable driver for privilege escalation is common for state-sponsored threat actors and ransomware groups. However, the technique now appears to extend to info-stealing malware attacks.

Kaspersky researchers discovered the SteelFox campaign in August but say that the malware has been around since February 2023 and increased distribution lately using multiple channels (e.g. torrents, blogs, and posts on forums).

According to the company, its products detected and blocked SteelFox attacks 11,000 times.

SteelFox's operational timeline
SteelFox’s operational timeline
Source: Kaspersky

SteelFox infection and privilege escalation

Kaspersky reports that malicious posts promoting the SteelFox malware dropper come with complete instructions on how to illegally activate the software. Below is a sample of such a post providing directions on how to activate JetBrains:

Instructions to victims
Instructions to victims
Source: Kaspersky

The researchers say that while the dropper does have the advertised functionality, users also infect their systems with malware.

Since the software targeted for illegal activation is typically installed in the Program Files, adding the crack requires administrator access, a permission that the malware uses later in the attack.

Kaspersky researchers say that “the execution chain looks legitimate until the moment the files are unpacked.” They explain that a malicious function is added during the process, which drops on the machine code that loads SteelFox.

Having secured admin rights, SteelFox creates a service that runs WinRing0.sys inside, a driver vulnerable to CVE-2020-14979 and CVE-2021-41285, which can be exploited to obtain privilege escalation to NT/SYSTEM level.

Such permissions are the highest on a local system, more powerful than an administrator’s, and allow unrestricted access to any resource and process.

The WinRing0.sys driver is also used for cryptocurrency mining, as it is part of the XMRig program for mining Monero cryptocurrency. Kaspersky researchers say that the threat actor uses a modified version of the miner executable that connects to a mining pool with hardcoded credentials.

The malware then establishes a connection with its command-and-control (C2) server using SSL pinning and TLS v1.3, which protects the communication from being intercepted.

It also activates the info-stealer component that extracts data from 13 web browsers, information about the system, network, and RDP connection.

Data targeted by SteelFox
Data targeted by SteelFox
Source: Kaspersky

The researchers note that SteelFox collects from the browsers data like credit cards, browsing history, and cookies.

Kaspersky says that although the C2 domain SteelFox uses is hardcoded, the threat actor manages to hide it by switching its IP addresses and resolving them through Google Public DNS and DNS over HTTPS (DoH).

SteelFox attacks do not have specific targets but appear to focus on users of AutoCAD, JetBrains, and Foxit PDF Editor. Based on Kaspersky’s visibility, the malware compromises systems in Brazil, China, Russia, Mexico, UAE, Egypt, Algeria, Vietnam, India, and Sri Lanka.

Although SteelFox is fairly new, “it is a full-featured crimeware bundle,” the researchers say. Analysis of the malware indicates that it’s developer is skilled in C++ programming and they managed to create formidable malware by integrating external libraries.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
3:42 am, Jun 29, 2025
weather icon 20°C
L: 19° | H: 20°
clear sky
Humidity: 82 %
Pressure: 1025 mb
Wind: 6 mph NW
Wind Gust: 14 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 0%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:46 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
19° | 20°°C 0 mm 0% 7 mph 83 % 1025 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
20° | 35°°C 0.2 mm 20% 8 mph 67 % 1022 mb 0 mm/h
Tue Jul 01 10:00 pm
weather icon
22° | 33°°C 0 mm 0% 10 mph 70 % 1017 mb 0 mm/h
Wed Jul 02 10:00 pm
weather icon
17° | 27°°C 1 mm 100% 12 mph 91 % 1018 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
14° | 19°°C 1 mm 100% 14 mph 93 % 1026 mb 0 mm/h
Today 4:00 am
weather icon
18° | 20°°C 0 mm 0% 5 mph 82 % 1025 mb 0 mm/h
Today 7:00 am
weather icon
18° | 19°°C 0 mm 0% 5 mph 83 % 1025 mb 0 mm/h
Today 10:00 am
weather icon
22° | 23°°C 0 mm 0% 4 mph 65 % 1025 mb 0 mm/h
Today 1:00 pm
weather icon
28° | 28°°C 0 mm 0% 4 mph 41 % 1025 mb 0 mm/h
Today 4:00 pm
weather icon
30° | 30°°C 0 mm 0% 4 mph 35 % 1023 mb 0 mm/h
Today 7:00 pm
weather icon
28° | 28°°C 0 mm 0% 0 mph 34 % 1021 mb 0 mm/h
Today 10:00 pm
weather icon
25° | 25°°C 0 mm 0% 7 mph 54 % 1022 mb 0 mm/h
Tomorrow 1:00 am
weather icon
22° | 22°°C 0 mm 0% 7 mph 63 % 1022 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,507.41
0.04%
Ethereum(ETH)
€2,073.34
0.33%
Tether(USDT)
€0.85
0.00%
XRP(XRP)
€1.87
-0.08%
Solana(SOL)
€127.64
4.39%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.138996
0.43%
Shiba Inu(SHIB)
€0.000009
0.88%
Pepe(PEPE)
€0.000009
2.70%
Scroll to Top