A financially motivated cybercrime operation, designated REF1695, has been actively observed leveraging sophisticated tactics since November 2023, primarily employing fake software installers to deploy a potent combination of remote access trojans (RATs) and cryptocurrency miners. This ongoing campaign represents a significant threat to unsuspecting users and organizations, showcasing the evolving ingenuity of threat actors in monetizing illicit access and computational resources. The comprehensive analysis published this week by Elastic Security Labs researchers Jia Yu Chan, Cyril François, and Remco Sprooten sheds light on the group’s multifaceted approach, which extends beyond merely illicit cryptomining to include Cost Per Action (CPA) fraud, directing victims to deceptive content locker pages under the guise of legitimate software registration.
The Genesis and Evolution of REF1695
The REF1695 operation first emerged on the cybersecurity radar in late 2023, quickly establishing itself through a consistent pattern of exploiting user trust via fake software installers. These installers are meticulously crafted to mimic legitimate applications, often distributed through compromised websites, malvertising, or social engineering tactics. The initial stages of the campaign focused on deploying well-known RATs and cryptocurrency miners, capitalizing on the dual benefit of gaining remote control over compromised systems and siphoning off computational power for illicit financial gain. The choice of cryptocurrency, predominantly Monero (XMR), is strategic due to its privacy-centric features, making transactions harder to trace and providing a veil of anonymity for the attackers.
Over time, REF1695 has refined its methodologies, introducing new elements to enhance stealth, persistence, and profitability. Recent iterations of the campaign have revealed the deployment of a previously undocumented .NET implant, codenamed CNB Bot, indicating a continuous development cycle and adaptation by the threat actors. This evolution underscores a broader trend in cybercrime where groups consistently update their toolkits to bypass ever-improving defensive measures.
Introduction of CNB Bot and Advanced Infection Vectors
A notable development in the REF1695 campaign is the integration of CNB Bot, a bespoke .NET implant designed for versatility and stealth. The infection chain for these advanced attacks typically commences with an ISO file, a common disk image format, serving as the initial vector. This method is increasingly favored by cybercriminals as ISO files can bypass certain email gateway and antivirus scanning heuristics that might flag executable files directly. Upon execution, the ISO file unleashes a .NET Reactor-protected loader. .NET Reactor is a commercial obfuscation tool, ironically repurposed by threat actors to make their malicious code harder to analyze and detect, adding another layer of complexity for defenders.
Crucially, the attack leverages a social engineering component embedded within a text file delivered alongside the loader. This file contains explicit, step-by-step instructions designed to guide unsuspecting users through the process of bypassing Microsoft Defender SmartScreen protections. SmartScreen, a critical security feature in Windows, warns users before running unrecognized applications. The attackers instruct victims to click on "More info" and then "Run anyway," effectively tricking them into overriding their system’s built-in defenses. This calculated manipulation of user behavior highlights a deep understanding of human psychology and security mechanisms by the REF1695 group.
Sophisticated Evasion and Persistence Mechanisms

Once the user is coerced into executing the malicious loader, a series of stealthy operations unfolds. The loader is engineered to invoke PowerShell, a powerful scripting language built into Windows, which then undertakes a critical task: configuring broad Microsoft Defender Antivirus exclusions. By adding exclusions for specific directories, file types, or processes, the attackers ensure that their malicious payloads and activities remain undetected by the primary security software. This technique, while not new, remains highly effective and demonstrates the attackers’ intent to maintain a foothold on the compromised system without triggering alerts.
Simultaneously, to distract the user and conceal the ongoing malicious activity, a deceptive error message is displayed: "Unable to launch the application. Your system may not meet the required specifications. Please contact support." This message serves as a smokescreen, leading the victim to believe that the software installation has failed, while in the background, CNB Bot is silently launched and begins its operations.
CNB Bot itself is a robust loader, equipped with a range of capabilities essential for long-term compromise. It can download and execute additional payloads, allowing the threat actors to adapt their strategy or deploy more specialized tools as needed. Furthermore, it possesses self-update functionalities, ensuring that the implant remains current and capable of evading new detection methods. For operational security, CNB Bot also includes uninstallation and cleanup features, designed to remove traces of its presence and activities, thereby complicating forensic investigations. Its communication with a command-and-control (C2) server is conducted via HTTP POST requests, a common and often difficult-to-distinguish method of data exfiltration and instruction retrieval, blending in with legitimate network traffic.
A Multi-Payload Arsenal: RATs, Miners, and CPA Fraud
The REF1695 threat actor’s campaigns are characterized by a diverse arsenal of payloads. Beyond the novel CNB Bot, other operations have employed similar ISO-based lures to deliver established malware families such as PureRAT and PureMiner. PureRAT is a commercial remote access trojan known for its extensive capabilities, including surveillance, data theft, and remote control, offering attackers a comprehensive tool for system exploitation. PureMiner, as its name suggests, is a cryptocurrency miner designed for efficiency in generating illicit profits.
Another custom component identified is a bespoke .NET-based XMRig loader. XMRig is a legitimate, open-source Monero miner, but in the hands of threat actors, it becomes a potent tool for cryptojacking. The REF1695 group’s custom loader reaches out to a hard-coded URL to extract its mining configuration, dynamically setting up the miner payload to optimize hash rates and target specific Monero wallets. This adaptability allows the attackers to quickly pivot or reconfigure their mining operations without needing to re-infect systems.
Beyond cryptomining, the REF1695 group actively monetizes infections through CPA (Cost Per Action) fraud. This involves directing compromised systems to content locker pages. These pages often promise access to premium content, software, or services but require the user to complete surveys, download applications, or provide personal information. Each "action" completed by the victim translates into a payment for the fraudster, leveraging the compromised system for an additional revenue stream that is distinct from, but complementary to, cryptomining. This dual monetization strategy maximizes the financial return from each successful infection.
Kernel-Level Exploitation for Optimized Mining
A particularly insidious aspect of REF1695’s cryptojacking activities, as also recently observed in the FAUX#ELEVATE campaign, is the abuse of "WinRing0x64.sys." This is a legitimate, digitally signed Windows kernel driver designed to provide low-level hardware access, often used by system utilities for performance monitoring or overclocking. However, its legitimate nature and vulnerable implementation have made it a recurring target for cybercriminals.

The REF1695 group, like many other cryptojacking operations over the years, exploits WinRing0x64.sys to gain kernel-level hardware access. This allows them to modify CPU settings directly, effectively overclocking or fine-tuning the processor specifically to boost hash rates for cryptocurrency mining. Higher hash rates mean more computational work performed per second, directly translating into increased Monero earnings. This abuse of a legitimate driver, first added to XMRig miners in December 2019, is a sophisticated evasion technique, as the driver itself is signed and therefore less likely to be flagged as malicious by traditional antivirus solutions. Its historical use in campaigns like MrbMiner and ProxyShellMiner underscores its effectiveness and the persistent challenge it poses to endpoint security.
Another campaign identified by Elastic researchers leads to the deployment of SilentCryptoMiner. This miner takes additional steps to evade detection and maximize efficiency. It utilizes direct system calls to bypass user-mode hooks that many security products rely on, disables Windows Sleep and Hibernate modes to ensure continuous mining operations, and establishes persistence through scheduled tasks. Like other miners in the REF1695 arsenal, SilentCryptoMiner also leverages the WinRing0.sys driver to optimize CPU performance for mining, demonstrating a consistent reliance on this powerful, yet exploitable, component across different payloads.
Infrastructure, Financial Returns, and Broader Implications
The REF1695 operation demonstrates a well-thought-out infrastructure. Beyond traditional command-and-control servers, the threat actor has been observed abusing GitHub as a payload delivery CDN (Content Delivery Network). By hosting staged binaries across two identified GitHub accounts, the group shifts the critical "download-and-execute" step away from operator-controlled, potentially blacklisted infrastructure to a trusted, widely used platform. This significantly reduces "detection friction," as network security solutions are far less likely to block traffic to GitHub, making it harder to identify and disrupt the malicious download process.
The financial returns from the REF1695 campaign, while not reaching the scale of large-scale ransomware operations, are consistent and demonstrate a profitable venture. Elastic Security Labs estimates that the operation has accrued 27.88 XMR across four tracked wallets. At the time of the analysis, this equated to approximately $9,392. While this figure might seem modest compared to some high-profile breaches, it represents a steady stream of passive income generated from numerous compromised systems, indicating the effectiveness of their widespread, low-profile attacks. This consistent profitability incentivizes the attackers to continue and refine their operations.
The broader implications of campaigns like REF1695 are significant. For individual users, a compromised system can experience severe performance degradation, increased energy consumption (leading to higher electricity bills), and accelerated hardware wear due to the constant, intensive CPU usage for mining. Furthermore, the presence of RATs like PureRAT means that personal data could be exfiltrated, or the system could be used as a stepping stone for further attacks. For organizations, cryptojacking can lead to significant resource drain on their networks, impacting critical business operations and incurring unforeseen infrastructure costs. The sophisticated evasion techniques, including SmartScreen bypass, Defender exclusions, and legitimate driver abuse, highlight the need for multi-layered security defenses that go beyond signature-based detection.
Expert Recommendations and the Evolving Threat Landscape
The findings from Elastic Security Labs underscore the critical importance of user education and robust cybersecurity practices. Organizations and individuals must exercise extreme caution when downloading and installing software, especially from untrusted sources. Verifying the legitimacy of installers and understanding security prompts, rather than blindly clicking through them, is paramount. Enabling enhanced security features like application whitelisting, implementing endpoint detection and response (EDR) solutions, and regularly updating operating systems and security software can significantly mitigate the risk of such infections. Network monitoring for unusual traffic patterns or excessive resource utilization can also help detect cryptojacking activities.
The REF1695 operation serves as a stark reminder of the relentless and adaptable nature of financially motivated cybercrime. Threat actors continue to innovate, blending social engineering with advanced technical exploits to bypass modern security controls. The development of new implants like CNB Bot, coupled with the exploitation of trusted platforms like GitHub and legitimate kernel drivers, signals a continuous escalation in the sophistication of these attacks. As the digital landscape evolves, so too must defensive strategies, requiring a proactive, informed, and multi-pronged approach to safeguard against these persistent and costly threats.
