Security researchers at Elastic Security Labs have detailed a multi-faceted malware distribution campaign by a threat actor tracked as REF1695. Active since at least November 2023, the operation uses malicious ISO files disguised as legitimate software installers to infect victims. These fake installers are used to deploy a range of malware, including the PureMiner and PureRAT trojans, the CNB Bot implant for delivering further payloads, and various cryptocurrency miners such as SilentCrytoMiner and XMRig. A key tactic of the campaign is its abuse of GitHub as a trusted Content Delivery Network (CDN) to host and deliver its malicious binaries, making the activity appear more legitimate and harder to block.
REF1695 is a financially motivated threat operation focused on deploying Remote Access Trojans (RATs) for system control and cryptominers for resource hijacking. Their primary infection vector is social engineering, luring users into downloading and mounting malicious ISO files that masquerade as popular software.
T1566.001 - Spearphishing Attachment). Mounting the ISO reveals a malicious loader.T1027 - Obfuscated Files or Information). This loader acts as a dropper for the main payloads.T1105 - Ingress Tool Transfer). By hosting malware on a legitimate, widely trusted platform like GitHub, the attackers' download traffic is more likely to bypass network security controls.T1496 - Resource Hijacking), leading to performance degradation and increased electricity costs.The use of ISO files is a popular technique to bypass Mark-of-the-Web (MOTW) security controls in Windows, as files inside a mounted ISO may not inherit the flag that triggers security warnings. The REF1695 actor's reliance on GitHub is a strategic choice to improve operational security. It offloads the infrastructure burden to a reputable service, making it harder for defenders to block based on IP or domain reputation alone.
The SilentCrytoMiner payload is noteworthy for its evasion techniques, including the use of direct system calls to bypass EDR hooks and its ability to disable Windows Sleep and Hibernate modes to ensure continuous mining activity. This demonstrates a degree of sophistication aimed at maximizing profit while minimizing the chances of detection.
The primary impact of the REF1695 campaign is financial, both directly for the attacker (through cryptomining) and indirectly for the victim (through increased power consumption and system degradation). However, the deployment of PureRAT and CNB Bot presents a much greater risk. These RATs give the attacker complete control over the compromised system, allowing them to steal sensitive data, install keyloggers, deploy ransomware, or use the machine as a pivot point for further attacks into the victim's network. An infection can quickly escalate from a simple resource hijacking incident to a full-blown data breach.
raw.githubusercontent.com from unusual processes. While GitHub is legitimate, a non-developer tool making connections to it could be suspicious.xmrig.exe. Also, monitor for high, sustained CPU usage from unexpected processes..iso) as a delivery mechanism is a key observable. Monitor for the download and mounting of ISO files from untrusted sources.Process Analysis can identify the miner processes.github.com or its subdomains. D3FEND's Outbound Traffic Filtering can be tuned to spot these anomalies.M1038 - Execution Prevention.Using application control to prevent users from running unauthorized installers downloaded from the internet is a highly effective mitigation.
Mapped D3FEND Techniques:
Educating users on the dangers of downloading and running software from untrusted sources can help prevent the initial infection.
Keeping endpoint security software up-to-date can help detect and block known payloads like XMRig, even if the initial loader is novel.
Mapped D3FEND Techniques:
To combat campaigns like REF1695 that rely on users running fake installers, executable allowlisting is a powerful preventative control. Using a tool like Windows Defender Application Control, administrators can create a policy that only permits signed executables from trusted publishers to run. This would block the malicious, unsigned loaders found inside the ISO files used by REF1695. For environments with developers, policies can be configured to allow specific unsigned code in designated development folders while maintaining strict enforcement everywhere else. This mitigation shifts the security posture from a default-allow (blacklist) to a default-deny (whitelist) model, which is far more effective at stopping novel and socially engineered malware before it can execute.
To detect REF1695's abuse of GitHub, security teams must perform nuanced network traffic analysis. Since blocking GitHub entirely is impractical, the focus should be on context. Create detection rules that alert when non-standard processes make outbound connections to raw.githubusercontent.com. For example, a connection from winword.exe or a random process in C:\Users\<user>\AppData\Local\Temp\ is highly suspicious. Baseline normal GitHub traffic from legitimate developer tools (e.g., git.exe) and IDEs, then alert on deviations. Furthermore, monitor for the download of executable file types (.exe, .dll, .ps1) from GitHub by any process other than an approved software management tool. This allows the security team to spot the payload download stage of the REF1695 attack chain.
A key tactic of the REF1695 campaign is using ISO files to bypass Mark-of-the-Web (MOTW) controls. To counter this, organizations can implement platform hardening via Group Policy. A GPO can be created to change the default behavior for .iso files, preventing them from being automatically mounted as a drive when double-clicked. Instead, the policy can be set to open them with a tool like 7-Zip, or to do nothing at all. This adds a layer of friction and prevents the seamless execution path the attackers rely on. Additionally, ensure that PowerShell execution policies are set to 'RemoteSigned' or more restrictive settings across the enterprise to prevent the easy execution of downloaded scripts. These hardening steps disrupt the attacker's TTPs and increase the chances of the attack failing.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats