Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue
Identity

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

By June 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananMalware/Cryptocurrency

Encryption campaign

Cybersecurity researchers have detailed two new methods that can be used to destroy cryptocurrency mining botnets.

The method utilizes the design of various common mining topologies to close the mining process, Akamai said in a new report published today.

“We have developed two methods by leveraging mining topology and pooling policies, which reduces the effectiveness of CryptoMiner Botnet to the point where it completely shuts down.

Cybersecurity

The technology relies on misusing layer mining protocols to prevent attackers’ mining proxy or wallets and effectively disrupt operations, according to web infrastructure companies.

The first of two approaches called bad stocks involves banning mining proxy from the network. This will shut down the entire operation and cause the victim’s CPU usage to plummet from 100% to 0%.

Mining proxy acts as an intermediary, shields attacker mining pools and even protects wallet addresses, but by interfering with normal functionality, it becomes a single point of failure.

“The idea is simple. By connecting to a malicious proxy as a minor, you can bypass proxy verification and submit invalid mining job results (bad stocks) that are submitted to the pool,” Dahan explained. “Same-substantial bad stocks will ultimately ban the proxy and effectively stop mining operations across the cryptographic botnet.”

This involves using an in-house development tool called Xmrogue to impersonate a miner, connect to a mining proxy, send consecutive bad stocks, and ultimately ban mining proxy from the pool.

The second method conceived by Akamai takes advantage of the fact that victim miners can explore scenarios where they are connected directly to public pools and use a proxy to ban wallet addresses for an hour if the pool has more than 1,000 workers.

In other words, using the attacker’s wallet simultaneously to initiate more than 1,000 login requests will cause the pool to ban the attacker’s wallet. However, please note that this is not a permanent solution as accounts can stage recovery as soon as multiple login connections stop.

Cybersecurity

Akamai has used the above method to target Monero Cryptocurrency Miners, but noted that it could be extended to other cryptocurrencies.

“The above techniques demonstrate how defenders can effectively shut down malicious Cryptominer campaigns without using pool policies to disrupt legitimate pool operations,” Dahan said.

“A legitimate miners can easily change their IP or wallet locally, allowing them to recover quickly from this type of attack. This task is much more difficult for malicious cryptominers as they require changing the entire botnet.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon will spend more than $4 billion to expand its major delivery to rural US communities
Next Article A federal judge with a lawsuit over AI training on books without author’s permission

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

As people look for ways to make new friends, here are some apps that may come in handy.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.