Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue
Identity

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

userBy userJune 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananMalware/Cryptocurrency

Encryption campaign

Cybersecurity researchers have detailed two new methods that can be used to destroy cryptocurrency mining botnets.

The method utilizes the design of various common mining topologies to close the mining process, Akamai said in a new report published today.

“We have developed two methods by leveraging mining topology and pooling policies, which reduces the effectiveness of CryptoMiner Botnet to the point where it completely shuts down.

Cybersecurity

The technology relies on misusing layer mining protocols to prevent attackers’ mining proxy or wallets and effectively disrupt operations, according to web infrastructure companies.

The first of two approaches called bad stocks involves banning mining proxy from the network. This will shut down the entire operation and cause the victim’s CPU usage to plummet from 100% to 0%.

Mining proxy acts as an intermediary, shields attacker mining pools and even protects wallet addresses, but by interfering with normal functionality, it becomes a single point of failure.

“The idea is simple. By connecting to a malicious proxy as a minor, you can bypass proxy verification and submit invalid mining job results (bad stocks) that are submitted to the pool,” Dahan explained. “Same-substantial bad stocks will ultimately ban the proxy and effectively stop mining operations across the cryptographic botnet.”

This involves using an in-house development tool called Xmrogue to impersonate a miner, connect to a mining proxy, send consecutive bad stocks, and ultimately ban mining proxy from the pool.

The second method conceived by Akamai takes advantage of the fact that victim miners can explore scenarios where they are connected directly to public pools and use a proxy to ban wallet addresses for an hour if the pool has more than 1,000 workers.

In other words, using the attacker’s wallet simultaneously to initiate more than 1,000 login requests will cause the pool to ban the attacker’s wallet. However, please note that this is not a permanent solution as accounts can stage recovery as soon as multiple login connections stop.

Cybersecurity

Akamai has used the above method to target Monero Cryptocurrency Miners, but noted that it could be extended to other cryptocurrencies.

“The above techniques demonstrate how defenders can effectively shut down malicious Cryptominer campaigns without using pool policies to disrupt legitimate pool operations,” Dahan said.

“A legitimate miners can easily change their IP or wallet locally, allowing them to recover quickly from this type of attack. This task is much more difficult for malicious cryptominers as they require changing the entire botnet.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon will spend more than $4 billion to expand its major delivery to rural US communities
Next Article A federal judge with a lawsuit over AI training on books without author’s permission
user
  • Website

Related Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

June 24, 2025

Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers

June 24, 2025

CTEM conversations we all need

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Amazon will spend more than $4 billion to expand its major delivery to rural US communities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.