Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue
Identity

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

userBy userJune 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananMalware/Cryptocurrency

Encryption campaign

Cybersecurity researchers have detailed two new methods that can be used to destroy cryptocurrency mining botnets.

The method utilizes the design of various common mining topologies to close the mining process, Akamai said in a new report published today.

“We have developed two methods by leveraging mining topology and pooling policies, which reduces the effectiveness of CryptoMiner Botnet to the point where it completely shuts down.

Cybersecurity

The technology relies on misusing layer mining protocols to prevent attackers’ mining proxy or wallets and effectively disrupt operations, according to web infrastructure companies.

The first of two approaches called bad stocks involves banning mining proxy from the network. This will shut down the entire operation and cause the victim’s CPU usage to plummet from 100% to 0%.

Mining proxy acts as an intermediary, shields attacker mining pools and even protects wallet addresses, but by interfering with normal functionality, it becomes a single point of failure.

“The idea is simple. By connecting to a malicious proxy as a minor, you can bypass proxy verification and submit invalid mining job results (bad stocks) that are submitted to the pool,” Dahan explained. “Same-substantial bad stocks will ultimately ban the proxy and effectively stop mining operations across the cryptographic botnet.”

This involves using an in-house development tool called Xmrogue to impersonate a miner, connect to a mining proxy, send consecutive bad stocks, and ultimately ban mining proxy from the pool.

The second method conceived by Akamai takes advantage of the fact that victim miners can explore scenarios where they are connected directly to public pools and use a proxy to ban wallet addresses for an hour if the pool has more than 1,000 workers.

In other words, using the attacker’s wallet simultaneously to initiate more than 1,000 login requests will cause the pool to ban the attacker’s wallet. However, please note that this is not a permanent solution as accounts can stage recovery as soon as multiple login connections stop.

Cybersecurity

Akamai has used the above method to target Monero Cryptocurrency Miners, but noted that it could be extended to other cryptocurrencies.

“The above techniques demonstrate how defenders can effectively shut down malicious Cryptominer campaigns without using pool policies to disrupt legitimate pool operations,” Dahan said.

“A legitimate miners can easily change their IP or wallet locally, allowing them to recover quickly from this type of attack. This task is much more difficult for malicious cryptominers as they require changing the entire botnet.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon will spend more than $4 billion to expand its major delivery to rural US communities
Next Article A federal judge with a lawsuit over AI training on books without author’s permission
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Cursor snaps up enterprise startup koala with a challenge to github copilot

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.