Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue
Global Security

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

AdminBy AdminJune 24, 2025No Comments3 Mins Read
Cryptominer Campaigns
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 24, 2025Red LakshmananMalicious software / cryptocurrency

Companies Cryptominer

Cybersecurity researchers described two new methods that can be used to violate Cryptocurrency mining Botnets.

Methods use the design of various common Prey topology To close mining processAkamai said in a new report published today.

“We have developed two methods using mining -tags and policies in the pool that allow us to reduce Botnet Cryptominer’s efficiency to fully close it, which causes the attacker to make radical changes to your infrastructure or even refuse – Note.

Cybersecurity

Methods said web -infrastructure depends on operation Layer Mining protocol in such a way that it causes a proxima or a wallet wallet, which effectively disrupts the operation.

The first of the two approaches, called bad stock, entails a proxy -manufacturer on the network, which, in turn, leads to the disconnection of the entire operation and causes the victim to fall from 100% to 0%.

While proxy -mining acts as a mediator and protects the mining -pool of the attacker, and, on expanding, their wallet turns, it also becomes the only point of refusal, preventing its regular function.

“The idea is simple: by connecting to a malicious proxy as a miner, we can present false mining work results – bad stocks – which will bypass proxies and will be presented in the pool,” Dahan explained. “Consistent bad shares will eventually be banned by proxy, effectively stopping mining operations for all criminal botten.”

This, in turn, entails the use of a developed instrument called Xmrogue To bring yourself to the miner, connect to the proxy -mining, present consistent bad stocks and eventually prohibit proxy from the pool.

The second method developed by Akamai scripts operates when the victim’s miner connects directly to the public pool, does not proxy using the fact that the pool can ban the wallet address for one hour if it has more than 1000 workers.

In other words, initiating more than 1000 entry requests using the attacker’s wallet will simultaneously force the pool to ban the striker’s wallet. However, it should be noted that this is not a permanent decision, as the account can put up a recovery as soon as several connections are stopped.

Cybersecurity

Akamai noted that while the aforementioned methods were used to target the miner minero miners, they may be spread to other cryptocurrencies.

“The above methods show how the defenders can effectively stop the malicious Cryptominer companies without breaking the legal work in the pool, using the policy in the pool,” Dahan said.

“The legitimate miner will be able to recover quickly after this type of attack, as they can easily change their IP or wallet at the local level. This task will be much more complicated for angry crypto, as it will require change of botten.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.