Researchers Unveil New Methods to Disrupt Crypto Mining Botnets

Two New Techniques Uncovered to Disrupt Cryptocurrency Mining Botnets by Exploiting Protocol and Pool Vulnerabilities

  • Researchers have revealed two new ways to shut down cryptocurrency mining botnets.
  • The methods exploit weaknesses in common mining protocols and pool policies.
  • The first technique sends repeated invalid mining results, leading to bans on malicious proxies.
  • The second approach overloads wallet addresses with multiple logins to trigger temporary bans.
  • Experts say these tactics could disrupt malicious miners without affecting legitimate users.

Cybersecurity experts have announced two new techniques that can disrupt the networks used by cryptocurrency mining Malware. The findings, released on June 24, 2025, highlight vulnerabilities in the mining protocols and infrastructure that allow defenders to cripple these illegal operations.

- Advertisement -

The research, conducted by Akamai, explains that their methods take advantage of how many mining botnets operate. According to security researcher Maor Dahan, these techniques can significantly weaken a criminal cryptomining network or stop it entirely. Both tactics use rules in the Stratum mining protocol and public pool policies to force changes in an attacker’s setup.

One approach involves sending invalid mining job results, known as “bad shares,” to a mining proxy. Dr. Dahan describes this process: “By connecting to a malicious proxy as a miner, we can submit invalid mining job results — bad shares — that will bypass the proxy validation and will be submitted to the pool. Consecutive bad shares will eventually get the proxy banned, effectively halting mining operations for the entire cryptomining botnet.” The team used an internal tool, XMRogue, to carry out this process.

The second technique targets cases where the miner is directly connected to a public pool. According to the report, submitting more than 1,000 login requests using the attacker’s wallet can trigger an automatic ban of that wallet for an hour. This can pause malicious activities, but the attackers may recover after the ban period by stopping the login attempts.

Akamai confirmed that while these methods were tested against Monero miners, they could also apply to other cryptocurrencies. Dr. Dahan explained, “A legitimate miner will be able to quickly recover from this type of attack, as they can easily modify their IP or wallet locally. This task would be much more difficult for a malicious cryptominer as it would require modifying the entire botnet. For less sophisticated miners, however, this defense could completely disable the botnet.”

- Advertisement -

These developments show that defenders can use mining protocol rules and pool policies to reduce or end illegal crypto mining without affecting honest miners.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

XRP Rises on ETF Hopes as Whales Accumulate 120M Tokens in 72 Hours

XRP rose 2.1% in a 24-hour period, moving from $2.84 to $2.90. Large institutional investors...

CMCC Global Launches $25M Resonance Fund for Sonic Ecosystem

CMCC Global is launching Resonance, a $25 million fund to invest in the Sonic...

Copper Surges to Record High, Bank of America Predicts $11,000 Target

Copper prices have reached a record high, rising nearly 20% year-to-date. Bank of America forecasts...

Shopify, Etsy Stocks Surge on OpenAI Deal Despite Analyst Caution

Shopify and Etsy shares rose 6.2% and 15.8% after announcing an e-commerce partnership with...

Solana ETF Approval Seen as Imminent After S-1 Amendment Filing

The U.S. Securities and Exchange Commission (SEC) has made the 19b-4 review timeline irrelevant...
- Advertisement -

Must Read

TOP 12 Day Trading Crypto Books For Beginners

Day trading cryptocurrencies has become an increasingly popular financial activity, offering the potential for huge returns to those who understand the market's complexities and...