Use of XMRig Cryptominer by Threat Actors Expanding: Expel
好的,我需要帮用户总结这篇文章的内容,控制在100字以内。首先,文章主要讲的是XMRig这个开源挖矿工具被黑客滥用的情况。XMRig本身是合法的,但近年来频繁被用于攻击活动,比如通过恶意软件、漏洞利用等手段传播,导致企业网络受到威胁。 接下来,文章提到了XMRig的检测可以反映出组织的安全漏洞,因为它可能被用来安装更恶意的软件。此外,挖矿市场正在增长,这也推动了XMRig的使用。文章还提到XMRig的跨平台兼容性和低资源需求使其成为黑客的理想选择。 最后,作者建议组织要监控异常活动和资源使用情况,以防止未经授权的挖矿活动。 现在我需要把这些要点浓缩到100字以内,确保涵盖主要信息:XMRig被滥用、攻击手法、安全漏洞、市场增长、技术优势以及防范措施。 </think> 这篇文章讨论了开源挖矿工具XMRig被黑客滥用的情况。尽管XMRig是合法工具,但近年来频繁被用于攻击活动。黑客通过恶意软件和漏洞利用传播XMRig,在企业网络中造成威胁。文章指出,检测到未经授权的挖矿活动可能表明组织存在安全漏洞,并强调了监控异常网络连接和资源使用的重要性。 2026-1-9 17:4:21 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

XMRig is a legitimate open-source cryptocurrency mining tool available on GitHub that hackers for years have been deploying in campaigns aiming to steal crypto – particularly Monero – from victim’s wallets.

As an example, threat researchers with Kaspersky early last year reported seeing a surge starting in late December 2024 of threat actors exploiting XMRig, distributing the cryptominer through game torrents in a campaign dubbed “StaryDobry.”

“However, the cryptominer also surfaced on corporate networks — probably due to employees using work computers for personal use,” the researchers wrote.

More recently, some bad actors were seen by security researchers exploiting the maximum-severity React2Shell vulnerability that exploded onto the scene last month to deploy XMRig and other cryptominers. According researchers with Wiz, one campaign deployed a UPX packed version of XMRig, while a second one downloaded the standard XMRig setup from GitHub.

Cryptominers Could Signal Security Holes

In a blog post this week, Ben Nahorney, senior technical marketing writer with Expel, which provides AI-based managed detection and response (MDR) services, compared MXRig and other cryptominers to weeds that will pop up in the cracks of unpatched software and compromised credentials and “like weeds … is an annoyance that should be pulled out for the health of the garden.”

“Dealing with cryptominers may not seem urgent when tackling bigger threats, and while it could be argued they’re ‘less malicious,’ they should still be prioritized,” Nahorney wrote. “The fact is the presence of an unauthorized cryptominer tends to speak to unaddressed security holes in the environment. And any attackers getting XMRig onto systems could just as easily be installing more malicious software if they so choose.”

XMRig is a legitimate tool, but its detection can signal a weakness in an organization’s.

“Threats are similarly opportunistic” as weeds are, Nahorney wrote. “They don’t limit themselves to a single attack vector or platform. The goal is to establish themselves how and where they can. Few threats illustrate this better than cryptominers. While it can be argued that cryptominers in and of themselves are not malicious, bad actors often install them without users’ or admins’ knowledge.”

A Booming Business

Cryptominers remain in demand among legitimate and bad actors. According to analysts with market research firm Precedence Research, the global crypto mining market was valued at $2.77 billion last year and is projected to rise to $3.12 billion in 2026. By 2035, it will be worth $9.18 billion, growing an average of 12.73% a year.

“The industry is expanding primarily because of the development of distributed ledger technologies and an increase in electronic venture capital investment,” the analysts wrote. “Digital currency is now being used by developing nations as a means of financial transactions. Additionally, blockchain technology is frequently used in conjunction with virtual currency to provide decentralized and managed related capital.”

Many Avenues for Using XMRig

According to Expel’s Nahorney, XMRig in particular is popping up in a growing number of places. He noted that use of React2Shell to distribute the cryptominer, but noted it’s been used to compromise credentials of several remote administration application and in SSH brute-force attakcs.

It’s also been installed through commodity malware.

XMRig provides cross-platform compatibility, so hackers can use the same tool not only in Windows endpoints and Linux hosts, but also in Kubernetes pods and Amazon Web Services EC2 instances.

“Since XMRig performs CPU mining, it is an ideal choice in low-resource conditions such as these,” he wrote. “This allows attackers to efficiently monetize the platforms they compromise, regardless of their size and computing power.”

Roaring Back

Researchers with German cybersecurity firm G Data CyberDefense last summer wrote about a resurgence of malware deploying XMRig after what they described as a “two-year hiatus.” The researchers noted one possible reason for the upswing was the rally of the market for Monero between January and May last year – including a spike in April – gaining 45% in value, from $196 to $285.

“The spike coincided with the high-profile bitcoin theft that was subsequently converted into Monero,” they wrote. “This theft and subsequent conversion were reportedly orchestrated by a single individual in the U.S.”

Another driver was the optimization updates introduced in April, which they wrote “may have encouraged users (including threat actors) to capitalize on the promise of the latest version.”

‘No Smoking Gun’

Nahorney wrote that “XMRig isn’t inherently malicious since it’s legitimate mining software, which can make detection trickier. When attempting to identify unauthorized cryptomining installations, no single indicator is a smoking gun confirming a miner’s presence on its own.”

Organizations need to look for outbound connections used by Monero mining pools, unusual encrypted connections, and high CPU use on systems that don’t tend of run intensive workloads or during off hours. They also should check for unexpected scheduled task, cron jobs, or registry startup items. With Kubernetes, they should review pod security policies and ensure baseline profiles are enabled, and in AWS C2 instances, they need to use AWS GuardDuty to detect cryptomining and turn on Runtime Monitoring.

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/01/use-of-xmrig-cryptominer-by-threat-actors-expanding-expel/
如有侵权请联系:admin#unsafe.sh