{"id":4715,"date":"2025-06-24T15:11:50","date_gmt":"2025-06-24T15:11:50","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/24\/researchers-find-way-to-shut-down-cryptominer-campaigns-using-bad-shares-and-xmrogue\/"},"modified":"2025-06-24T15:11:50","modified_gmt":"2025-06-24T15:11:50","slug":"researchers-find-way-to-shut-down-cryptominer-campaigns-using-bad-shares-and-xmrogue","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/24\/researchers-find-way-to-shut-down-cryptominer-campaigns-using-bad-shares-and-xmrogue\/","title":{"rendered":"Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue"},"content":{"rendered":"<p>\u200bCybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets.<br \/>\nThe methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today.<br \/>\n&#8220;We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a\u00a0Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets.<br \/>\nThe methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today.<br \/>\n&#8220;We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today. &#8220;We developed two techniques by leveraging the mining topologies and pool&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/24\/researchers-find-way-to-shut-down-cryptominer-campaigns-using-bad-shares-and-xmrogue\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4716,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4715"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4715"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4715\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4716"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}