Is my host protected against XMRig crypto miner?
Compromised hosts may be used to mine cryptocurrency. This technique executes XMRig crypto miner and attempts to connect to a miner pool. It's important to monitor for the presence of cryptocurrency miners, as they may consume significant quantities of system resources.
To view this TTPs command, you must be logged in with a professional or enterprise license.Login
Test this TTP
Download Operator (1.7.1)