Is my host protected against XMRig crypto miner?

/static/assets/apple-logo.svg/static/assets/windows-logo.svg/static/assets/linux-logo.svg
Compromised hosts may be used to mine cryptocurrency. This technique executes XMRig crypto miner and attempts to connect to a miner pool. It's important to monitor for the presence of cryptocurrency miners, as they may consume significant quantities of system resources.
locked
View Command

To view this TTPs command, you must be logged in with a professional or enterprise license.

Login

Test this TTP

Download Operator (1.7.1)
Test this TTP using one of our Operator chains
Is my host protected against XMRig crypto miner?

2022-12-13

/static/assets/linux-logo.svg/static/assets/apple-logo.svg/static/assets/windows-logo.svg
Stage and execute XMRig crypto miner.