5 PERCENT OF MONERO IN CIRCULATION WAS MINED THROUGH MALWARE, RESEARCH FINDS

Last updated: June 20, 2025, 00:34 | Written by: Elizabeth Rossiello

5 Percent Of Monero In Circulation Was Mined Through Malware, Research Finds
5 Percent Of Monero In Circulation Was Mined Through Malware, Research Finds

The world of cryptocurrency is constantly evolving, bringing with it both innovation and challenges.One such challenge is the threat of malicious actors exploiting vulnerabilities to illicitly mine digital currencies. Palo Alto Networks, a networking security company has release a report which potentially have destabilizing undercurrents. The report was based on a research conducted by the company and was released on 11 June. The findings suggested that nearly five percent of all Monero (XMR) in circulation was mined through a malware in its algorithm. The [ ]A recent report by Palo Alto Networks, a prominent network and enterprise security company, has brought to light a concerning statistic: approximately 5 percent of all Monero (XMR) currently in circulation was mined through malware.This revelation shines a spotlight on the practice of cryptojacking, where hackers commandeer the computing power of unsuspecting users to generate cryptocurrency without their consent. See full list on bleepingcomputer.comThis illicit activity not only impacts individual users but also poses a significant risk to the overall security and integrity of the Monero network.

This revelation carries significant weight, considering Monero's focus on privacy and security.With a market capitalization hovering around $1.9 billion and a transaction price of approximately $119, even a small percentage of illicitly mined coins can have substantial implications.The total value of this maliciously mined Monero is estimated at around $175 million.This article will delve into the details of the Palo Alto Networks report, exploring the mechanics of cryptojacking, the impact on the Monero ecosystem, and the steps individuals and organizations can take to protect themselves.

Understanding Cryptojacking and Its Impact on Monero

Cryptojacking, at its core, is the unauthorized use of someone else's computing resources to mine cryptocurrency. A June 11 report by network and undertaking security company Palo Alto Networks has discovered that around 5 percent of all Monero (XMR) available for use was mined noxiously. As indicated by the research, the mining has been done by means of cryptojacking, the act of utilizing other clients PCs preparing capacity to dig for cryptocurrencies without the proprietors consent. JoshThis can happen in a variety of ways, often without the victim's knowledge. According to Grunzweig, Monero has an incredible monopoly on the cryptocurrencies targeted by malware, with a total of $175 mln mined maliciously (about 5 percent of all Monero now in circulation). Monero has a total market cap of around $1.9 bln, trading for around $119 and down around 10 percent over a 24 hour period to press time.A common method involves injecting malicious code into websites or apps, which then uses the visitor's or user's CPU power to mine for cryptocurrencies like Monero.

Why Monero?According to Grunzweig's analysis, Monero has an ""unbelievable monopoly"" on the currency mined by malware. Author: Topic: 5 Percent of Monero in Circulation Was Mined Through Malware, Research Finds (Read 90 times)This is largely due to Monero's privacy-centric design. 295K subscribers in the Monero community. This is the official subreddit of Monero (XMR), a secure, private, untraceable currency that is open-sourceIts enhanced anonymity features make it difficult to trace transactions, making it an attractive target for cybercriminals. According to Grunzweig, Monero has an unbelievable monopoly on the currency mined by malware, maliciously exploiting a total of $175 million in Monero (about 5% of all Monero currently in circulation). The total market value of Monero is about $1.9 billion, and the transaction price is about $119.The inherent anonymity that attracts legitimate users also appeals to those seeking to hide the origins of illegally obtained currency.

How Cryptojacking Works

The process of cryptojacking typically involves the following steps:

  1. Infection: A user unknowingly downloads or encounters malware, often through phishing emails, malicious websites, or compromised software.
  2. Execution: The malware silently installs a cryptocurrency miner on the victim's device.This miner runs in the background, consuming CPU resources.
  3. Mining: The miner uses the device's processing power to solve complex mathematical problems, contributing to the Monero network's blockchain and generating Monero coins.
  4. Profit: The generated Monero is transferred to the attacker's wallet, with the victim bearing the cost of increased energy consumption and reduced device performance.

The impact of cryptojacking can be significant, leading to:

  • Slowed Down Devices: Cryptojacking miners consume significant CPU resources, leading to noticeable slowdowns in device performance.
  • Increased Energy Consumption: The constant mining activity drains battery life on mobile devices and increases electricity bills for desktop users.
  • Overheating: Prolonged CPU usage can cause devices to overheat, potentially leading to hardware damage.
  • Security Risks: Cryptojacking malware can open the door to other types of infections and security breaches.

The Palo Alto Networks Report: Key Findings and Implications

The Palo Alto Networks report sheds light on the scale of the cryptojacking problem within the Monero ecosystem. A June 11 report by network and enterprise security company Palo Alto Networks has found that around 5 percent of all Monero (XMR) in circulation was mined maliciously. According to the research, the mining has been done via cryptojacking, the practice of using other users computers processing power to mine for cryptocurrencies withoutThe report estimates that approximately 5 percent of all Monero in circulation was mined maliciously, equating to roughly $175 million in value. Take in tens of millions. The figures mean that around five percent of all the Monero currently in circulation - 15,962,350 XMR - has been mined using code running on infected devices.This figure is based on analyzing network traffic, identifying patterns of cryptojacking activity, and extrapolating the amount of Monero likely generated through these means.According to the research, the mining has been done via cryptojacking, the practice of using other users computers processing power to mine for cryptocurrencies without the proprietors consent.

The findings suggest a concerning level of sophistication and persistence among cryptojacking actors. A June 11 report by network and enterprise security company Palo Alto Networks has found that around 5 percent of all Monero (XMR) in circulation was mined maliciously. According to the researchThey are actively targeting Monero due to its privacy features, exploiting vulnerabilities in systems and networks to silently siphon off computing power. Five Percent of All Monero Mined by Hackers, Research FindsThis large-scale operation poses a threat to the integrity and trustworthiness of the Monero network, potentially undermining its reputation and long-term viability.

Destabilizing Undercurrents: A Cause for Concern?

The report raises the question of whether this level of malicious mining could have ""destabilizing undercurrents"" for the Monero network.While the impact may not be immediately apparent, the long-term consequences could be significant. New report finds that five percent, or $175 mln, of Monero currently in circulation was mined through cryptojacking. A June 11 report by network and enterprise security company Palo Alto Networks has found that around 5 percent of all Monero (XMR) in circulation was mined maliciously. According to the research, the mining has been done MoreA large portion of illicitly mined coins could be used to manipulate the market, fund illegal activities, or simply undermine the confidence of legitimate users.

Furthermore, the presence of cryptojacking malware can compromise the security of devices and networks, creating a breeding ground for other types of cyberattacks.This can lead to a domino effect, where an initial cryptojacking infection paves the way for more serious security breaches and data theft.

Protecting Yourself from Cryptojacking: Practical Tips

While the prospect of cryptojacking may seem daunting, there are several steps you can take to protect yourself and your devices:

  • Install an Ad Blocker: Many websites inject cryptojacking scripts through advertisements.Ad blockers can prevent these scripts from running, reducing your risk of infection.Examples include uBlock Origin and AdBlock Plus.
  • Use a Reputable Antivirus Program: A strong antivirus program can detect and remove cryptojacking malware from your system.Ensure your antivirus software is always up to date.
  • Keep Your Software Updated: Software updates often include security patches that address vulnerabilities exploited by cryptojacking malware.Regularly update your operating system, web browsers, and other applications.
  • Be Wary of Suspicious Links and Attachments: Phishing emails and malicious websites are common sources of cryptojacking malware.Be cautious about clicking on unfamiliar links or opening attachments from unknown senders.
  • Monitor CPU Usage: Keep an eye on your computer's CPU usage.A sudden and unexplained spike in CPU activity could indicate a cryptojacking infection.Use Task Manager (Windows) or Activity Monitor (macOS) to monitor CPU usage.
  • Use Browser Extensions Designed to Block Cryptojacking: Some browser extensions are specifically designed to detect and block cryptojacking scripts.Examples include No Coin and AntiMiner.
  • Disable JavaScript: While disabling JavaScript entirely can break many websites, selectively disabling it on untrusted sites can significantly reduce your risk of cryptojacking.Use browser extensions like NoScript to manage JavaScript permissions.

Addressing Common Questions About Cryptojacking and Monero

Here are some frequently asked questions about cryptojacking and its implications for Monero:

Is cryptojacking illegal?

Yes, cryptojacking is illegal in most jurisdictions.It involves the unauthorized use of someone else's computing resources, which can be considered theft of service or computer trespass.

How can I tell if my computer is being used for cryptojacking?

Signs of a cryptojacking infection include:

  • Slow performance
  • High CPU usage even when idle
  • Overheating
  • Increased energy consumption
  • Unusual network activity

What is the Monero community doing to address cryptojacking?

The Monero community is actively working to mitigate the threat of cryptojacking.This includes:

  • Developing and promoting security best practices
  • Collaborating with security researchers to identify and address vulnerabilities
  • Working on protocol enhancements to make Monero more resistant to cryptojacking
  • Educating users about the risks of cryptojacking and how to protect themselves

What is the future of Monero in light of this news?

While the news of 5 percent of Monero being mined through malware is concerning, it doesn't necessarily spell doom for the cryptocurrency.Monero has a strong community and a dedicated development team that is committed to improving its security and privacy features.By addressing the vulnerabilities that allow cryptojacking to thrive, Monero can mitigate the threat and maintain its position as a leading privacy-focused cryptocurrency.

The Broader Implications for Cryptocurrency Security

The Monero cryptojacking case is not an isolated incident.It highlights a broader trend of cybercriminals targeting cryptocurrencies through various means, including malware, phishing attacks, and exchange hacks.This underscores the importance of robust security measures across the entire cryptocurrency ecosystem.

Cryptocurrency exchanges need to invest in advanced security technologies to protect user funds and prevent hacking attempts.Developers of cryptocurrency wallets and software should prioritize security during the development process, conducting thorough audits and implementing best practices to minimize vulnerabilities.And, perhaps most importantly, individuals need to be vigilant about their own security practices, taking steps to protect their devices, passwords, and private keys.

The Role of Regulators

Regulators also have a role to play in combating cryptocurrency-related crime.By establishing clear legal frameworks and enforcing anti-money laundering (AML) regulations, they can help to deter malicious activity and make it more difficult for criminals to profit from cryptocurrency theft and fraud.However, regulations must be carefully designed to avoid stifling innovation and hindering the legitimate use of cryptocurrencies.

Conclusion: A Call to Action for Enhanced Security

The revelation that 5 percent of Monero in circulation was mined through malware serves as a stark reminder of the ongoing security challenges facing the cryptocurrency industry.Cryptojacking, in particular, poses a significant threat to individual users and the integrity of blockchain networks.While Monero is a leader in privacy and therefore a common target, this issue impacts all digital currencies.It highlights the critical importance of proactive security measures, vigilant monitoring, and continuous improvement.

By taking steps to protect themselves from cryptojacking and other cyber threats, individuals can help to safeguard their own assets and contribute to a more secure and trustworthy cryptocurrency ecosystem.Developers, exchanges, and regulators also have a crucial role to play in building a more resilient and secure environment for digital currencies.By working together, we can mitigate the risks and unlock the full potential of cryptocurrency technology.

Take action today: Update your antivirus software, install an ad blocker, and be mindful of suspicious links and attachments.Together, we can make the cryptocurrency landscape a safer place for everyone.Don't become a victim of malicious mining.Be proactive and protect yourself.The future of cryptocurrency depends on it.

Elizabeth Rossiello can be reached at [email protected].

Articles tagged with "Coinbase Pushes Use of ‘Trusted’ USDC Over Tether’s USDT" (0 found)

No articles found with this tag.

← Back to article

Comments