
Summary
This detection rule focuses on identifying connections made by processes on Linux systems to known Monero (XMR) crypto mining pools. The rule targets specific destination hostnames associated with crypto mining operations, such as pool.minexmr.com and several others listed in the selection criteria. The detection is implemented by monitoring network connection logs and looking for outgoing traffic directed at these mining pools. It's important to note that while the high detection level indicates a potentially malicious activity, there may be false positives in situations where legitimate crypto mining is occurring. This rule is intended for use in environments where unauthorized crypto mining could represent a security risk, such as compromised servers or devices. Additionally, the information referenced can provide context about Monero mining pools and their operation, enhancing overall situational awareness for analysts.
Categories
- Linux
- Network
Data Sources
- Network Traffic
- Process
Created: 2021-10-26